Skip to main content

2019 | OriginalPaper | Buchkapitel

Comparison of Incumbent User Privacy Preserving Technologies in Database Driven Dynamic Spectrum Access Systems

verfasst von : He Li, Yaling Yang, Yanzhi Dou, Chang Lu, Doug Zabransky, Jung-Min (Jerry) Park

Erschienen in: Cognitive Radio Oriented Wireless Networks

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Database driven dynamic spectrum sharing is one of the most promising dynamic spectrum access (DSA) solution to address the spectrum scarcity issue. In such a database driven DSA system, the centralized spectrum management infrastructure, called spectrum access system (SAS), makes its spectrum allocation decisions to secondary users (SUs) according to sensitive operational data of incumbent users (IUs). Since both SAS and SUs are not necessarily fully trusted, privacy protection against untrusted SAS and SUs become critical for IUs that have high operational privacy requirements. To address this problem, many IU privacy preserving solutions emerge recently. However, there is a lack of understanding and comparison of capability in protecting IU operational privacy under these existing approaches. In this paper, thus, we fill in the void by providing a comparative study that investigates existing solutions and explores several existing metrics to evaluate the strength of privacy protection. Moreover, we propose two general metrics to evaluate privacy preserving level and evaluate existing works with them.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
There are three equivalent definitions proposed in [1], and in this paper we show the third one.
 
Literatur
1.
Zurück zum Zitat Andrés, M.E., Bordenabe, N.E., Chatzikokolakis, K., Palamidessi, C.: Geo-indistinguishability: differential privacy for location-based systems. In: CCS 2013, pp. 901–914. ACM, New York (2013) Andrés, M.E., Bordenabe, N.E., Chatzikokolakis, K., Palamidessi, C.: Geo-indistinguishability: differential privacy for location-based systems. In: CCS 2013, pp. 901–914. ACM, New York (2013)
2.
Zurück zum Zitat Bahrak, B., Bhattarai, S., Ullah, A., Park, J.M., Reed, J., Gurney, D.: Protecting the primary users’ operational privacy in spectrum sharing. In: 2014 IEEE International Symposium on Dynamic Spectrum Access Networks (DYSPAN), pp. 236–247. IEEE (2014) Bahrak, B., Bhattarai, S., Ullah, A., Park, J.M., Reed, J., Gurney, D.: Protecting the primary users’ operational privacy in spectrum sharing. In: 2014 IEEE International Symposium on Dynamic Spectrum Access Networks (DYSPAN), pp. 236–247. IEEE (2014)
3.
Zurück zum Zitat Clark, M., Psounis, K.: Can the privacy of primary networks in shared spectrum be protected? In: 35th Annual IEEE International Conference on Computer Communications, IEEE INFOCOM 2016, pp. 1–9. IEEE (2016) Clark, M., Psounis, K.: Can the privacy of primary networks in shared spectrum be protected? In: 35th Annual IEEE International Conference on Computer Communications, IEEE INFOCOM 2016, pp. 1–9. IEEE (2016)
4.
Zurück zum Zitat Clark, M.A., Psounis, K.: Trading utility for privacy in shared spectrum access systems. IEEE/ACM Trans. Network. (TON) 26(1), 259–273 (2018)CrossRef Clark, M.A., Psounis, K.: Trading utility for privacy in shared spectrum access systems. IEEE/ACM Trans. Network. (TON) 26(1), 259–273 (2018)CrossRef
5.
Zurück zum Zitat Electronic Communication Committee, et al.: Within the European conference of postal and telecommunications administration (CEPT), “the analysis of the coexistence of FWA cells in the 3.4–3.8 GHz band”. Technical report, ECC Report 33 (2003) Electronic Communication Committee, et al.: Within the European conference of postal and telecommunications administration (CEPT), “the analysis of the coexistence of FWA cells in the 3.4–3.8 GHz band”. Technical report, ECC Report 33 (2003)
6.
7.
Zurück zum Zitat Dou, Y., et al.: Preserving incumbent users’ privacy in exclusion-zone-based spectrum access systems. In: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), pp. 2486–2493. IEEE (2017) Dou, Y., et al.: Preserving incumbent users’ privacy in exclusion-zone-based spectrum access systems. In: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), pp. 2486–2493. IEEE (2017)
8.
Zurück zum Zitat Dou, Y., et al.: P\(^2\)-SAS: preserving users’ privacy in centralized dynamic spectrum access systems, pp. 321–330. ACM (2016) Dou, Y., et al.: P\(^2\)-SAS: preserving users’ privacy in centralized dynamic spectrum access systems, pp. 321–330. ACM (2016)
10.
Zurück zum Zitat Robert, C.P.: Monte Carlo Methods. Wiley Online Library, Hoboken (2004)CrossRef Robert, C.P.: Monte Carlo Methods. Wiley Online Library, Hoboken (2004)CrossRef
11.
Zurück zum Zitat Zhang, L., Fang, C., Li, Y., Zhu, H., Dong, M.: Optimal strategies for defending location inference attack in database-driven CRNs. In: 2015 IEEE International Conference on Communications (ICC), pp. 7640–7645 (2015) Zhang, L., Fang, C., Li, Y., Zhu, H., Dong, M.: Optimal strategies for defending location inference attack in database-driven CRNs. In: 2015 IEEE International Conference on Communications (ICC), pp. 7640–7645 (2015)
12.
Zurück zum Zitat Zhang, Z., Zhang, H., He, S., Cheng, P.: Achieving bilateral utility maximization and location privacy preservation in database-driven cognitive radio networks. In: 2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems (MASS), pp. 181–189. IEEE (2015) Zhang, Z., Zhang, H., He, S., Cheng, P.: Achieving bilateral utility maximization and location privacy preservation in database-driven cognitive radio networks. In: 2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems (MASS), pp. 181–189. IEEE (2015)
Metadaten
Titel
Comparison of Incumbent User Privacy Preserving Technologies in Database Driven Dynamic Spectrum Access Systems
verfasst von
He Li
Yaling Yang
Yanzhi Dou
Chang Lu
Doug Zabransky
Jung-Min (Jerry) Park
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-05490-8_6