DOI QR코드

DOI QR Code

Multi-Obfuscation Approach for Preserving Privacy in Smart Transportation

  • Sami S. Albouq (Department of Computer Science, Islamic University of Madinah) ;
  • Adnan Ani Sen (Department of Computer Science, Islamic University of Madinah) ;
  • Nabile Almoshfi (Department of Computer Science, Aljouf University) ;
  • Mohammad Bin Sedeq (Department of Computer Science, Islamic University of Madinah) ;
  • Nour Bahbouth (Department of Computer Science, Islamic University of Madinah)
  • Received : 2023.04.05
  • Published : 2023.04.30

Abstract

These days, protecting location privacy has become essential and really challenging, especially protecting it from smart applications and services that rely on Location-Based Services (LBS). As the technology and the services that are based on it are developed, the capability and the experience of the attackers are increased. Therefore, the traditional protection ways cannot be enough and are unable to fully ensure and preserve privacy. Previously, a hybrid approach to privacy has been introduced. It used an obfuscation technique, called Double-Obfuscation Approach (DOA), to improve the privacy level. However, this approach has some weaknesses. The most important ones are the fog nodes that have been overloaded due to the number of communications. It is also unable to prevent the Tracking and Identification attacks in the Mix-Zone technique. For these reasons, this paper introduces a developed and enhanced approach, called Multi-Obfuscation Approach (MOA that mainly depends on the communication between neighboring fog nodes to overcome the drawbacks of the previous approach. As a result, this will increase the resistance to new kinds of attacks and enhance processing. Meanwhile, this approach will increase the level of the users' privacy and their locations protection. To do so, a big enough memory is needed on the users' sides, which already is available these days on their devices. The simulation and the comparison prove that the new approach (MOA) exceeds the DOA in many Standards for privacy protection approaches.

Keywords

Acknowledgement

This work has been supported by Islamic University of Madina grant Takamul-109. Any opinion, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of supported by the Islamic University in Medina or other research sponsors.

References

  1. S. S. Albouq, A. A. A. Sen, A. Namoun, N. M. Bahbouh, A. B. Alkhodre, and A. Alshanqiti, "A Double Obfuscation Approach for Protecting the Privacy of IoT Location Based Applications," IEEE Access, vol. 8, pp. 129415-129431, 2020, doi: 10.1109/ACCESS.2020.3009200.
  2. X. Jia, Q. Feng, T. Fan, and Q. Lei, "RFID technology and its applications in Internet of Things (IoT)," in 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet), Apr. 2012, pp. 1282-1285. doi: 10.1109/CECNet.2012.6201508.
  3. Kandris, D., Nakas, C., Vomvas, D., & Koulouras, G. (2020). Applications of wireless sensor networks: an up-to-date survey. Applied System Innovation, 3(1), 14.
  4. Y. Chen and Q. Zhao, "On the lifetime of wireless sensor networks," IEEE Commun. Lett., vol. 9, no. 11, pp. 976-978, Nov. 2005, doi: 10.1109/LCOMM.2005.11010.
  5. [C. M. Ramya, M. Shanmugaraj, and R. Prabakaran, "Study on ZigBee technology," in 2011 3rd International Conference on Electronics Computer Technology, Apr. 2011, vol. 6, pp. 297-301. doi: 10.1109/ICECTECH.2011.5942102.
  6. J. Lin, W. Yu, N. Zhang, X. Yang, H. Zhang, and W. Zhao, "A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications," IEEE Internet Things J., vol. 4, no. 5, pp. 1125-1142, Oct. 2017, doi: 10.1109/JIOT.2017.2683200.
  7. T. Dillon, C. Wu, and E. Chang, "Cloud Computing: Issues and Challenges," in 2010 24th IEEE International Conference on Advanced Information Networking and Applications, Apr. 2010, pp. 27-33. doi: 10.1109/AINA.2010.187.
  8. A. Khan, "What is the relationship between Cloud Computing and Service Orientated Architecture (SOA)?," Welcome to Khan's Blog, Jul. 13, 2015.https://arsalankhan.com/2015/07/13/relationship-between-cloud-computing-and-soa/ (accessed Nov. 27, 2021).
  9. "Fog Computing vs. Cloud Computing: Key Differences | SaMSolutions," Sep. 10, 2019. https://www.sam-solutions.com:443/blog/fog-computing-vs-cloud-computing-for-iot-projects/ (accessed Nov. 27, 2021).
  10. A. A. A. Sen and A. M. Basahel, "A Comparative Study between Security and Privacy," in 2019 6th International Conference on Computing for Sustainable Global Development (INDIACom), Mar. 2019, pp. 1282-1286.
  11. C. Bettini, S. Jajodia, and L. Pareschi, "Anonymity and Diversity in LBS: A Preliminary Investigation," in Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07), Mar. 2007, pp. 577-580. doi: 10.1109/PERCOMW.2007.23.
  12. E. Elabd, "Enhanced peer-to-peer anonymity approach for privacy preserving in location-based services," J. Locat. Based Serv., vol. 14, no. 4, pp. 252-267, Oct. 2020, doi: 10.1080/17489725.2020.1844326.
  13. B. Palanisamy and L. Liu, "MobiMix: Protecting location privacy with mix-zones over road networks," in 2011 IEEE 27th International Conference on Data Engineering, Apr. 2011, pp. 494-505. doi: 10.1109/ICDE.2011.5767898.
  14. N. Guo, L. Ma, and T. Gao, "Independent Mix Zone for Location Privacy in Vehicular Networks," IEEE Access, vol. 6, pp. 16842-16850, 2018, doi: 10.1109/ACCESS.2018.2800907.
  15. H. Kido, Y. Yanagisawa, and T. Satoh, "An anonymous communication technique using dummies for location-based services," in ICPS '05. Proceedings. International Conference on Pervasive Services, 2005., Jul. 2005, pp. 88-97. doi: 10.1109/PERSER.2005.1506394.
  16. B. Niu, Q. Li, X. Zhu, G. Cao, and H. Li, "Achieving k-anonymity in privacy-aware location-based services," in IEEE INFOCOM 2014 - IEEE Conference on Computer Communications, Apr. 2014, pp. 754-762. doi: 10.1109/INFOCOM.2014.6848002.
  17. P. Jagwani and S. Kaushik, "Secure Cloaking Area Based on User Profile Similarity," Int. J. Eng. Technol., vol. 8, no. 6, pp. 458-461, 2016, doi: 10.7763/IJET.2016.V8.933.
  18. M. L. Damiani, E. Bertino, and C. Silvestri, "Protecting Location Privacy through Semantics-aware Obfuscation Techniques," in Trust Management II, vol. 263, Y. Karabulut, J. Mitchell, P. Herrmann, and C. D. Jensen, Eds. Boston, MA: Springer US, 2008, pp. 231-245. doi: 10.1007/978-0-387-09428-1_15.
  19. M. Yamin and A. Abi Sen, "Improving Privacy and Security of User Data in Location Based Services," Int. J. Ambient Comput. Intell., vol. 9, pp. 19-42, Jan. 2018, doi: 10.4018/IJACI.2018010102.
  20. A. A. A. Sen, F. B. Eassa, M. Yamin, and K. Jambi, "Double Cache Approach with Wireless Technology for Preserving User Privacy," Wirel. Commun. Mob. Comput., vol. 2018, p. e4607464, Aug. 2018, doi: 10.1155/2018/4607464.
  21. Y. Alsaawy, A. Alkhodre, A. Ahmed, A. Abi Sen, and M. S. Siddiqui, "Swap Obfuscation Technique for Preserving Privacy of LBS," Jun. 2019.Nguyen B Truong, Gyu Myoung Lee, and Yacine Ghamri-Doudane. Software defined networking-based vehicular adhoc network with fog computing. In 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), pages 1202-1207. Ieee, 2015.
  22. Tawalbeh, L. A., Muheidat, F., Tawalbeh, M., & Quwaider, M. (2020). IoT Privacy and security: Challenges and solutions. Applied Sciences, 10(12), 4102. 23
  23. Sen, A., Ahmed, A., Eassa, F. A., Jambi, K., & Yamin, M. (2018). Preserving privacy in internet of things: a survey. International Journal of Information Technology, 10(2), 189- 200. 24 ] ] https://doi.org/10.1007/s41870-018-0113-4
  24. Zaeem, R. N., & Barber, K. S. (2020). The effect of the GDPR on privacy policies: Recent progress and future promise. ACM Transactions on Management Information Systems (TMIS), 12(1), 1-20.