scispace - formally typeset
Journal ArticleDOI

Enforcing Position-Based Confidentiality With Machine Learning Paradigm Through Mobile Edge Computing in Real-Time Industrial Informatics

Reads0
Chats0
TLDR
A method for conserving position confidentiality of roaming PBSs users using machine learning techniques is proposed and it is confirmed that the proposed method achieved above 90% of the position confidentiality in PBSs.
Abstract
Position-based services (PBSs) that deliver networked amenities based on roaming user's positions have become progressively popular with the propagation of smart mobile devices. Position is one of the important circumstances in PBSs. For effective PBSs, extraction and recognition of meaningful positions and estimating the subsequent position are fundamental procedures. Several researchers and practitioners have tried to recognize and predict positions using various techniques; however, only few deliberate the progress of position-based real-time applications considering significant tasks of PBSs. In this paper, a method for conserving position confidentiality of roaming PBSs users using machine learning techniques is proposed. We recommend a three-phase procedure for roaming PBS users. It identifies user position by merging decision trees and k-nearest neighbor and estimates user destination along with the position track sequence using hidden Markov models. Moreover, a mobile edge computing service policy is followed in the proposed paradigm, which will ensure the timely delivery of PBSs. The benefits of mobile edge service policy offer position confidentiality and low latency by means of networking and computing services at the vicinity of roaming users. Thorough experiments are conducted, and it is confirmed that the proposed method achieved above 90% of the position confidentiality in PBSs.

read more

Citations
More filters
Journal ArticleDOI

Blockchain and Federated Learning for Privacy-Preserved Data Sharing in Industrial IoT

TL;DR: This article designs a blockchain empowered secure data sharing architecture for distributed multiple parties, and incorporates privacy-preserved federated learning in the consensus process of permissioned blockchain, so that the computing work for consensus can also be used for federated training.
Journal ArticleDOI

A survey on the computation offloading approaches in mobile edge computing: A machine learning-based perspective

TL;DR: A review on the ML-based computation offloading mechanisms in the MEC environment in the form of a classical taxonomy to identify the contemporary mechanisms on this crucial topic and to offer open issues as well.
Journal ArticleDOI

A Survey on the Computation Offloading Approaches in Mobile Edge/Cloud Computing Environment: A Stochastic-based Perspective

TL;DR: A survey paper concerning the stochastic-based offloading approaches in various computation environments such as Mobile Cloud Computing, Mobile Edge Computing, and Fog Computing in which to identify new mechanisms, a classical taxonomy is presented.
Journal ArticleDOI

Blockchain-Enabled Distributed Security Framework for Next-Generation IoT: An Edge Cloud and Software-Defined Network-Integrated Approach

TL;DR: The results obtained show that the proposed security framework can efficiently and effectively meet the data confidentiality challenges introduced by the integration of blockchain, edge cloud, and SDN paradigm.
Journal ArticleDOI

Intelligent edge computing based on machine learning for smart city

TL;DR: This research proposes a method to conduct calculations in a collaborative way to alleviate the huge computing pressure caused by the single mobile edge server computing mode as the amount of data increases.
References
More filters
Journal ArticleDOI

Hybrid Method for Minimizing Service Delay in Edge Cloud Computing Through VM Migration and Transmission Power Control

TL;DR: This paper presents a method for minimizing Service Delay in a scenario with two cloudlet servers, which has a dual focus on computation and communication elements, controlling Processing Delay through virtual machine migration and improving Transmission Delay with Transmission Power Control.
Journal ArticleDOI

Serving at the Edge: A Scalable IoT Architecture Based on Transparent Computing

TL;DR: This article first proposes a transparent computing based IoT architecture, and clearly identifies its advantages and associated challenges, and presents a case study to clearly show how to build scalable lightweight wearables with the proposed architecture.
Book ChapterDOI

Learning and recognizing the places we go

TL;DR: An algorithm is introduced that uses WiFi and GSM radio fingerprints collected by someone's personal mobile device to automatically learn the places they go and then detect when they return to those places, and is over 90% accurate in learning and recognizing places.
Journal ArticleDOI

Technical Privacy Metrics: A Systematic Survey

TL;DR: A survey of privacy metrics can be found in this article, where the authors discuss a selection of over 80 privacy metrics and introduce categorizations based on the aspect of privacy they measure, their required inputs, and the type of data that needs protection.
Journal ArticleDOI

Container-as-a-Service at the Edge: Trade-off between Energy Efficiency and Service Availability at Fog Nano Data Centers

TL;DR: A novel architecture for task selection and scheduling at the edge of the network using container-as-a-service (CoaaS) is presented and a multi-objective function is developed in order to reduce the energy consumption and makespan by considering different constraints such as memory, CPU, and the user's budget.
Related Papers (5)