Privacy-preserving edge caching: A probabilistic approach
نویسندگان
چکیده
Edge caching (EC) decreases the average access delay of end-users through popular content at edge network, however, it increases leakage probability valuable information such as users preferences. Most existing privacy-preserving approaches focus on adding layers encryption, which confronts network with more challenges energy and computation limitations. We employ a chunk-based joint probabilistic (JPC) approach to mislead an adversary eavesdropping communication inside EC maximizing adversary's error in estimating requested file requesting cache. In JPC, we optimize each cache placement minimize cost while guaranteeing desired privacy then, formulate optimization problem linear programming (LP) problem. Since JPC inherits curse dimensionality, also propose scalable (SPC), reduces number feasible placements by dividing files into non-overlapping subsets. compare SPC against method, referred disjoint (DPC) random dummy-based (RDA). Results obtained extensive numerical evaluations confirm validity analytical approach, superiority over DPC RDA.
منابع مشابه
Preserving Location Privacy in Mobile Edge Computing
The burgeoning technology of Mobile Edge Computing is attracting the traditional LBS and LS to deploy due to its nature characters such as low latency and location awareness. Although this transplant will avoid the location privacy threat from the central cloud provider, there still exists the privacy concerns in the LS of MEC scenario. Location privacy threat arises during the procedure of the...
متن کاملA centralized privacy-preserving framework for online social networks
There are some critical privacy concerns in the current online social networks (OSNs). Users' information is disclosed to different entities that they were not supposed to access. Furthermore, the notion of friendship is inadequate in OSNs since the degree of social relationships between users dynamically changes over the time. Additionally, users may define similar privacy settings for their f...
متن کاملPrivacy-preserving Data Splitting: A Combinatorial Approach
Privacy-preserving data splitting is a technique that aims to protect data privacy by storing different fragments of data in different locations. In this work we give a new combinatorial formulation to the data splitting problem. We see the data splitting problem as a purely combinatorial problem, in which we have to split data attributes into different fragments in a way that satisfies certain...
متن کاملMobile Edge Caching: An Optimal Auction Approach
With the explosive growth of wireless data, the sheer size of the mobile traffic is challenging the capacity of current wireless systems. To tackle this challenge, mobile edge caching has emerged as a promising paradigm recently, in which the service providers (SPs) prefetch some popular contents in advance and cache them locally at the network edge. When requested, those locally cached content...
متن کاملPrivacy Preserving in Social Networks Against Sensitive Edge Disclosure
With the development of emerging social networks, such as Facebook and MySpace, security and privacy threats arising from social network analysis bring a risk of disclosure of confidential knowledge when the social network data is shared or made public. In addition to the current social network anonymity de-identification techniques, we study a situation, such as in business transaction network...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computer Networks
سال: 2023
ISSN: ['1872-7069', '1389-1286']
DOI: https://doi.org/10.1016/j.comnet.2023.109654