期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
A Trajectory Privacy Protection Method to Resist Long-Term Observation Attacks
1
作者 Qixin Zhan 《Journal of Computer and Communications》 2024年第5期53-70,共18页
Users face the threat of trajectory privacy leakage when using location-based service applications, especially when their behavior is collected and stored for a long period of time. This accumulated information is exp... Users face the threat of trajectory privacy leakage when using location-based service applications, especially when their behavior is collected and stored for a long period of time. This accumulated information is exploited by opponents, greatly increasing the risk of trajectory privacy leakage. This attack method is called a long-term observation attack. On the premise of ensuring lower time overhead and higher cache contribution rate, the existing methods cannot utilize cache to answer subsequent queries while also resisting long-term observation attacks. So this article proposes a trajectory privacy protection method to resist long-term observation attacks. This method combines caching technology and improves the existing differential privacy mechanism, while incorporating randomization factors that are difficult for attackers to recognize after long-term observation to enhance privacy. Search for locations in the cache of both the mobile client and edge server that can replace the user’s actual location. If there are replacement users in the cache, the query results can be obtained more quickly. Simultaneously obfuscating the spatiotemporal correlation of actual trajectories by generating confusion regions. If it does not exist, the obfuscated location generation method that resists long-term observation attacks is executed to generate the real anonymous area and send it to the service provider. The above steps can comprehensively protect the user’s trajectory privacy. The experimental results show that this method can protect user trajectories from long-term observation attacks while ensuring low time overhead and a high cache contribution rate. 展开更多
关键词 location Privacy Long-Term Observation Attacks K-ANONYMITY location Caching
下载PDF
A Survey of Edge Caching:Key Issues and Challenges
2
作者 Hanwen Li Mingtao Sun +2 位作者 Fan Xia Xiaolong Xu Muhammad Bilal 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2024年第3期818-842,共25页
With the rapid development of mobile communication technology and intelligent applications,the quantity of mobile devices and data traffic in networks have been growing exponentially,which poses a great burden to netw... With the rapid development of mobile communication technology and intelligent applications,the quantity of mobile devices and data traffic in networks have been growing exponentially,which poses a great burden to networks and brings huge challenge to servicing user demand.Edge caching,which utilizes the storage and computation resources of the edge to bring resources closer to end users,is a promising way to relieve network burden and enhance user experience.In this paper,we aim to survey the edge caching techniques from a comprehensive and systematic perspective.We first present an overview of edge caching,summarizing the three key issues regarding edge caching,i.e.,where,what,and how to cache,and then introducing several significant caching metrics.We then carry out a detailed and in-depth elaboration on these three issues,which correspond to caching locations,caching objects,and caching strategies,respectively.In particular,we innovate on the issue“what to cache”,interpreting it as the classification of the“caching objects”,which can be further classified into content cache,data cache,and service cache.Finally,we discuss several open issues and challenges of edge caching to inspire future investigations in this research area. 展开更多
关键词 edge caching edge computing caching location caching object caching strategy 5G networkarchitecture Internet of Things(IoT)
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部