Privacy Protection for Mobile Cloud Data: A Network Coding Approach

Taking into account of both the huge computing power of intruders and untrusted cloud servers, we develop an enhanced secure pseudonym scheme to protect the privacy of mobile cloud data. To face the huge computing power challenge, we develop an unconditionally secure lightweight network coding pseudonym scheme. For the privacy issue of untrusted cloud server, we further design a two tier network coding to decouple the stored mobile cloud data from the owner pseudonyms. Therefore, our proposed network coding based pseudonym scheme can simultaneously defend against attackers from both outside and inside. We implement our proposed two-tier light-weight network coding mechanism in a group location based service (LBS) using untrusted cloud database. Compared to computationally secure Hash-based pseudonym, our proposed scheme is not only unconditionally secure, but also can reduce more than 90 percent of processing time as well as 10 percent of energy consumption.

[1]  Y. Bevish Jinila,et al.  An effective strategy for pseudonym generation & changing scheme with privacy preservation for vanet , 2014 .

[2]  Frank Stajano,et al.  Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..

[3]  Xiaohui Liang,et al.  Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs , 2012, IEEE Transactions on Vehicular Technology.

[4]  Bart Preneel,et al.  Location privacy in wireless personal area networks , 2006, WiSe '06.

[5]  A. Klinger THE VANDERMONDE MATRIX , 1967 .

[6]  Song Guo,et al.  On the Throughput of Two-Way Relay Networks Using Network Coding , 2014, IEEE Transactions on Parallel and Distributed Systems.

[7]  Li-Chun Wang,et al.  A Security Framework of Group Location-Based Mobile Applications in Cloud Computing , 2011, 2011 40th International Conference on Parallel Processing Workshops.

[8]  David C. Parkes,et al.  Non-Cooperative Location Privacy , 2013, IEEE Transactions on Dependable and Secure Computing.

[9]  Yang Tang,et al.  NCCloud: A Network-Coding-Based Storage System in a Cloud-of-Clouds , 2014, IEEE Transactions on Computers.

[10]  João Barros,et al.  Lightweight Security for Network Coding , 2008, 2008 IEEE International Conference on Communications.

[11]  H. T. Mouftah,et al.  Dynamic Mix-Zone for Location Privacy in Vehicular Networks , 2013, IEEE Communications Letters.

[12]  A. Gurjar,et al.  Cluster Based Anonymization for Source Location Privacy in Wireless Sensor Network , 2013, 2013 International Conference on Communication Systems and Network Technologies.

[13]  Ning Cai,et al.  Network coding and error correction , 2002, Proceedings of the IEEE Information Theory Workshop.

[14]  Marco Gruteser,et al.  USENIX Association , 1992 .

[15]  Kaoru Sezaki,et al.  Enhancing wireless location privacy using silent period , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[16]  Jian Li,et al.  An Efficient Error-Detection and Error-Correction (EDEC) Scheme for Network Coding , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[17]  Yuguang Fang,et al.  A game-theoretic approach for achieving k-anonymity in Location Based Services , 2013, 2013 Proceedings IEEE INFOCOM.

[18]  Muriel Médard,et al.  Coding for Trusted Storage in Untrusted Networks , 2012, IEEE Transactions on Information Forensics and Security.

[19]  Dijiang Huang,et al.  Enabling secure location-based services in mobile cloud computing , 2013, MCC '13.

[20]  Vitaly Shmatikov,et al.  De-anonymizing Social Networks , 2009, 2009 30th IEEE Symposium on Security and Privacy.

[21]  Dhananjay Kumar,et al.  Rainbow table to crack password using MD5 hashing algorithm , 2013, 2013 IEEE CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES.

[22]  Kevin W. Hamlen,et al.  AnonymousCloud: A Data Ownership Privacy Provider Framework in Cloud Computing , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[23]  Chi-Yin Chow,et al.  Privacy in location-based services: a system architecture perspective , 2009, SIGSPACIAL.

[24]  Patrick P. C. Lee,et al.  Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory and Implementation , 2014, IEEE Transactions on Parallel and Distributed Systems.

[25]  Tao Xiang,et al.  Secure cloud storage meets with secure network coding , 2016, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[26]  Yuanzhang Li,et al.  Cross-domain Authentication Alliance Protocol Based on Isomorphic Groups , 2011, J. Comput..

[27]  Muriel Médard,et al.  An algebraic approach to network coding , 2003, TNET.

[28]  Dimitrios Makrakis,et al.  Protecting Location Privacy with Clustering Anonymization in vehicular networks , 2014, 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[29]  Li-Chun Wang,et al.  Eavesdropping Prevention for Network Coding Encrypted Cloud Storage Systems , 2016, IEEE Transactions on Parallel and Distributed Systems.

[30]  Ling-Jyh Chen,et al.  SUDO: a secure database outsourcing solution for location-based systems , 2014, GeoPrivacy '14.

[31]  Fengming Bai,et al.  A Distributed Cross-Realm Identification Scheme Based on Hyperchaos System , 2011, CSISE.

[32]  Svetlana Peltsverger,et al.  The security of cryptographic hashes , 2011, ACM-SE '11.

[33]  Shui Yu,et al.  Big Privacy: Challenges and Opportunities of Privacy Study in the Age of Big Data , 2016, IEEE Access.

[34]  Kang-Won Lee,et al.  Understanding Processing Overheads of Network Coding-Based Content Distribution in VANETs , 2013, IEEE Transactions on Parallel and Distributed Systems.

[35]  Alexandre M. Bayen,et al.  Mobile Phones as Seismologic Sensors: Automating Data Extraction for the iShake System , 2013, IEEE Transactions on Automation Science and Engineering.

[36]  Fumiaki Sato,et al.  A Hybrid Method of User Privacy Protection for Location Based Services , 2013, 2013 Seventh International Conference on Complex, Intelligent, and Software Intensive Systems.

[37]  Anantha Chandrakasan,et al.  Energy-Aware Hardware Implementation of Network Coding , 2011, Networking Workshops.

[38]  Y. Bevish Jinila,et al.  An effective strategy for pseudonym generation & changing scheme with privacy preservation for vanet , 2014, 2014 International Conference on Electronics and Communication Systems (ICECS).

[39]  Guohong Cao,et al.  Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System , 2013, IEEE Transactions on Mobile Computing.

[40]  Wenjing Lou,et al.  Security, privacy, and accountability in wireless access networks , 2009, IEEE Wireless Communications.

[41]  Guang Gong,et al.  Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers , 2012, 2012 IEEE International Conference on Communications (ICC).

[42]  Juan C. Yelmo,et al.  A Privacy-Considerate Framework for Identity Management in Mobile Services , 2011, Mob. Networks Appl..

[43]  Ling Liu,et al.  Location Privacy in Mobile Systems: A Personalized Anonymization Model , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).