4.6 Article

P-3: Privacy-Preserving Scheme Against Poisoning Attacks in Mobile-Edge Computing

期刊

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TCSS.2019.2960824

关键词

Feature learning; location privacy; mobile-edge computing (MEC); poisoning attacks; social relationship

资金

  1. National Natural Science Foundation of China [61902060, 61801106, 61671216, 61977064, 61871436]
  2. Shanghai Sailing Program [19YF1402100]
  3. Chenguang Program - Shanghai Education Development Foundation
  4. Chenguang Program - Shanghai Municipal Education Commission
  5. Fundamental Research Funds for the Central Universities [2232019D3-51]
  6. Initial Research Funds for Young Teachers of Donghua University
  7. Shanghai Rising-Star Program [19QA1400300]

向作者/读者索取更多资源

Mobile-edge computing (MEC) has emerged to enable users to offload their location data into the MEC server, and at the same time, the MEC server executes the location-aware data processing to compute the statistical results about these collected locations. However, malicious users may deliberately generate poisoning locations and send these poisoning locations to the MEC server, aiming to poison the statistical results learned by the MEC server and even the other users' location privacy. Existing work concerning privacy preservation in MEC has not studied such poisoning attacks in MEC. Another line of somehow related work focused on poisoning attacks in a different scenario-adversarial machine learning. However, MEC exhibits different features with the machine learning settings, and thus, the privacy preservation against poisoning attacks in MEC faces significantly new challenges. To address the problem, we propose the privacy-preserving scheme, i.e., privacy-preserving scheme against poisoning (P-3), that utilizes the feature learning model to infer the social relationships among users from their location data and then constructs the inferred social graph. Thereafter, it searches the optimal map between the inferred social graph and the social graph from social networks to identify the poisoning locations. Experiments on two real-world data sets, two baseline works, and two kinds of poisoning attacks have demonstrated the privacy preservation against the poisoning attacks in MEC P-3 provides.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据