Internet network location privacy protection with multi-access edge computing

We’re sorry, something doesn't seem to be working properly.

Please try refreshing the page. If that doesn't work, please contact support so we can address the problem.


Privacy is an increasing concern of mobile Internet users as both research and real-world incidents show that leaking of communication and location privacy can lead to severe consequences. Therefore much research has been done to anonymize individual users from aggregated location data. However, just the communication itself between a mobile user and their peers or website could collect considerable privacy of the mobile user, such as location history, to other parties. In this paper, we investigated the potential privacy risk of mobile Internet users, including the Internet of Things. We proposed a scalable system built on top of public cloud services that can hide a mobile user’s network location and traffic from communication peers. This system creates a dynamic distributed proxy network for each mobile user to minimize performance overhead and operation costs.

This is a preview of subscription content, access via your institution.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9


  1. 1.

    Ahmed A, Ahmed E 2016) A survey on mobile edge computing. In: 2016 10th international conference on intelligent systems and control (ISCO), pp 1–8

  2. 2.

    Aleisa N, Renaud K (2017) In: Proceedings of the 50th Hawaii international conference on system sciences, pp 5947–5956, Jan 2017

  3. 3.

    Ammar M, Russello G, Crispo B (2018) Internet of things: a survey on the security of IoT frameworks. J Inf Secur Appl 38:8–27

    Google Scholar 

  4. 4.

    Beck MT, Werner M, Feld S, Schimper T (2014) Mobile edge computing: a taxonomy. In: Proceedings of the sixth international conference on advances in future internet, pp 48–55, Nov 2014

  5. 5.

    Boutsis I, Kalogeraki V (2016) Location privacy for crowdsourcing applications. In: Proceedings of the 2016 ACM international joint conference on pervasive and ubiquitous computing, UbiComp ’16. ACM, New York, pp 694–705

  6. 6.

    Damiani ML (2013) European data protection: coming of age, chapter privacy enhancing techniques for the protection of mobility patterns in LBS: research issues and trends. Springer, Netherlands, pp 223–239

    Google Scholar 

  7. 7.

    de Montjoye YA, Hidalgo CA, Verleysen M, Blondel VD (2013) Unique in the crowd: the privacy bounds of human mobility. Sci Rep 3(1376):489–490.

    Article  Google Scholar 

  8. 8.

    Dingledine R, Mathewson N, Syverson P (2004) Tor: the second-generation onion router. In: Proceedings of the 13th USENIX security symposium

  9. 9.

    ETSI. Multi-access edge computing

  10. 10.

    Garvelink B (2015) Mobile edge computing: a building block for 5G, telecompaper.

  11. 11.

    Gedik B, Liu L (2008) Protecting location privacy with personalized k-anonymity: architecture and algorithms. IEEE Trans Mobile Comput 7(1):1–18

    Article  Google Scholar 

  12. 12.

    Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of things (IoT): a vision, architectural elements, and future directions. Future Gener Comput Syst 29(7):1645–1660

    Article  Google Scholar 

  13. 13.

    Howard PN (2015) Pax technica: how the internet of things may set us free or lock us up. Yale University Press, London

    Google Scholar 

  14. 14.

    Laganier J, Koponen T, Eggert L (April 2008) Host identity protocol (HIP) registration extension. RFC 5203 (experimental)

  15. 15.

    Lin M, Cao H, Zheng V, Chang KC, Krishnaswamy S (Feb 2015) Mobile user verification/identification using statistical mobility profile. In: 2015 international conference on big data and smart computing (BIGCOMP), pp 15–18

  16. 16.

    Lu R, Zhu H, Liu X, Liu JK, Shao J (2014) Toward efficient and privacy-preserving computing in big data era. IEEE Netw 28(6):46–50

    Article  Google Scholar 

  17. 17.

    Ma CYT, Yau DKY, Yip NK, Rao NSV (2013) Privacy vulnerability of published anonymous mobility traces. IEEE/ACM Trans Netw 21(3):720–733

    Article  Google Scholar 

  18. 18.

    McEwen A, Cassimally H (2013) Designing the internet of things. Wiley, New York

    Google Scholar 

  19. 19.

    Niu B, Zhu X, Li W, Li H, Wang Y, Lu Z (2015) A personalized two-tier cloaking scheme for privacy-aware location-based services. In: 2015 international conference on computing, networking and communications (ICNC), pp 94–98

  20. 20.

    Nunna S, Kousaridas A, Ibrahim M, Dillinger M, Thuemmler C, Feussner H, Schneider A (2015) Enabling real-time context-aware collaboration through 5G and mobile edge computing. In: 2015 12th international conference on information technology—new generations, pp 601–605

  21. 21.

    Pelekis N, Theodoridis Y (2014) Mobility data management and exploration, chapter privacy-aware mobility data exploration. Springer, New York, pp 169–185

    Google Scholar 

  22. 22.

    Primault V, Mokhtar SB, Lauradoux C, Brunie L (2014) Differentially private location privacy in practice. CoRR. arXiv:1410.7744

  23. 23.

    Roman R, Lopez J, Mambo M (2018) Mobile edge computing, fog et al. survey and analysis of security threats and challenges. Future Gener Comput Syst 78(2):680–698

    Article  Google Scholar 

  24. 24.

    Ruan Y, Durresi A (2019) A trust management framework for clouds. Comput Commun 144:124–131

    Article  Google Scholar 

  25. 25.

    Ruan Y, Durresi A, Alfantoukh L (2016) Trust management framework for internet of things. In: Leonard B, Makoto T, Tomoya E, Antonio JJ, Yann Bo (eds) 30th IEEE international conference on advanced information networking and applications, AINA 2016, Crans-Montana, Switzerland, 23–25 March, 2016. IEEE Computer Society, pp 1013–1019

  26. 26.

    Ruan Y, Durresi A, Uslu S (2018) Trust assessment for internet of things in multi-access edge computing. In: Leonard B, Makoto T, Tomoya E, Marek RO, Lidia O, Nadeem J (eds) 32nd IEEE international conference on advanced information networking and applications, AINA 2018, Krakow, Poland, May 16–18, 2018. IEEE Computer Society, pp 1155–1161

  27. 27.

    Ruan Y, Zhang P, Alfantoukh L, Durresi A (2017) Measurement theory-based trust. ACM Trans Internet Technol 17(2):16:1–16:24

    Article  Google Scholar 

  28. 28.

    Shi W, Cao J, Zhang Q, Li Y, Xu L (2016) Edge computing: vision and challenges. IEEE Internet Things J 3(5):637–646

    Article  Google Scholar 

  29. 29.

    Shin KG, Ju X, Chen Z, Hu X (2012) Privacy protection for users of location-based services. IEEE Wirel Commun 19(1):30–39

    Article  Google Scholar 

  30. 30.

    Tran TX, Hajisami A, Pandey P, Pompili D (2017) Collaborative mobile edge computing in 5g networks: new paradigms, scenarios, and challenges. IEEE Commun Mag 55(4):54–61

    Article  Google Scholar 

  31. 31.

    Tran TX, Pompili D (2017) Joint task offloading and resource allocation for multi-server mobile-edge computing networks. CoRR. arXiv:1705.00704

  32. 32.

    Tsoukaneri G, Theodorakopoulos G, Leather H, Marina MK (March 2016) On the inference of user paths from anonymized mobility data. In: 2016 IEEE European symposium on security and privacy (EuroS P), pp 199–213

  33. 33.

    Wernke M, Skvortsov P, Dürr F, Rothermel K (2014) A classification of location privacy attacks and approaches. Pers Ubiquitous Comput 18(1):163–175

    Article  Google Scholar 

  34. 34.

    Winick J, Jamin S (2002) Inet-3.0: Internet topology generator. Technical report, Department of Electrical Engineering and Computer Science, University of Michigan

  35. 35.

    Yoshigoe K, Dai W, Abramson M, Jacobs A (2014) Overcoming invasion of privacy in smart home environment with synthetic packet injection. In: 2015 TRON symposium (TRONSHOW), pp 1–7

  36. 36.

    Zhang P, Durresi A (2017) Cloud aided internet mobility for privacy protection. In: IEEE international conference on communications, ICC 2017, Paris, France, May 21–25, 2017, pp 1–6

  37. 37.

    Zhang P, Durresi A, Barolli L (2011) Survey of trust management on various networks. In: International conference on complex, intelligent and software intensive systems, CISIS 2011, June 30–July 2, 2011. Korean Bible University, Seoul, Korea. IEEE Computer Society, pp 219–226

  38. 38.

    Zhang P, Durresi A, Jain R (2013) Cloud aided internet mobility. In: Proceedings of IEEE international conference on communications, ICC 2013, Budapest, Hungary, June 9–13, 2013, pp 3688–3693

  39. 39.

    Zhang P, Durresi M, Durresi A (2018) Mobile privacy protection enhanced with multi-access edge computing. In: Leonard B, Makoto T, Tomoya E, Marek RO, Lidia O, Nadeem J (eds) 32nd IEEE international conference on advanced information networking and applications, AINA 2018, Krakow, Poland, May 16–18, 2018. IEEE Computer Society, pp 724–731

  40. 40.

    Zhang P, Durresi M, Durresi A (2019) Network location privacy protection with multi-access edge computing. In: Leonard B, Makoto T, Fatos X, Tomoya E (eds) Advanced information networking and applications—proceedings of the 33rd international conference on advanced information networking and applications, AINA 2019, Matsue, Japan, March 27-29, 2019, volume 926 of advances in intelligent systems and computing. Springer, pp 1342–1352

  41. 41.

    Zhou W, Jia Y, Peng A, Zhang Y, Liu P (2019) The effect of IoT new features on security and privacy: new threats, existing solutions, and challenges yet to be solved. IEEE Internet Things J 6(2):1606–1616

    Article  Google Scholar 

Download references


This work was partially supported by National Science Foundation under Grant No. 1547411 and National Institute of Food and Agriculture (NIFA) USDA Award 2017-67003-26057.

Author information



Corresponding author

Correspondence to Arjan Durresi.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Zhang, P., Durresi, M. & Durresi, A. Internet network location privacy protection with multi-access edge computing. Computing (2020).

Download citation


  • Internet network privacy
  • Mobility
  • Internet of Things
  • Multi-access edge computing

Mathematics Subject Classification

  • 68P27