Double Cache Approach with Wireless Technology for Preserving User Privacy

Several methods use cache for decreasing the number of connections to protect privacy of user data and improve performance in Location Based Services (LBS). Many of these methods require users to trust other users or third parties, which could be servers. An intruder could be disguised as a user or...

Full description

Bibliographic Details
Main Authors: Adnan A. Abi Sen, Fathy B. Eassa, Mohammad Yamin, Kamal Jambi
Format: Article
Language:English
Published: Hindawi-Wiley 2018-01-01
Series:Wireless Communications and Mobile Computing
Online Access:http://dx.doi.org/10.1155/2018/4607464
id doaj-8f73ad7a677e49e882387e11ec4b34e6
record_format Article
spelling doaj-8f73ad7a677e49e882387e11ec4b34e62020-11-25T00:53:35ZengHindawi-WileyWireless Communications and Mobile Computing1530-86691530-86772018-01-01201810.1155/2018/46074644607464Double Cache Approach with Wireless Technology for Preserving User PrivacyAdnan A. Abi Sen0Fathy B. Eassa1Mohammad Yamin2Kamal Jambi3College of Computer Science and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi ArabiaCollege of Computer Science and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi ArabiaDepartment of MIS, Faculty of Economics and Administration, King Abdulaziz University, Jeddah 21589, Saudi ArabiaCollege of Computer Science and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi ArabiaSeveral methods use cache for decreasing the number of connections to protect privacy of user data and improve performance in Location Based Services (LBS). Many of these methods require users to trust other users or third parties, which could be servers. An intruder could be disguised as a user or a third party. In this article, we propose a new method, known as “Double Cache Approach”, which uses a pair of caches to reduce the vulnerability of trust between users or third party and offers a vast improvement in privacy and security of user data in healthcare and other applications that use LBS. This approach divides the area into many cells and manages the cooperation among users within two caches at the access point with wireless communication. To demonstrate the superiority, we also provide simulation results of user queries, comparing the proposed method with those using only one cache. We believe that our approach would solve the trust problem optimally, achieve a comprehensive protection for users’ data, and enhance the privacy and security levels.http://dx.doi.org/10.1155/2018/4607464
collection DOAJ
language English
format Article
sources DOAJ
author Adnan A. Abi Sen
Fathy B. Eassa
Mohammad Yamin
Kamal Jambi
spellingShingle Adnan A. Abi Sen
Fathy B. Eassa
Mohammad Yamin
Kamal Jambi
Double Cache Approach with Wireless Technology for Preserving User Privacy
Wireless Communications and Mobile Computing
author_facet Adnan A. Abi Sen
Fathy B. Eassa
Mohammad Yamin
Kamal Jambi
author_sort Adnan A. Abi Sen
title Double Cache Approach with Wireless Technology for Preserving User Privacy
title_short Double Cache Approach with Wireless Technology for Preserving User Privacy
title_full Double Cache Approach with Wireless Technology for Preserving User Privacy
title_fullStr Double Cache Approach with Wireless Technology for Preserving User Privacy
title_full_unstemmed Double Cache Approach with Wireless Technology for Preserving User Privacy
title_sort double cache approach with wireless technology for preserving user privacy
publisher Hindawi-Wiley
series Wireless Communications and Mobile Computing
issn 1530-8669
1530-8677
publishDate 2018-01-01
description Several methods use cache for decreasing the number of connections to protect privacy of user data and improve performance in Location Based Services (LBS). Many of these methods require users to trust other users or third parties, which could be servers. An intruder could be disguised as a user or a third party. In this article, we propose a new method, known as “Double Cache Approach”, which uses a pair of caches to reduce the vulnerability of trust between users or third party and offers a vast improvement in privacy and security of user data in healthcare and other applications that use LBS. This approach divides the area into many cells and manages the cooperation among users within two caches at the access point with wireless communication. To demonstrate the superiority, we also provide simulation results of user queries, comparing the proposed method with those using only one cache. We believe that our approach would solve the trust problem optimally, achieve a comprehensive protection for users’ data, and enhance the privacy and security levels.
url http://dx.doi.org/10.1155/2018/4607464
work_keys_str_mv AT adnanaabisen doublecacheapproachwithwirelesstechnologyforpreservinguserprivacy
AT fathybeassa doublecacheapproachwithwirelesstechnologyforpreservinguserprivacy
AT mohammadyamin doublecacheapproachwithwirelesstechnologyforpreservinguserprivacy
AT kamaljambi doublecacheapproachwithwirelesstechnologyforpreservinguserprivacy
_version_ 1725237465232441344