Location Privacy Protection in Mobile Wireless Networks Through Hidden Forest and Fog Computing
As we know that the key to personal freedom is mobility and due to which many providers begin to offer location-based services and these services enrich our mobility experiences and with this the purpose of security increases as the location-based service
- PDF / 295,529 Bytes
- 11 Pages / 439.37 x 666.142 pts Page_size
- 93 Downloads / 182 Views
Abstract As we know that the key to personal freedom is mobility and due to which many providers begin to offer location-based services and these services enrich our mobility experiences and with this the purpose of security increases as the locationbased services can easily track the location of the user. Many of the current limitations would inherit several upcoming features as security and privacy issues have not fully been addressed by standardization bodies. Existing methodologies propose some method of protecting location privacy in mobile wireless networks but it has some drawbacks. So in this paper, drawbacks have been resolved as shown in comparative study, and in proposed methodology, two technologies have been used, i.e. hidden forest and fog computing where hidden forest method is used for protecting location privacy in mobile wireless networks and to increase more security, i.e. for 2-layer security, fog computing technology has been used to create illusion and mislead the attacker. To find hidden forest, Chinese remainder theorem (CRT) method has been used and able to protect the location privacy of the mobile wireless networks. And fog computing technology has been used to create false data and illusion so that our actual data will be safe. Fog computing based on its networking edge computes feature where the location-based service and applications are the most popular. For simulation tools, cloud analyst and CloudSim are used. Keywords Hidden forest · CRT · Fog computing · Location-based services · Prime matrix
D. Kumari (B) · K. K. Singh · V. K. Jha Department of Computer Science and Engineering, Birla Institute of Technology Mesra, Ranchi, Jharkhand 835215, India e-mail: [email protected] K. K. Singh e-mail: [email protected] V. K. Jha e-mail: [email protected] © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 V. Nath and J. K. Mandal (eds.), Proceedings of the Fourth International Conference on Microelectronics, Computing and Communication Systems, Lecture Notes in Electrical Engineering 673, https://doi.org/10.1007/978-981-15-5546-6_72
863
864
D. Kumari et al.
1 Introduction As in the recent years, the location-based application and services have been used rapidly in day-to-day life and have brought a lot of convenience in today’s busy life. The location-based services can track the location and can solve several queries of the common man. For the use of location-based applications and services, the mobile users have to send their correct information of their location to service provider. The location service provider’s server is not credible, so the user’s location information will be vulnerable to theft. After hacking the location information of the user, the hacker, via location tracking to other public information (such as geographic database, encoding the phone book), may be able to confirm the user’s identity and gain additional private information. This paper also focuses on 2-layer security to
Data Loading...