Enforcing Position-Based Confidentiality With Machine Learning Paradigm Through Mobile Edge Computing in Real-Time Industrial Informatics

Position-based services (PBSs) that deliver networked amenities based on roaming user's positions have become progressively popular with the propagation of smart mobile devices. Position is one of the important circumstances in PBSs. For effective PBSs, extraction and recognition of meaningful positions and estimating the subsequent position are fundamental procedures. Several researchers and practitioners have tried to recognize and predict positions using various techniques; however, only few deliberate the progress of position-based real-time applications considering significant tasks of PBSs. In this paper, a method for conserving position confidentiality of roaming PBSs users using machine learning techniques is proposed. We recommend a three-phase procedure for roaming PBS users. It identifies user position by merging decision trees and k-nearest neighbor and estimates user destination along with the position track sequence using hidden Markov models. Moreover, a mobile edge computing service policy is followed in the proposed paradigm, which will ensure the timely delivery of PBSs. The benefits of mobile edge service policy offer position confidentiality and low latency by means of networking and computing services at the vicinity of roaming users. Thorough experiments are conducted, and it is confirmed that the proposed method achieved above 90% of the position confidentiality in PBSs.

[1]  Arun Kumar Sangaiah,et al.  Source node position confidentiality aspects in wireless networks: an extended review , 2016, Int. J. High Perform. Syst. Archit..

[2]  Nei Kato,et al.  New Perspectives on Future Smart FiWi Networks: Scalability, Reliability, and Energy Efficiency , 2016, IEEE Communications Surveys & Tutorials.

[3]  Sunny Consolvo,et al.  Learning and Recognizing the Places We Go , 2005, UbiComp.

[4]  Zaher Dawy,et al.  VCAMS: Viterbi-Based Context Aware Mobile Sensing to Trade-Off Energy and Delay , 2018, IEEE Transactions on Mobile Computing.

[5]  Arun Kumar Sangaiah,et al.  PCCA: Position Confidentiality Conserving Algorithm for Content-Protection in e-Governance Services and Applications , 2018, IEEE Transactions on Emerging Topics in Computational Intelligence.

[6]  Nei Kato,et al.  Energy Consumption Minimization for FiWi Enhanced LTE-A HetNets with UE Connection Constraint , 2016, IEEE Communications Magazine.

[7]  Arun Kumar Sangaiah,et al.  Search space-based multi-objective optimization evolutionary algorithm , 2017, Comput. Electr. Eng..

[8]  Yong Wang,et al.  Velocity similarity anonymization for continuous query Location based services , 2013, 2013 International Conference on Computational Problem-Solving (ICCP).

[9]  Sanjit A. Seshia,et al.  Synthesis of Obfuscation Policies to Ensure Privacy and Utility , 2017, Journal of Automated Reasoning.

[10]  Blesson Varghese,et al.  Edge-as-a-Service: Towards Distributed Cloud Architectures , 2017, PARCO.

[11]  MengChu Zhou,et al.  Objectives and State-of-the-Art of Location-Based Social Network Recommender Systems , 2018, ACM Comput. Surv..

[12]  Sherali Zeadally,et al.  Container-as-a-Service at the Edge: Trade-off between Energy Efficiency and Service Availability at Fog Nano Data Centers , 2017, IEEE Wireless Communications.

[13]  Ming Li,et al.  Online Location Trace Privacy: An Information Theoretic Approach , 2019, IEEE Transactions on Information Forensics and Security.

[14]  Arun Kumar Sangaiah,et al.  Source Node Position Confidentiality (SNPC) Conserving Position Monitoring System for Wireless Networks , 2015 .

[15]  Arun Kumar Sangaiah,et al.  A quantum-inspired hybrid intelligent position monitoring system in wireless networks , 2017 .

[16]  Hui Guo,et al.  A Survey on Emerging Computing Paradigms for Big Data , 2017 .

[17]  EckhoffDavid,et al.  Technical Privacy Metrics , 2018 .

[18]  Nei Kato,et al.  Hybrid Method for Minimizing Service Delay in Edge Cloud Computing Through VM Migration and Transmission Power Control , 2017, IEEE Transactions on Computers.

[19]  Philip S. Yu,et al.  Global privacy and transportation mode homogeneity anonymization in location based mobile systems with continuous queries , 2010, 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010).

[20]  Ju Ren,et al.  Serving at the Edge: A Scalable IoT Architecture Based on Transparent Computing , 2017, IEEE Network.

[21]  Yong Wang,et al.  Privacy Preserving for Continuous Query in Location Based Services , 2012, 2012 IEEE 18th International Conference on Parallel and Distributed Systems.

[22]  Sung-Bae Cho,et al.  Exploiting machine learning techniques for location recognition and prediction with smartphone logs , 2016, Neurocomputing.

[23]  David Eckhoff,et al.  Metrics : a Systematic Survey , 2018 .

[24]  Jianliang Xu,et al.  Distortion-based anonymity for continuous queries in location-based mobile services , 2009, GIS.

[25]  Christian Poellabauer,et al.  Hierarchical Cooperative Discovery of Personal Places from Location Traces , 2018, IEEE Transactions on Mobile Computing.

[26]  Arun Kumar Sangaiah,et al.  ESCAPE: Effective Scalable Clustering Approach for Parallel Execution of Continuous Position-Based Queries in Position Monitoring Applications , 2017, IEEE Transactions on Sustainable Computing.