Location privacy in mobile edge clouds: A chaff-based approach

Ting He, Ertugrul Necdet Ciftcioglu, Shiqiang Wang, Kevin S. Chan

Research output: Contribution to journalArticle

10 Citations (Scopus)

Abstract

In this paper, we consider user location privacy in mobile edge clouds (MECs). MECs are small clouds deployed at the network edge to offer cloud services close to mobile users, and many solutions have been proposed to maximize service locality by migrating services to follow their users. Co-location of a user and his service, however, implies that a cyber eavesdropper observing service migrations between MECs can localize the user up to one MEC coverage area, which can be fairly small (e.g., a femtocell). We consider using chaff services to defend against such an eavesdropper, with a focus on strategies to control the chaffs. Assuming the eavesdropper performs maximum likelihood detection, we consider both heuristic strategies that mimic the user's mobility and optimized strategies designed to minimize the detection or tracking accuracy. We show that a single chaff controlled by the optimal strategy or its online variation can drive the eavesdropper's tracking accuracy to zero when the user's mobility is sufficiently random. We further propose extended strategies that utilize randomization to defend against an advanced eavesdropper aware of the strategy. The efficacy of our solutions is verified through both synthetic and trace-driven simulations.

Original languageEnglish (US)
Article number8058447
Pages (from-to)2625-2636
Number of pages12
JournalIEEE Journal on Selected Areas in Communications
Volume35
Issue number11
DOIs
StatePublished - Nov 1 2017

Fingerprint

Femtocell
Maximum likelihood

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Cite this

He, Ting ; Ciftcioglu, Ertugrul Necdet ; Wang, Shiqiang ; Chan, Kevin S. / Location privacy in mobile edge clouds : A chaff-based approach. In: IEEE Journal on Selected Areas in Communications. 2017 ; Vol. 35, No. 11. pp. 2625-2636.
@article{0cecdd9c6ea942d490e9683c4f2f86ca,
title = "Location privacy in mobile edge clouds: A chaff-based approach",
abstract = "In this paper, we consider user location privacy in mobile edge clouds (MECs). MECs are small clouds deployed at the network edge to offer cloud services close to mobile users, and many solutions have been proposed to maximize service locality by migrating services to follow their users. Co-location of a user and his service, however, implies that a cyber eavesdropper observing service migrations between MECs can localize the user up to one MEC coverage area, which can be fairly small (e.g., a femtocell). We consider using chaff services to defend against such an eavesdropper, with a focus on strategies to control the chaffs. Assuming the eavesdropper performs maximum likelihood detection, we consider both heuristic strategies that mimic the user's mobility and optimized strategies designed to minimize the detection or tracking accuracy. We show that a single chaff controlled by the optimal strategy or its online variation can drive the eavesdropper's tracking accuracy to zero when the user's mobility is sufficiently random. We further propose extended strategies that utilize randomization to defend against an advanced eavesdropper aware of the strategy. The efficacy of our solutions is verified through both synthetic and trace-driven simulations.",
author = "Ting He and Ciftcioglu, {Ertugrul Necdet} and Shiqiang Wang and Chan, {Kevin S.}",
year = "2017",
month = "11",
day = "1",
doi = "10.1109/JSAC.2017.2760179",
language = "English (US)",
volume = "35",
pages = "2625--2636",
journal = "IEEE Journal on Selected Areas in Communications",
issn = "0733-8716",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "11",

}

Location privacy in mobile edge clouds : A chaff-based approach. / He, Ting; Ciftcioglu, Ertugrul Necdet; Wang, Shiqiang; Chan, Kevin S.

In: IEEE Journal on Selected Areas in Communications, Vol. 35, No. 11, 8058447, 01.11.2017, p. 2625-2636.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Location privacy in mobile edge clouds

T2 - A chaff-based approach

AU - He, Ting

AU - Ciftcioglu, Ertugrul Necdet

AU - Wang, Shiqiang

AU - Chan, Kevin S.

PY - 2017/11/1

Y1 - 2017/11/1

N2 - In this paper, we consider user location privacy in mobile edge clouds (MECs). MECs are small clouds deployed at the network edge to offer cloud services close to mobile users, and many solutions have been proposed to maximize service locality by migrating services to follow their users. Co-location of a user and his service, however, implies that a cyber eavesdropper observing service migrations between MECs can localize the user up to one MEC coverage area, which can be fairly small (e.g., a femtocell). We consider using chaff services to defend against such an eavesdropper, with a focus on strategies to control the chaffs. Assuming the eavesdropper performs maximum likelihood detection, we consider both heuristic strategies that mimic the user's mobility and optimized strategies designed to minimize the detection or tracking accuracy. We show that a single chaff controlled by the optimal strategy or its online variation can drive the eavesdropper's tracking accuracy to zero when the user's mobility is sufficiently random. We further propose extended strategies that utilize randomization to defend against an advanced eavesdropper aware of the strategy. The efficacy of our solutions is verified through both synthetic and trace-driven simulations.

AB - In this paper, we consider user location privacy in mobile edge clouds (MECs). MECs are small clouds deployed at the network edge to offer cloud services close to mobile users, and many solutions have been proposed to maximize service locality by migrating services to follow their users. Co-location of a user and his service, however, implies that a cyber eavesdropper observing service migrations between MECs can localize the user up to one MEC coverage area, which can be fairly small (e.g., a femtocell). We consider using chaff services to defend against such an eavesdropper, with a focus on strategies to control the chaffs. Assuming the eavesdropper performs maximum likelihood detection, we consider both heuristic strategies that mimic the user's mobility and optimized strategies designed to minimize the detection or tracking accuracy. We show that a single chaff controlled by the optimal strategy or its online variation can drive the eavesdropper's tracking accuracy to zero when the user's mobility is sufficiently random. We further propose extended strategies that utilize randomization to defend against an advanced eavesdropper aware of the strategy. The efficacy of our solutions is verified through both synthetic and trace-driven simulations.

UR - http://www.scopus.com/inward/record.url?scp=85031768365&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85031768365&partnerID=8YFLogxK

U2 - 10.1109/JSAC.2017.2760179

DO - 10.1109/JSAC.2017.2760179

M3 - Article

AN - SCOPUS:85031768365

VL - 35

SP - 2625

EP - 2636

JO - IEEE Journal on Selected Areas in Communications

JF - IEEE Journal on Selected Areas in Communications

SN - 0733-8716

IS - 11

M1 - 8058447

ER -