Advertisement

Comparison of Incumbent User Privacy Preserving Technologies in Database Driven Dynamic Spectrum Access Systems

  • He LiEmail author
  • Yaling Yang
  • Yanzhi Dou
  • Chang Lu
  • Doug Zabransky
  • Jung-Min (Jerry) Park
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 261)

Abstract

Database driven dynamic spectrum sharing is one of the most promising dynamic spectrum access (DSA) solution to address the spectrum scarcity issue. In such a database driven DSA system, the centralized spectrum management infrastructure, called spectrum access system (SAS), makes its spectrum allocation decisions to secondary users (SUs) according to sensitive operational data of incumbent users (IUs). Since both SAS and SUs are not necessarily fully trusted, privacy protection against untrusted SAS and SUs become critical for IUs that have high operational privacy requirements. To address this problem, many IU privacy preserving solutions emerge recently. However, there is a lack of understanding and comparison of capability in protecting IU operational privacy under these existing approaches. In this paper, thus, we fill in the void by providing a comparative study that investigates existing solutions and explores several existing metrics to evaluate the strength of privacy protection. Moreover, we propose two general metrics to evaluate privacy preserving level and evaluate existing works with them.

Keywords

Dynamic spectrum access Privacy preserving technology 

Notes

Acknowledgements

This work was partially sponsored by NSF through grants 1547366, 1265886, 1547241, 1563832, and 1642928.

References

  1. 1.
    Andrés, M.E., Bordenabe, N.E., Chatzikokolakis, K., Palamidessi, C.: Geo-indistinguishability: differential privacy for location-based systems. In: CCS 2013, pp. 901–914. ACM, New York (2013)Google Scholar
  2. 2.
    Bahrak, B., Bhattarai, S., Ullah, A., Park, J.M., Reed, J., Gurney, D.: Protecting the primary users’ operational privacy in spectrum sharing. In: 2014 IEEE International Symposium on Dynamic Spectrum Access Networks (DYSPAN), pp. 236–247. IEEE (2014)Google Scholar
  3. 3.
    Clark, M., Psounis, K.: Can the privacy of primary networks in shared spectrum be protected? In: 35th Annual IEEE International Conference on Computer Communications, IEEE INFOCOM 2016, pp. 1–9. IEEE (2016)Google Scholar
  4. 4.
    Clark, M.A., Psounis, K.: Trading utility for privacy in shared spectrum access systems. IEEE/ACM Trans. Network. (TON) 26(1), 259–273 (2018)CrossRefGoogle Scholar
  5. 5.
    Electronic Communication Committee, et al.: Within the European conference of postal and telecommunications administration (CEPT), “the analysis of the coexistence of FWA cells in the 3.4–3.8 GHz band”. Technical report, ECC Report 33 (2003)Google Scholar
  6. 6.
    Dolev, D., Yao, A.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198–208 (1983)MathSciNetCrossRefGoogle Scholar
  7. 7.
    Dou, Y., et al.: Preserving incumbent users’ privacy in exclusion-zone-based spectrum access systems. In: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), pp. 2486–2493. IEEE (2017)Google Scholar
  8. 8.
    Dou, Y., et al.: P\(^2\)-SAS: preserving users’ privacy in centralized dynamic spectrum access systems, pp. 321–330. ACM (2016)Google Scholar
  9. 9.
    The Office of the Federal Register (OFR): The Government Publishing Office: Title 47: Telecommunication, part 96-citizens broadband radio service. http://www.ecfr.gov/cgi-bin/text-idx?node=pt47.5.96&rgn=div5
  10. 10.
    Robert, C.P.: Monte Carlo Methods. Wiley Online Library, Hoboken (2004)CrossRefGoogle Scholar
  11. 11.
    Zhang, L., Fang, C., Li, Y., Zhu, H., Dong, M.: Optimal strategies for defending location inference attack in database-driven CRNs. In: 2015 IEEE International Conference on Communications (ICC), pp. 7640–7645 (2015)Google Scholar
  12. 12.
    Zhang, Z., Zhang, H., He, S., Cheng, P.: Achieving bilateral utility maximization and location privacy preservation in database-driven cognitive radio networks. In: 2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems (MASS), pp. 181–189. IEEE (2015)Google Scholar

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2019

Authors and Affiliations

  • He Li
    • 1
    Email author
  • Yaling Yang
    • 1
  • Yanzhi Dou
    • 1
  • Chang Lu
    • 1
  • Doug Zabransky
    • 1
  • Jung-Min (Jerry) Park
    • 1
  1. 1.Virgina TechBlacksburgUSA

Personalised recommendations