1,657 research outputs found

    Efficient Location Privacy In Mobile Applications

    Full text link
    Location awareness is an essential part of today\u27s mobile devices. It is a well-established technology that offers significant benefits to mobile users. While location awareness has triggered the exponential growth of mobile computing, it has also introduced new privacy threats due to frequent location disclosures. Movement patterns could be used to identify individuals and also leak sensitive information about them, such as health condition, lifestyle, political/religious affiliations, etc. In this dissertation we address location privacy in the context of mobile applications. First we look into location privacy in the context of Dynamic Spectrum Access (DSA) technology. DSA is a promising framework for mitigating the spectrum shortage caused by fixed spectrum allocation policies. In particular, DSA allows license-exempt users to access the licensed spectrum bands when not in use by their respective owners. Here, we focus on the database-driven DSA model, where mobile users issue location-based queries to a white-space database in order to identify idle channels in their area. We present a number of efficient protocols that allow users to retrieve channel availability information from the white-space database while maintaining their location secret. In the second part of the dissertation we look into location privacy in the context of location-aware mobile advertising. Location-aware mobile advertising is expanding very rapidly and is forecast to grow much faster than any other industry in the digital era. Unfortunately, with the rise and expansion of online behavioral advertising, consumers have grown very skeptical of the vast amount of data that is extracted and mined from advertisers today. As a result, the consensus has shifted towards stricter privacy requirements. Clearly, there exists an innate conflict between privacy and advertisement, yet existing advertising practices rely heavily on non-disclosure agreements and policy enforcement rather than computational privacy guarantees. In the second half of this dissertation, we present a novel privacy-preserving location-aware mobile advertisement framework that is built with privacy in mind from the ground up. The framework consists of several methods which ease the tension that exists between privacy and advertising by guaranteeing, through cryptographic constructions, that (i) mobile users receive advertisements relative to their location and interests in a privacy-preserving manner, and (ii) the advertisement network can only compute aggregate statistics of ad impressions and click-through-rates. Through extensive experimentation, we show that our methods are efficient in terms of both computational and communication cost, especially at the client side

    Transferring big data across the globe

    Get PDF
    Transmitting data via the Internet is a routine and common task for users today. The amount of data being transmitted by the average user has dramatically increased over the past few years. Transferring a gigabyte of data in an entire day was normal, however users are now transmitting multiple gigabytes in a single hour. With the influx of big data and massive scientific data sets that are measured in tens of petabytes, a user has the propensity to transfer even larger amounts of data. When transferring data sets of this magnitude on public or shared networks, the performance of all workloads in the system will be impacted. This dissertation addresses the issues and challenges inherent with transferring big data over shared networks. A survey of current transfer techniques is provided and these techniques are evaluated in simulated, experimental and live environments. The main contribution of this dissertation is the development of a new, nice model for big data transfers, which is based on a store-and-forward methodology instead of an end-to-end approach. This nice model ensures that big data transfers only occur when there is idle bandwidth that can be repurposed for these large transfers. The nice model improves overall performance and significantly reduces the transmission time for big data transfers. The model allows for efficient transfers regardless of time zone differences or variations in bandwidth between sender and receiver. Nice is the first model that addresses the challenges of transferring big data across the globe

    Mobile edge computing in wireless communication networks: design and optimization

    Get PDF
    This dissertation studies the design and optimization of applying mobile edge computing (MEC) in three kinds of advanced wireless networks, which is motivated by three non-trivial but not thoroughly studied topics in the existing MEC-related literature. First, we study the application of MEC in wireless powered cooperation-assisted systems. The technology of wireless power transfer (WPT) used at the access point (AP) is capable of providing sustainable energy supply for resource-limited user equipment (UEs) to support computation offloading, but also introduces the double-near-far effect into wireless powered communication networks (WPCNs). By leveraging cooperation among near-far users, the system performance can be highly improved through effectively suppressing the double-near-far effect in WPCNs. Then, we consider the application of MEC in the unmanned aerial vehicle (UAV)-assisted relaying systems to make better use of the flexible features of UAV as well as its computing resources. The adopted UAV not only acts as an MEC server to help compute UEs' offloaded tasks but also a relay to forward UEs' offloaded tasks to the AP, thus such kind of cooperation between the UAV and the AP can take the advantages of both sides so as to improve the system performance. Last, heterogeneous cellular networks (HetNets) with the coexistence of MEC and central cloud computing (CCC) are studied to show the complementary and promotional effects between MEC and CCC. The small base stations (SBSs) empowered by edge clouds offer limited edge computing services for UEs, whereas the macro base station (MBS) provides high-performance CCC services for UEs via restricted multiple-input multiple-output (MIMO) backhauls to their associated SBSs. With further considering the case with massive MIMO backhauls, the system performance can be further improved while significantly reducing the computational complexity. In the aforementioned three advanced MEC systems, we mainly focus on minimizing the energy consumption of the systems subject to proper latency constraints, due to the fact that energy consumption and latency are regarded as two important metrics for measuring the performance of MEC-related works. Effective optimization algorithms are proposed to solve the corresponding energy minimization problems, which are further validated by numerical results

    Joint Computation and Communication Cooperation for Mobile Edge Computing

    Full text link
    This paper proposes a novel joint computation and communication cooperation approach in mobile edge computing (MEC) systems, which enables user cooperation in both computation and communication for improving the MEC performance. In particular, we consider a basic three-node MEC system that consists of a user node, a helper node, and an access point (AP) node attached with an MEC server. We focus on the user's latency-constrained computation over a finite block, and develop a four-slot protocol for implementing the joint computation and communication cooperation. Under this setup, we jointly optimize the computation and communication resource allocation at both the user and the helper, so as to minimize their total energy consumption subject to the user's computation latency constraint. We provide the optimal solution to this problem. Numerical results show that the proposed joint cooperation approach significantly improves the computation capacity and the energy efficiency at the user and helper nodes, as compared to other benchmark schemes without such a joint design.Comment: 8 pages, 4 figure

    Thirty Years of Machine Learning: The Road to Pareto-Optimal Wireless Networks

    Full text link
    Future wireless networks have a substantial potential in terms of supporting a broad range of complex compelling applications both in military and civilian fields, where the users are able to enjoy high-rate, low-latency, low-cost and reliable information services. Achieving this ambitious goal requires new radio techniques for adaptive learning and intelligent decision making because of the complex heterogeneous nature of the network structures and wireless services. Machine learning (ML) algorithms have great success in supporting big data analytics, efficient parameter estimation and interactive decision making. Hence, in this article, we review the thirty-year history of ML by elaborating on supervised learning, unsupervised learning, reinforcement learning and deep learning. Furthermore, we investigate their employment in the compelling applications of wireless networks, including heterogeneous networks (HetNets), cognitive radios (CR), Internet of things (IoT), machine to machine networks (M2M), and so on. This article aims for assisting the readers in clarifying the motivation and methodology of the various ML algorithms, so as to invoke them for hitherto unexplored services as well as scenarios of future wireless networks.Comment: 46 pages, 22 fig
    • …
    corecore