Double Cache Approach with Wireless Technology for Preserving User Privacy
Several methods use cache for decreasing the number of connections to protect privacy of user data and improve performance in Location Based Services (LBS). Many of these methods require users to trust other users or third parties, which could be servers. An intruder could be disguised as a user or...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-Wiley
2018-01-01
|
Series: | Wireless Communications and Mobile Computing |
Online Access: | http://dx.doi.org/10.1155/2018/4607464 |
id |
doaj-8f73ad7a677e49e882387e11ec4b34e6 |
---|---|
record_format |
Article |
spelling |
doaj-8f73ad7a677e49e882387e11ec4b34e62020-11-25T00:53:35ZengHindawi-WileyWireless Communications and Mobile Computing1530-86691530-86772018-01-01201810.1155/2018/46074644607464Double Cache Approach with Wireless Technology for Preserving User PrivacyAdnan A. Abi Sen0Fathy B. Eassa1Mohammad Yamin2Kamal Jambi3College of Computer Science and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi ArabiaCollege of Computer Science and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi ArabiaDepartment of MIS, Faculty of Economics and Administration, King Abdulaziz University, Jeddah 21589, Saudi ArabiaCollege of Computer Science and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi ArabiaSeveral methods use cache for decreasing the number of connections to protect privacy of user data and improve performance in Location Based Services (LBS). Many of these methods require users to trust other users or third parties, which could be servers. An intruder could be disguised as a user or a third party. In this article, we propose a new method, known as “Double Cache Approach”, which uses a pair of caches to reduce the vulnerability of trust between users or third party and offers a vast improvement in privacy and security of user data in healthcare and other applications that use LBS. This approach divides the area into many cells and manages the cooperation among users within two caches at the access point with wireless communication. To demonstrate the superiority, we also provide simulation results of user queries, comparing the proposed method with those using only one cache. We believe that our approach would solve the trust problem optimally, achieve a comprehensive protection for users’ data, and enhance the privacy and security levels.http://dx.doi.org/10.1155/2018/4607464 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Adnan A. Abi Sen Fathy B. Eassa Mohammad Yamin Kamal Jambi |
spellingShingle |
Adnan A. Abi Sen Fathy B. Eassa Mohammad Yamin Kamal Jambi Double Cache Approach with Wireless Technology for Preserving User Privacy Wireless Communications and Mobile Computing |
author_facet |
Adnan A. Abi Sen Fathy B. Eassa Mohammad Yamin Kamal Jambi |
author_sort |
Adnan A. Abi Sen |
title |
Double Cache Approach with Wireless Technology for Preserving User Privacy |
title_short |
Double Cache Approach with Wireless Technology for Preserving User Privacy |
title_full |
Double Cache Approach with Wireless Technology for Preserving User Privacy |
title_fullStr |
Double Cache Approach with Wireless Technology for Preserving User Privacy |
title_full_unstemmed |
Double Cache Approach with Wireless Technology for Preserving User Privacy |
title_sort |
double cache approach with wireless technology for preserving user privacy |
publisher |
Hindawi-Wiley |
series |
Wireless Communications and Mobile Computing |
issn |
1530-8669 1530-8677 |
publishDate |
2018-01-01 |
description |
Several methods use cache for decreasing the number of connections to protect privacy of user data and improve performance in Location Based Services (LBS). Many of these methods require users to trust other users or third parties, which could be servers. An intruder could be disguised as a user or a third party. In this article, we propose a new method, known as “Double Cache Approach”, which uses a pair of caches to reduce the vulnerability of trust between users or third party and offers a vast improvement in privacy and security of user data in healthcare and other applications that use LBS. This approach divides the area into many cells and manages the cooperation among users within two caches at the access point with wireless communication. To demonstrate the superiority, we also provide simulation results of user queries, comparing the proposed method with those using only one cache. We believe that our approach would solve the trust problem optimally, achieve a comprehensive protection for users’ data, and enhance the privacy and security levels. |
url |
http://dx.doi.org/10.1155/2018/4607464 |
work_keys_str_mv |
AT adnanaabisen doublecacheapproachwithwirelesstechnologyforpreservinguserprivacy AT fathybeassa doublecacheapproachwithwirelesstechnologyforpreservinguserprivacy AT mohammadyamin doublecacheapproachwithwirelesstechnologyforpreservinguserprivacy AT kamaljambi doublecacheapproachwithwirelesstechnologyforpreservinguserprivacy |
_version_ |
1725237465232441344 |