Skip to main content

Preserving Privacy of Smart Cities Based on the Fog Computing

  • Conference paper
  • First Online:
Book cover Smart Societies, Infrastructure, Technologies and Applications (SCITA 2017)

Abstract

The Smart city is a modern day technological concept which uses sensors, advanced communication technologies and data analysis for maximizing operational efficiency of services offered by the government to its citizens. Mobile devices are the backbone of the smart cities. These mobile devices rely heavily on clouds or fog computing to compensate their low processing capabilities. This brings new challenges to security and privacy of the users of mobile devices. In this paper we focused on the idea of utilizing fog computing properties like caching, cooperating between themselves, playing as a broker between users and cloud. We presented three novel approaches for satisfying the required privacy of the mobile devices in smart cities using fog computing. This paper is the preliminary stage of our work in progress. In future we will present this research in a comprehensive manner.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Lu, C.: Overview of security and privacy issues in the internet of things. Washington University (2014)

    Google Scholar 

  2. Kumar, J.S., Patel, D.R.: A survey on internet of things: security and privacy issues. Int. J. Comput. Appl. 90(11) (2014)

    Google Scholar 

  3. Mehmood, R., Alam, F., Albogami, N., Katib, I., Albeshri, A., Altowaijri, S.: UTiLearn: a personalised ubiquitous teaching and learning system for smart societies. IEEE Access 5, 2615–2635 (2017)

    Article  Google Scholar 

  4. Serbanati, A., Medaglia, C.M., Ceipidor, U.B.: Building blocks of the internet of things: state of the art and beyond. INTECH Open Access Publisher (2011)

    Google Scholar 

  5. Ukil, A., Bandyopadhyay, S., Pal, A.: IoT-privacy: to be private or not to be private. In: 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 123–124. IEEE April 2014‏

    Google Scholar 

  6. Schrammel, J., Hochleitner, C., Tscheligi, M.: Privacy, trust and interaction in the internet of things. In: Keyson, D.V., et al. (eds.) AmI 2011. LNCS, vol. 7040, pp. 378–379. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-25167-2_59

    Chapter  Google Scholar 

  7. Cirani, S., Picone, M., Gonizzi, P., Veltri, L., Ferrari, G.: IoT-Oas: an OAuth-based authorization service architecture for secure services in IoT scenarios. IEEE Sens. J. 15(2), 1224–1234 (2015)

    Article  Google Scholar 

  8. Dastjerdi, A.V., Gupta, H., Calheiros, R.N., Ghosh, S.K., Buyya, R.: Fog computing: principles, architectures, and applications. arXiv preprint arXiv:1601.02752‏ (2016)

  9. Roman, R., Lopez, J., Mambo, M.: Mobile edge computing, fog et al.: a survey and analysis of security threats and challenges. Future Comput. Syst. 78, 680–698 (2016)

    Article  Google Scholar 

  10. Hu, P., Ning, H., Qiu, T., Zhang, Y., Luo, X.: Fog computing-based face identification and resolution scheme in internet of things. IEEE Trans. Ind. Inform. 13, 1910–1920 (2016)

    Article  Google Scholar 

  11. Gudymenko, I., Borcea-Pfitzmann, K., Tietze, K.: Privacy implications of the internet of things. In: Wichert, R., Van Laerhoven, K., Gelissen, J. (eds.) AmI 2011. CCIS, vol. 277, pp. 280–286. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-31479-7_48

    Chapter  Google Scholar 

  12. Zhang, K., Ni, J., Yang, K., Liang, X., Ren, J., Shen, X.S.: Security and Privacy in smart city applications: challenges and solutions. IEEE Commun. Mag. 55(1), 122–129 (2017)

    Article  Google Scholar 

  13. Vattapparamban, E., Güvenç, İ., Yurekli, A.İ., Akkaya, K., Uluağaç, S.: Drones for smart cities: issues in cybersecurity, privacy, and public safety. In: 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 216–221. IEEE‏, September 2016

    Google Scholar 

  14. Martínez-Ballesté, A., Pérez-Martínez, P.A., Solanas, A.: The pursuit of citizens’ privacy: a privacy-aware smart city is possible. IEEE Commun. Mag. 51(6), 136–141 (2013)

    Article  Google Scholar 

  15. Mulligan, C.E., Olsson, M.: Architectural implications of smart city business models: an evolutionary perspective. IEEE Commun. Mag. 51(6), 80–85 (2013)

    Article  Google Scholar 

  16. Li, Y., Dai, W., Ming, Z., Qiu, M.: Privacy protection for preventing data over-collection in smart city. IEEE Trans. Comput. 65(5), 1339–1350 (2016)

    Article  MathSciNet  Google Scholar 

  17. Bartoli, A., Hernández-Serrano, J., Soriano, M., Dohler, M., Kountouris, A., Barthel, D.: Security and privacy in your smart city. In: Proceedings of the Barcelona Smart Cities Congress, pp. 1–6, December 2011‏

    Google Scholar 

  18. Srinivasan, R., Mohan, A., Srinivasan, P.: Privacy conscious architecture for improving emergency response in smart cities. In: 2016 Smart City Security and Privacy Workshop (SCSP-W), pp. 1–5. IEEE‏, April 2016

    Google Scholar 

  19. Jin, J., Gubbi, J., Marusic, S., Palaniswami, M.: An information framework for creating a smart city through internet of things. IEEE Internet Things J. 1(2), 112–121 (2014)

    Article  Google Scholar 

  20. Ding, D., Conti, M., Solanas, A.: A smart health application and its related privacy issues. In: 2016 Smart City Security and Privacy Workshop (SCSP-W), pp. 1–5. IEEE, April 2016

    Google Scholar 

  21. Suomalainen, J., Julku, J.: Enhancing privacy of information brokering in smart districts by adaptive pseudonymization. IEEE Access 4, 914–927 (2016)

    Article  Google Scholar 

  22. Kung, A., et al.: A privacy engineering framework for the internet of things. In: Leenes, R., van Brakel, R., Gutwirth, S., De Hert, P. (eds.) Data Protection and Privacy: (In)visibilities and Infrastructures. LGTS, vol. 36, pp. 163–202. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-50796-5_7

    Chapter  Google Scholar 

  23. Weber, R.H.: Internet of things-new security and privacy challenges. Comput. Law Secur. Rev. 26(1), 23–30 (2010)

    Article  Google Scholar 

  24. Bhattasali, T., Chaki, R., Chaki, N.: Study of security issues in pervasive environment of next generation internet of things. In: Saeed, K., Chaki, R., Cortesi, A., Wierzchoń, S. (eds.) CISIM 2013. LNCS, vol. 8104, pp. 206–217. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-40925-7_20

    Chapter  Google Scholar 

  25. Duckham, M., Kulik, L.: A formal model of obfuscation and negotiation for location privacy. In: Gellersen, H.-W., Want, R., Schmidt, A. (eds.) Pervasive 2005. LNCS, vol. 3468, pp. 152–170. Springer, Heidelberg (2005). https://doi.org/10.1007/11428572_10

    Chapter  Google Scholar 

  26. Palanisamy, B., Liu, L.: Mobimix: protecting location privacy with mix-zones over road networks. In: 2011 IEEE 27th International Conference on Data Engineering (ICDE), pp. 494–505. IEEE, April 2011‏

    Google Scholar 

  27. Liu, X., Li, X.: Privacy preserving techniques for location based services in mobile networks. In: 2012 IEEE 26th International Parallel and Distributed Processing Symposium Workshops & Ph.D. Forum (IPDPSW). IEEE (2012)

    Google Scholar 

  28. Domingo-Ferrer, J., Bras-Amorós, M., Wu, Q., Manjón, J.: User-private information retrieval based on a peer-to-peer community. Data Knowl. Eng. 68(11), 1237–1252 (2009)

    Article  Google Scholar 

  29. Kido, H., Yanagisawa, Y., Satoh, T.: An anonymous communication technique using dummies for location-based services. In: Proceedings of International Conference on Pervasive Services, ICPS 2005, pp. 88–97. IEEE, July 2005‏

    Google Scholar 

  30. Niu, B., Li, Q., Zhu, X., Cao, G., Li, H.: Enhancing privacy through caching in location-based services. In: 2015 Conference on Computer Communications (INFOCOM), pp. 1017–1025. IEEE‏, April 2015

    Google Scholar 

  31. Song, D., et al.: A privacy-preserving continuous location monitoring system for location-based services. Int. J. Distrib. Sens. Netw. 2015, 14 (2015)

    Google Scholar 

  32. Saharan, K.P., Kumar, A.: Fog in comparison to cloud: a survey. Int. J. Comput. Appl. 122(3) (2015)

    Google Scholar 

  33. Suryawanshi, R., Mandlik, G.: Focusing on mobile users at edge and internet of things using fog computing. Int. Sci. Eng. Technol. Res. 4(17), 3225–3231 (2015)

    Google Scholar 

  34. Alrahhal, M.S., Ashraf, M.U., Abesen, A., Arif, S.: AES-route server model for location based services in road networks. IJACSA 8(8), 361–368 (2017)

    Google Scholar 

  35. Yamin, M., Abi Sen, A.A.: Improving privacy and security of user data in location based services. Int. J. Ambient Comput. Intell. 9, 19–42 (2017)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Adnan Ahmed Abi Sen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Abi Sen, A.A., Eassa, F.A., Jambi, K. (2018). Preserving Privacy of Smart Cities Based on the Fog Computing. In: Mehmood, R., Bhaduri, B., Katib, I., Chlamtac, I. (eds) Smart Societies, Infrastructure, Technologies and Applications. SCITA 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 224. Springer, Cham. https://doi.org/10.1007/978-3-319-94180-6_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-94180-6_18

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-94179-0

  • Online ISBN: 978-3-319-94180-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics