PROTECTING LOCATION PRIVACY FOR TASK ALLOCATION IN AD HOC MOBILE CLOUD COMPUTING
ABSTRACT
Mobile cloud computing is an emerging cloud computing paradigm that integrates cloud computing and mobile computing to enable many useful mobile applications. However, the large-scale deployment of mobile cloud computing is hindered by the concerns on possible privacy leakage. In this paper, we investigate the privacy issues in the ad hoc mobile cloud computing, and propose a framework that can protect the location privacy when allocating tasks to mobile devices. Our mechanism is based on differential privacy and geo cast, and allows mobile devices to contribute their resources to the ad hoc mobile cloud without leaking their location information. We develop analytical models and task allocation strategies that balance privacy, utility, and system overhead in an ad hoc mobile cloud. We also conduct extensive experiments based on real-world datasets, and the results show that our framework can protect location privacy for mobile devices while providing effective services with low system overhead.
Index Terms—Mobile cloud computing, location privacy, task allocation, reputation.
EXISTING SYSTEM:
mobile devices such as smart phones and tablets have gained tremendous popularity. These devices are often equipped with a variety of sensors such as camera, microphone, GPS, accelerometer, gyroscope, and compass. The data (e.g., position, speed, temperature, and heart rate) generated by these sensors enable many useful mobile applications, including location-based services, mobile sensing, and mobile crowd sourcing. Although improved largely over the past several years, mobile devices are still resource-constrained mainly due to the limited battery lifetime. On the other hand, cloud computing has widely been regarded as the next-generation computing paradigm which provides “unlimited” cloud resources to end-users in an on-demand fashion. The rich cloud resources in cloud computing can be exploited to increase, enhance, and optimize capabilities of mobile devices, leading to the concept of mobile cloud computing (MCC). According to [6], MCC integrates cloud computing technologies with mobile devices to make the mobile devices more capable in terms of computational power, memory, storage, energy, and context awareness. There are generally two types of mobile clouds in MCC: infrastructure-based and ad hoc. The infrastructure-based mobile cloud consists of stationary computing resources and provides services to the mobile users via the Internet. Alternatively, in the ad hoc mobile cloud, a collection of mobile devices (hereafter referred to as “mobile servers”) performs as cloud resources and provides access to local or Internet-based cloud services to other mobile users (hereafter referred to as “mobile clients”).
PROPOSED SYSTEM:
There are various types of MCC applications with varying system models. In this paper, we consider an emerging MCC system model favored by several recent studies. A unique feature of this system model is that various mobile devices such as smart phones, tablets, and handheld computing devices play the role of servers based on cloud computing principles. Benefits of this system include the proximity of the mobile resources to mobile clients and context-awareness of the mobile resources. In the following, we present the system model, describe the mobile server characteristics in Section, outline our threat model and assumptions in Section and discuss our performance metrics.
CONCLUSION:
In this paper, we have investigated the privacy issues in the ad hoc mobile cloud computing, and have proposed a framework that protects the location privacy of mobile servers when allocating mobile cloud computing tasks. Considering the dynamic and diverse nature of mobile servers, we have designed a new data structure R-PSD and developed an efficient search strategy that finds appropriate R-PSD partitions to ensure high service quality. We have conducted extensive experiments based on realworld datasets to demonstrate the effectiveness of our proposed framework.
REFERENCES:
[1] J. Schiller and A. Voisard, Location-based services. Elsevier, 2004.
[2] M. Spreitzer and M. Theimer, “Providing location information in a ubiquitous computing environment,” Mobile Computing, pp. 397–423,
1996.
[3] T. Choudhury, S. Consolvo, B. Harrison, J. Hightower, A. LaMarca, L. LeGrand, A. Rahimi, A. Rea, G. Bordello, B. Hemingway et al., “The mobile sensing platform: An embedded activity recognition system,” Pervasive Computing, IEEE, vol. 7, no. 2, pp. 32–41, 2008.
[4] S. B. Eisenman, E. Miluzzo, N. D. Lane, R. A. Peterson, G.-S. Ahn, and A. T. Campbell, “Bikenet: A mobile sensing system for cyclist experience mapping,” ACM Transactions on Sensor Networks (TOSN), vol. 6, no. 1, p. 6, 2009.
[5] F. Alt, A. S. Shirazi, A. Schmidt, U. Kramer, and Z. Nawaz, “Locationbased crowdsourcing: extending crowdsourcing to the real world,” in Proceedings of the 6th Nordic Conference on Human-Computer Interac- tion: Extending Boundaries. ACM, 2010, pp. 13–22.
[6] A. R. Khan, M. Othman, S. A. Madani, and S. U. Khan, “A survey of mobile cloud computing application models,” Communications Surveys & Tutorials, IEEE, vol. 16, no. 1, pp. 393–413, 2014.
[7] S. Abolfazli, Z. Sanaei, E. Ahmed, A. Gani, and R. Buyya, “Cloudbased augmentation for mobile devices: motivation, taxonomies, and open challenges,” Communications Surveys & Tutorials, IEEE, vol. 16, no. 1, pp. 337–368, 2014.
[8] N. Fernando, S. W. Loke, and W. Rahayu, “Dynamic mobile cloud computing: Ad hoc and opportunistic job sharing,” in Utility and Cloud Computing (UCC), 2011 Fourth IEEE International Conference on. IEEE, 2011, pp. 281–286.
[9] G. Huerta-Canepa and D. Lee, “A virtual cloud computing provider for mobile devices,” in Proceedings of the 1st ACM Workshop on Mobile Cloud Computing & Services: Social Networks and Beyond. ACM, 2010, p. 6.
[10] E. E. Marinelli, “Hyrax: cloud computing on mobile devices using mapreduce,” Master’s thesis, Carnegie Mellon University, 2009.
[11] I. Krontiris, F. C. Freiling, and T. Dimitriou, “Location privacy in urban sensing networks: research challenges and directions,” Wireless Communications, IEEE, vol. 17, no. 5, pp. 30–35, 2010.
[12] J.W. Brown, O. Ohrimenko, and R. Tamassia, “Haze: Privacy-preserving real-time traffic statistics,” in Proceedings of the 21st ACM SIGSPATIAL International Conference on Advances in Geographic Information Sys- tems. ACM, 2013, pp. 530–533.