메뉴 건너뛰기




Volumn 35, Issue 11, 2017, Pages 2625-2636

Location privacy in mobile edge clouds: A chaff-based approach

Author keywords

Chaff service; Location privacy; Mobile edge cloud

Indexed keywords

CLOUD COMPUTING; DATA PRIVACY; DISTRIBUTED COMPUTER SYSTEMS; LOCATION; MAXIMUM LIKELIHOOD; OPTIMIZATION; ROBUSTNESS (CONTROL SYSTEMS); WIRELESS SENSOR NETWORKS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 85031768365     PISSN: 07338716     EISSN: None     Source Type: Journal    
DOI: 10.1109/JSAC.2017.2760179     Document Type: Article
Times cited : (60)

References (31)
  • 2
    • 85018204196 scopus 로고    scopus 로고
    • Anonymous usage of location-based services through spatial and temporal cloaking
    • M. Gruteser and D. Grunwald, "Anonymous usage of location-based services through spatial and temporal cloaking," in Proc. ACM/USENIX MobiSys, 2003, pp. 31-42.
    • (2003) Proc. ACM/USENIX MobiSys , pp. 31-42
    • Gruteser, M.1    Grunwald, D.2
  • 3
    • 34247389249 scopus 로고    scopus 로고
    • A framework for location privacy in wireless networks
    • Y.-C. Hu and H. J. Wang, "A framework for location privacy in wireless networks," in Proc. ACM SIGCOMM Asia Workshop, 2005, pp. 1-8.
    • (2005) Proc. ACM SIGCOMM Asia Workshop , pp. 1-8
    • Hu, Y.-C.1    Wang, H.J.2
  • 4
    • 35449007284 scopus 로고    scopus 로고
    • Preserving location privacy in wireless lans
    • T. Jiang, H. J. Wang, and Y.-C. Hu, "Preserving location privacy in wireless lans," in Proc. ACM/USENIX MobiSys, 2007, pp. 246-257.
    • (2007) Proc. ACM/USENIX MobiSys , pp. 246-257
    • Jiang, T.1    Wang, H.J.2    Hu, Y.-C.3
  • 7
    • 85027530145 scopus 로고    scopus 로고
    • Dynamic service placement for mobile micro-clouds with predicted future costs
    • Apr
    • S. Wang, R. Urgaonkar, T. He, K. Chan, M. Zafer, and K. K. Leung, "Dynamic service placement for mobile micro-clouds with predicted future costs," IEEE Trans. Parallel Distrib. Syst., vol. 28, no. 4, pp. 1002-1016, Apr. 2017.
    • (2017) IEEE Trans. Parallel Distrib. Syst. , vol.28 , Issue.4 , pp. 1002-1016
    • Wang, S.1    Urgaonkar, R.2    He, T.3    Chan, K.4    Zafer, M.5    Leung, K.K.6
  • 9
    • 84885604063 scopus 로고    scopus 로고
    • Follow me cloud: Interworking federated clouds and distributed mobile networks
    • Sep./Oct
    • T. Taleb and A. Ksentini, "Follow me cloud: Interworking federated clouds and distributed mobile networks," IEEE Netw., vol. 27, no. 5, pp. 12-19, Sep./Oct. 2013.
    • (2013) IEEE Netw. , vol.27 , Issue.5 , pp. 12-19
    • Taleb, T.1    Ksentini, A.2
  • 10
    • 84925871178 scopus 로고    scopus 로고
    • An open ecosystem for mobile-cloud convergence
    • Mar
    • M. Satyanarayanan et al., "An open ecosystem for mobile-cloud convergence," IEEE Commun. Mag., vol. 53, no. 3, pp. 63-70, Mar. 2015.
    • (2015) IEEE Commun. Mag. , vol.53 , Issue.3 , pp. 63-70
    • Satyanarayanan, M.1
  • 11
    • 85017618492 scopus 로고    scopus 로고
    • Feb., IBM Corp., Armonk, NY, USA, IBM White Paper WSW14201USEN
    • (Feb. 2013). "Smarter wireless networks," IBM Corp., Armonk, NY, USA, IBM White Paper WSW14201USEN. [Online]. Available: https://www-935.ibm.com/services/multimedia/Smarter-wireless-networks.pdf
    • (2013) Smarter Wireless Networks
  • 12
    • 85010384889 scopus 로고    scopus 로고
    • Apr., Defence Res. Develop. Canada, Contract Rep. DRDC-RDDC-2014-C69
    • A. Magar. (Apr. 2014). "Assessing the use of tactical clouds to enhance warfighter effectiveness," Defence Res. Develop. Canada, Contract Rep. DRDC-RDDC-2014-C69. [Online]. Available: http://cradpdf.drdcrddc.gc.ca/PDFS/unc198/p539325-A1b.pdf
    • (2014) Assessing the Use of Tactical Clouds to Enhance Warfighter Effectiveness
    • Magar, A.1
  • 13
    • 84978680412 scopus 로고    scopus 로고
    • Adaptive VM handoff across cloudlets
    • Tech. Rep. CMU-CS-15-113, Jun.
    • K. Ha et al., "Adaptive VM handoff across cloudlets," School Comput. Sci., Tech. Rep. CMU-CS-15-113, Jun. 2015. [Online]. Available: https://www.cs.cmu.edu/~satya/docdir/CMU-CS-15-113.pdf
    • (2015) School Comput. Sci.
    • Ha, K.1
  • 16
    • 85038924315 scopus 로고    scopus 로고
    • Open edge computing: From vision to reality
    • Berlin, Germany, Tech. Rep., Jun.
    • R. Schuster and P. Ramchandran, "Open edge computing: From vision to reality," OPNFV Des. Summit, Berlin, Germany, Tech. Rep., Jun. 2016.
    • (2016) OPNFV Des. Summit
    • Schuster, R.1    Ramchandran, P.2
  • 17
    • 70450278755 scopus 로고    scopus 로고
    • Hiding stars with fireworks: Location privacy through camouflage
    • Sep.
    • J. Meyerowitz and R. R. Choudhury, "Hiding stars with fireworks: Location privacy through camouflage," in Proc. ACM MobiCom, Sep. 2009, pp. 345-356.
    • (2009) Proc. ACM MobiCom , pp. 345-356
    • Meyerowitz, J.1    Choudhury, R.R.2
  • 18
    • 79952449865 scopus 로고    scopus 로고
    • Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments
    • Apr
    • C.-Y. Chow, M. F. Mokbel, and X. Liu, "Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments," Geoinformatica, vol. 15, no. 2, pp. 351-380, Apr. 2011.
    • (2011) Geoinformatica , vol.15 , Issue.2 , pp. 351-380
    • Chow, C.-Y.1    Mokbel, M.F.2    Liu, X.3
  • 20
    • 84898925546 scopus 로고    scopus 로고
    • Power-aware traffic cover mode to prevent traffic analysis in wireless ad hoc networks
    • Apr.
    • S. Jiang, N. H. Vaidya, and W. Zhao, "Power-aware traffic cover mode to prevent traffic analysis in wireless ad hoc networks," in Proc. IEEE INFOCOM, Apr. 2001, pp. 1-11.
    • (2001) Proc. IEEE INFOCOM , pp. 1-11
    • Jiang, S.1    Vaidya, N.H.2    Zhao, W.3
  • 21
    • 77949574715 scopus 로고    scopus 로고
    • Maximum throughput of clandestine relay
    • Sep.
    • T. He, L. Tong, and A. Swami, "Maximum throughput of clandestine relay," in Proc. Allerton, Sep. 2009, pp. 1082-1089.
    • (2009) Proc. Allerton , pp. 1082-1089
    • He, T.1    Tong, L.2    Swami, A.3
  • 23
    • 84929908535 scopus 로고    scopus 로고
    • Computational decoys for cloud security
    • New York, NY, USA: Springer, Dec.
    • G. Kontaxis, M. Polychronakis, and A. D. Keromytis, "Computational decoys for cloud security," in Secure Cloud Computing. New York, NY, USA: Springer, Dec. 2013, pp. 261-270.
    • (2013) Secure Cloud Computing , pp. 261-270
    • Kontaxis, G.1    Polychronakis, M.2    Keromytis, A.D.3
  • 24
    • 84906996769 scopus 로고    scopus 로고
    • A Markov decision process-based service migration procedure for Follow Me cloud
    • Jun.
    • A. Ksentini, T. Taleb, and M. Chen, "A Markov decision process-based service migration procedure for Follow Me cloud," in Proc. IEEE ICC, Jun. 2014, pp. 1350-1354.
    • (2014) Proc. IEEE ICC , pp. 1350-1354
    • Ksentini, A.1    Taleb, T.2    Chen, M.3
  • 27
    • 85029783445 scopus 로고    scopus 로고
    • Final report from the NSF workshop on future directions in wireless networking
    • Arlington VA, USA, Tech. Rep., Nov.
    • S. Banerjee and D. O. Wu, "Final report from the NSF workshop on future directions in wireless networking," Nat. Sci. Found., Arlington VA, USA, Tech. Rep., Nov. 2013.
    • (2013) Nat. Sci. Found.
    • Banerjee, S.1    Wu, D.O.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.