Privacy is an increasing concern of mobile Internet users as both research and real-world incidents show that leaking of communication and location privacy can lead to severe consequences. Therefore much research has been done to anonymize individual users from aggregated location data. However, just the communication itself between a mobile user and their peers or website could collect considerable privacy of the mobile user, such as location history, to other parties. In this paper, we investigated the potential privacy risk of mobile Internet users, including the Internet of Things. We proposed a scalable system built on top of public cloud services that can hide a mobile user’s network location and traffic from communication peers. This system creates a dynamic distributed proxy network for each mobile user to minimize performance overhead and operation costs.
This is a preview of subscription content, access via your institution.
Buy single article
Instant access to the full article PDF.
Tax calculation will be finalised during checkout.
Subscribe to journal
Immediate online access to all issues from 2019. Subscription will auto renew annually.
Tax calculation will be finalised during checkout.
Ahmed A, Ahmed E 2016) A survey on mobile edge computing. In: 2016 10th international conference on intelligent systems and control (ISCO), pp 1–8
Aleisa N, Renaud K (2017) In: Proceedings of the 50th Hawaii international conference on system sciences, pp 5947–5956, Jan 2017
Ammar M, Russello G, Crispo B (2018) Internet of things: a survey on the security of IoT frameworks. J Inf Secur Appl 38:8–27
Beck MT, Werner M, Feld S, Schimper T (2014) Mobile edge computing: a taxonomy. In: Proceedings of the sixth international conference on advances in future internet, pp 48–55, Nov 2014
Boutsis I, Kalogeraki V (2016) Location privacy for crowdsourcing applications. In: Proceedings of the 2016 ACM international joint conference on pervasive and ubiquitous computing, UbiComp ’16. ACM, New York, pp 694–705
Damiani ML (2013) European data protection: coming of age, chapter privacy enhancing techniques for the protection of mobility patterns in LBS: research issues and trends. Springer, Netherlands, pp 223–239
de Montjoye YA, Hidalgo CA, Verleysen M, Blondel VD (2013) Unique in the crowd: the privacy bounds of human mobility. Sci Rep 3(1376):489–490. https://doi.org/10.1038/srep01376
Dingledine R, Mathewson N, Syverson P (2004) Tor: the second-generation onion router. In: Proceedings of the 13th USENIX security symposium
ETSI. Multi-access edge computing
Garvelink B (2015) Mobile edge computing: a building block for 5G, telecompaper. https://www.telecompaper.com/background/mobileedge-computing-a-building-block-for-5g--1092281
Gedik B, Liu L (2008) Protecting location privacy with personalized k-anonymity: architecture and algorithms. IEEE Trans Mobile Comput 7(1):1–18
Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of things (IoT): a vision, architectural elements, and future directions. Future Gener Comput Syst 29(7):1645–1660
Howard PN (2015) Pax technica: how the internet of things may set us free or lock us up. Yale University Press, London
Laganier J, Koponen T, Eggert L (April 2008) Host identity protocol (HIP) registration extension. RFC 5203 (experimental)
Lin M, Cao H, Zheng V, Chang KC, Krishnaswamy S (Feb 2015) Mobile user verification/identification using statistical mobility profile. In: 2015 international conference on big data and smart computing (BIGCOMP), pp 15–18
Lu R, Zhu H, Liu X, Liu JK, Shao J (2014) Toward efficient and privacy-preserving computing in big data era. IEEE Netw 28(6):46–50
Ma CYT, Yau DKY, Yip NK, Rao NSV (2013) Privacy vulnerability of published anonymous mobility traces. IEEE/ACM Trans Netw 21(3):720–733
McEwen A, Cassimally H (2013) Designing the internet of things. Wiley, New York
Niu B, Zhu X, Li W, Li H, Wang Y, Lu Z (2015) A personalized two-tier cloaking scheme for privacy-aware location-based services. In: 2015 international conference on computing, networking and communications (ICNC), pp 94–98
Nunna S, Kousaridas A, Ibrahim M, Dillinger M, Thuemmler C, Feussner H, Schneider A (2015) Enabling real-time context-aware collaboration through 5G and mobile edge computing. In: 2015 12th international conference on information technology—new generations, pp 601–605
Pelekis N, Theodoridis Y (2014) Mobility data management and exploration, chapter privacy-aware mobility data exploration. Springer, New York, pp 169–185
Primault V, Mokhtar SB, Lauradoux C, Brunie L (2014) Differentially private location privacy in practice. CoRR. arXiv:1410.7744
Roman R, Lopez J, Mambo M (2018) Mobile edge computing, fog et al. survey and analysis of security threats and challenges. Future Gener Comput Syst 78(2):680–698
Ruan Y, Durresi A (2019) A trust management framework for clouds. Comput Commun 144:124–131
Ruan Y, Durresi A, Alfantoukh L (2016) Trust management framework for internet of things. In: Leonard B, Makoto T, Tomoya E, Antonio JJ, Yann Bo (eds) 30th IEEE international conference on advanced information networking and applications, AINA 2016, Crans-Montana, Switzerland, 23–25 March, 2016. IEEE Computer Society, pp 1013–1019
Ruan Y, Durresi A, Uslu S (2018) Trust assessment for internet of things in multi-access edge computing. In: Leonard B, Makoto T, Tomoya E, Marek RO, Lidia O, Nadeem J (eds) 32nd IEEE international conference on advanced information networking and applications, AINA 2018, Krakow, Poland, May 16–18, 2018. IEEE Computer Society, pp 1155–1161
Ruan Y, Zhang P, Alfantoukh L, Durresi A (2017) Measurement theory-based trust. ACM Trans Internet Technol 17(2):16:1–16:24
Shi W, Cao J, Zhang Q, Li Y, Xu L (2016) Edge computing: vision and challenges. IEEE Internet Things J 3(5):637–646
Shin KG, Ju X, Chen Z, Hu X (2012) Privacy protection for users of location-based services. IEEE Wirel Commun 19(1):30–39
Tran TX, Hajisami A, Pandey P, Pompili D (2017) Collaborative mobile edge computing in 5g networks: new paradigms, scenarios, and challenges. IEEE Commun Mag 55(4):54–61
Tran TX, Pompili D (2017) Joint task offloading and resource allocation for multi-server mobile-edge computing networks. CoRR. arXiv:1705.00704
Tsoukaneri G, Theodorakopoulos G, Leather H, Marina MK (March 2016) On the inference of user paths from anonymized mobility data. In: 2016 IEEE European symposium on security and privacy (EuroS P), pp 199–213
Wernke M, Skvortsov P, Dürr F, Rothermel K (2014) A classification of location privacy attacks and approaches. Pers Ubiquitous Comput 18(1):163–175
Winick J, Jamin S (2002) Inet-3.0: Internet topology generator. Technical report, Department of Electrical Engineering and Computer Science, University of Michigan
Yoshigoe K, Dai W, Abramson M, Jacobs A (2014) Overcoming invasion of privacy in smart home environment with synthetic packet injection. In: 2015 TRON symposium (TRONSHOW), pp 1–7
Zhang P, Durresi A (2017) Cloud aided internet mobility for privacy protection. In: IEEE international conference on communications, ICC 2017, Paris, France, May 21–25, 2017, pp 1–6
Zhang P, Durresi A, Barolli L (2011) Survey of trust management on various networks. In: International conference on complex, intelligent and software intensive systems, CISIS 2011, June 30–July 2, 2011. Korean Bible University, Seoul, Korea. IEEE Computer Society, pp 219–226
Zhang P, Durresi A, Jain R (2013) Cloud aided internet mobility. In: Proceedings of IEEE international conference on communications, ICC 2013, Budapest, Hungary, June 9–13, 2013, pp 3688–3693
Zhang P, Durresi M, Durresi A (2018) Mobile privacy protection enhanced with multi-access edge computing. In: Leonard B, Makoto T, Tomoya E, Marek RO, Lidia O, Nadeem J (eds) 32nd IEEE international conference on advanced information networking and applications, AINA 2018, Krakow, Poland, May 16–18, 2018. IEEE Computer Society, pp 724–731
Zhang P, Durresi M, Durresi A (2019) Network location privacy protection with multi-access edge computing. In: Leonard B, Makoto T, Fatos X, Tomoya E (eds) Advanced information networking and applications—proceedings of the 33rd international conference on advanced information networking and applications, AINA 2019, Matsue, Japan, March 27-29, 2019, volume 926 of advances in intelligent systems and computing. Springer, pp 1342–1352
Zhou W, Jia Y, Peng A, Zhang Y, Liu P (2019) The effect of IoT new features on security and privacy: new threats, existing solutions, and challenges yet to be solved. IEEE Internet Things J 6(2):1606–1616
This work was partially supported by National Science Foundation under Grant No. 1547411 and National Institute of Food and Agriculture (NIFA) USDA Award 2017-67003-26057.
Conflict of interest
The authors declare that they have no conflict of interest.
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
About this article
Cite this article
Zhang, P., Durresi, M. & Durresi, A. Internet network location privacy protection with multi-access edge computing. Computing (2020). https://doi.org/10.1007/s00607-020-00860-3
- Internet network privacy
- Internet of Things
- Multi-access edge computing
Mathematics Subject Classification