Network Location Privacy Protection with Multi-access Edge Computing

Real world incidents show leaking of communication and location privacy can lead to serious consequence. Many research efforts have tried to anonymize individual user from aggregated location data. However, just the communication between the mobile user and their peers could reveal important privacy of the mobile user, such as location history. In this paper, we proposed a scalable system built with Multi-access Edge (MEC) that can hide the mobile user’s network location and traffic from communication peers. This system creates a dynamic distributed proxy network for each mobile user to minimize performance overhead and operation cost.

[1]  Arjan Durresi,et al.  Routing Loops in DAG-Based Low Power and Lossy Networks , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.

[2]  Hubertus Feussner,et al.  Enabling Real-Time Context-Aware Collaboration through 5G and Mobile Edge Computing , 2015, 2015 12th International Conference on Information Technology - New Generations.

[3]  Arjan Durresi,et al.  Video over Software-Defined Networking (VSDN) , 2013, 2013 16th International Conference on Network-Based Information Systems.

[4]  Rodrigo Roman,et al.  Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges , 2016, Future Gener. Comput. Syst..

[5]  Lars Eggert,et al.  Host Identity Protocol (HIP) Registration Extension , 2016, RFC.

[6]  David K. Y. Yau,et al.  Privacy vulnerability of published anonymous mobility traces , 2013, TNET.

[7]  Michael Till Beck,et al.  Mobile Edge Computing: A Taxonomy , 2014 .

[8]  Ejaz Ahmed,et al.  A survey on mobile edge computing , 2016, 2016 10th International Conference on Intelligent Systems and Control (ISCO).

[9]  Arjan Durresi,et al.  Cloud aided Internet mobility , 2013, 2013 IEEE International Conference on Communications (ICC).

[10]  Mimoza Durresi,et al.  Sensor inter-vehicle communication for safer highways , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).

[11]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[12]  Ling Liu,et al.  Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms , 2008, IEEE Transactions on Mobile Computing.

[13]  Maria Luisa Damiani Privacy Enhancing Techniques for the Protection of Mobility Patterns in LBS: Research Issues and Trends , 2013, European Data Protection.

[14]  Dario Pompili,et al.  Collaborative Mobile Edge Computing in 5G Networks: New Paradigms, Scenarios, and Challenges , 2016, IEEE Communications Magazine.

[15]  Dario Pompili,et al.  Joint Task Offloading and Resource Allocation for Multi-Server Mobile-Edge Computing Networks , 2017, IEEE Transactions on Vehicular Technology.

[16]  Mimoza Durresi,et al.  Multi-access edge computing aided mobility for privacy protection in Internet of Things , 2018, Computing.

[17]  César A. Hidalgo,et al.  Unique in the Crowd: The privacy bounds of human mobility , 2013, Scientific Reports.

[18]  Mimoza Durresi,et al.  Mobile Privacy Protection Enhanced with Multi-access Edge Computing , 2018, 2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA).

[19]  Mahesh K. Marina,et al.  On the Inference of User Paths from Anonymized Mobility Data , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).

[20]  Frank Dürr,et al.  A classification of location privacy attacks and approaches , 2012, Personal and Ubiquitous Computing.

[21]  Vana Kalogeraki,et al.  Location privacy for crowdsourcing applications , 2016, UbiComp.

[22]  Arjan Durresi,et al.  Cloud aided internet mobility for privacy protection , 2017, 2017 IEEE International Conference on Communications (ICC).

[23]  Sugih Jamin,et al.  Inet-3.0: Internet Topology Generator , 2002 .

[24]  Leonard Barolli,et al.  A selective border-casting zone routing protocol for ad-hoc networks , 2004 .

[25]  Lionel Brunie,et al.  Differentially Private Location Privacy in Practice , 2014, ArXiv.