Network Location Privacy Protection with Multi-access Edge Computing

  • Ping Zhang
  • Mimoza DurresiEmail author
  • Arjan Durresi
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 926)


Real world incidents show leaking of communication and location privacy can lead to serious consequence. Many research efforts have tried to anonymize individual user from aggregated location data. However, just the communication between the mobile user and their peers could reveal important privacy of the mobile user, such as location history. In this paper, we proposed a scalable system built with Multi-access Edge (MEC) that can hide the mobile user’s network location and traffic from communication peers. This system creates a dynamic distributed proxy network for each mobile user to minimize performance overhead and operation cost.



This work was partially supported by the National Science Foundation under Grant No. 1547411.


  1. 1.
    Ahmed, A., Ahmed, E.: A survey on mobile edge computing. In: 2016 10th International Conference on Intelligent Systems and Control (ISCO), pp. 1–8, January 2016Google Scholar
  2. 2.
    Barolli, L., Honma, Y., Koyama, A., Durresi, A., Arai, J.: A selective border-casting zone routing protocol for ad-hoc networks. In: 2004 Proceedings of the 15th International Workshop on Database and Expert Systems Applications, pp. 326–330 (2004)Google Scholar
  3. 3.
    Beck, M.T., Werner, M., Feld, S., Schimper, T.: Mobile edge computing: a taxonomy (2015)Google Scholar
  4. 4.
    Boutsis, I., Kalogeraki, V.: Location privacy for crowdsourcing applications. In: Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp 2016, pp. 694–705. ACM, New York (2016)Google Scholar
  5. 5.
    Damiani, M.L.: Privacy enhancing techniques for the protection of mobility patterns in LBS: research issues and trends. In: European Data Protection: Coming of Age, pp. 223–239. Springer, Dordrecht (2013)Google Scholar
  6. 6.
    de Montjoye, Y.-A., Hidalgo, C.A., Verleysen, M., Blondel, V.D.: Unique in the crowd: the privacy bounds of human mobility. Sci. Rep. 3 (2013). Article number 1376Google Scholar
  7. 7.
    Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium (2004)Google Scholar
  8. 8.
    Durresi, M., Durresi, A., Barolli, L.: Sensor inter-vehicle communication for safer highways. In: 19th International Conference on Advanced Information Networking and Applications, AINA 2005, vol. 2, pp. 599–604 (2005)Google Scholar
  9. 9.
    ETSI: Multi-access edge computingGoogle Scholar
  10. 10.
    Garvelink, B.: Mobile edge computing: a building block for 5G (2015)Google Scholar
  11. 11.
    Gedik, B., Liu, L.: Protecting location privacy with personalized k-anonymity: architecture and algorithms. IEEE Trans. Mob. Comput. 7(1), 1–18 (2008)CrossRefGoogle Scholar
  12. 12.
    Harold Owens, I.I., Durresi, A.: Video over software-defined networking (VSDN). Comput. Netw. 92, 341–356 (2015)CrossRefGoogle Scholar
  13. 13.
    Laganier, J., Koponen, T., Eggert, L.: Host identity protocol (HIP) registration extension. RFC 5203 (experimental), April 2008Google Scholar
  14. 14.
    Ma, C.Y.T., Yau, D.K.Y., Yip, N.K., Rao, N.S.V.: Privacy vulnerability of published anonymous mobility traces. IEEE/ACM Trans. Netw. 21(3), 720–733 (2013)CrossRefGoogle Scholar
  15. 15.
    Nunna, S., Kousaridas, A., Ibrahim, M., Dillinger, M., Thuemmler, C., Feussner, H., Schneider, A.: Enabling real-time context-aware collaboration through 5G and mobile edge computing. In: 2015 12th International Conference on Information Technology - New Generations, pp. 601–605, April 2015Google Scholar
  16. 16.
    Primault, V., Mokhtar, S.B., Lauradoux, C., Brunie, L.: Differentially private location privacy in practice. CoRR, abs/1410.7744 (2014)Google Scholar
  17. 17.
    Roman, R., Lopez, J., Mambo, M.: Mobile edge computing, fog et al.: a survey and analysis of security threats and challenges. Future Gener. Comput. Syst. 78(Part 2), 680–698 (2018)CrossRefGoogle Scholar
  18. 18.
    Tran, T.X., Hajisami, A., Pandey, P., Pompili, D.: Collaborative mobile edge computing in 5G networks: new paradigms, scenarios, and challenges. IEEE Commun. Mag. 55(4), 54–61 (2017)CrossRefGoogle Scholar
  19. 19.
    Tran, T.X., Pompili, D.: Joint task offloading and resource allocation for multi-server mobile-edge computing networks. CoRR, abs/1705.00704 (2017)Google Scholar
  20. 20.
    Tsoukaneri, G., Theodorakopoulos, G., Leather, H., Marina, M.K.: On the inference of user paths from anonymized mobility data. In: 2016 IEEE European Symposium on Security and Privacy (EuroS&P), pp. 199–213, March 2016Google Scholar
  21. 21.
    Wernke, M., Skvortsov, P., Dürr, F., Rothermel, K.: A classification of location privacy attacks and approaches. Pers. Ubiquit. Comput. 18(1), 163–175 (2014)CrossRefGoogle Scholar
  22. 22.
    Winick, J., Jamin, S.: Inet-3.0: internet topology generator. Technical report, Department of Electrical Engineering and Computer Science, University of Michigan (2002)Google Scholar
  23. 23.
    Xie, W., Goyal, M., Hosseini, H., Martocci, J., Bashir, Y., Baccelli, E., Durresi, A.: Routing loops in DAG-based low power and lossy networks. In: 2010 24th IEEE International Conference on Advanced Information Networking and Applications, pp. 888–895 (2010)Google Scholar
  24. 24.
    Zhang, P., Durresi, A.: Cloud aided internet mobility for privacy protection. In: IEEE International Conference on Communications, ICC 2017, Paris, France, 21–25 May 2017, pp. 1–6 (2017)Google Scholar
  25. 25.
    Zhang, P., Durresi, A., Jain, R.: Cloud aided internet mobility. In: Proceedings of IEEE International Conference on Communications, ICC 2013, Budapest, Hungary, 9–13 June 2013, pp. 3688–3693 (2013)Google Scholar
  26. 26.
    Zhang, P., Durresi, M., Durresi, A.: Mobile privacy protection enhanced with multi-access edge computing. In: 2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA), pp. 724–731 (2018)Google Scholar
  27. 27.
    Zhang, P., Durresi, M., Durresi, A.: Multi-access edge computing aided mobility for privacy protection in internet of things. Computing 1–14 (2018)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Department of Computer and Information ScienceIndiana University Purdue University IndianapolisIndianapolisUSA
  2. 2.Department of Informatics, Mathematics and StatisticsEuropean University of TiranaTiranaAlbania

Personalised recommendations