WEKO3
アイテム
{"_buckets": {"deposit": "b9fcf09b-fd63-4943-b702-a63c91013b3c"}, "_deposit": {"created_by": 18, "id": "8899", "owners": [18], "pid": {"revision_id": 0, "type": "depid", "value": "8899"}, "status": "published"}, "_oai": {"id": "oai:muroran-it.repo.nii.ac.jp:00008899", "sets": ["48", "352"]}, "author_link": ["41902", "41900", "41901", "39157", "41899"], "item_1694052902339": {"attribute_name": "会議記述", "attribute_value_mlt": [{"subitem_conference_country": "GBR", "subitem_conference_date": {"subitem_conference_date_language": "en", "subitem_conference_end_day": "12", "subitem_conference_end_month": "6", "subitem_conference_end_year": "2015", "subitem_conference_period": "8-12 June 2015 ", "subitem_conference_start_day": "8", "subitem_conference_start_month": "6", "subitem_conference_start_year": "2015"}, "subitem_conference_names": [{"subitem_conference_name": "2015 IEEE International Conference on Communications (ICC)", "subitem_conference_name_language": "en"}], "subitem_conference_places": [{"subitem_conference_place": "London", "subitem_conference_place_language": "en"}]}]}, "item_82_biblio_info_10": {"attribute_name": "書誌情報", "attribute_value_mlt": [{"bibliographicIssueDates": {"bibliographicIssueDate": "2015", "bibliographicIssueDateType": "Issued"}, "bibliographicPageEnd": "7645", "bibliographicPageStart": "7640", "bibliographic_titles": [{"bibliographic_title": "2015 IEEE International Conference on Communications (ICC)", "bibliographic_titleLang": "en"}]}]}, "item_82_description_23": {"attribute_name": "フォーマット", "attribute_value_mlt": [{"subitem_description": "application/pdf", "subitem_description_type": "Other"}]}, "item_82_description_7": {"attribute_name": "抄録", "attribute_value_mlt": [{"subitem_description": "Database-driven Cognitive Radio Network (CRN) has been proposed to replace the requirement of spectrum sensing of terminal devices so that the operation of users is simplified. However, location privacy issues introduce a big challenge for securing database-driven CRN due to spectrum availability information. The existing works consider either PU or SU\u0027s location privacy while not the both. In this study, we identify a unified attack framework in which a curious user could infer a target\u0027s location based on the spectrum availability/utilization information. Further, we propose a location privacy protection mechanism, which allows both SU and PU to protect their location privacy by adopting a series of countermeasures. The location privacy and spectrum utility are the trade-off. In the countermeasures of location privacy preserving spectrum query process, both SU and database aim to maximize the location privacy with constraints of spectrum utility. Thus, they can obtain higher location privacy level with sacrifice of spectrum utility as long as the spectrum utility meets the requirements. We evaluate the unified attack and defence approaches based on simulation and demonstrate the effectiveness of the proposed location privacy preserving approaches.", "subitem_description_language": "en", "subitem_description_type": "Abstract"}]}, "item_82_description_8": {"attribute_name": "注記", "attribute_value_mlt": [{"subitem_description": "Date of Conference: 8-12 June 2015", "subitem_description_language": "en", "subitem_description_type": "Other"}, {"subitem_description": "Conference Location: London", "subitem_description_language": "en", "subitem_description_type": "Other"}]}, "item_82_link_17": {"attribute_name": "出版者版へのリンク", "attribute_value_mlt": [{"subitem_link_text": "10.1109/ICC.2015.7249548", "subitem_link_url": "http://dx.doi.org/10.1109/ICC.2015.7249548"}]}, "item_82_link_5": {"attribute_name": "室蘭工業大学研究者データベースへのリンク", "attribute_value_mlt": [{"subitem_link_text": "董 冕雄(DONG Mianxiong)", "subitem_link_url": "http://rdsoran.muroran-it.ac.jp/html/100000145_ja.html"}]}, "item_82_link_6": {"attribute_name": "Link to Muroran Inst. Tech. Database of Researchers", "attribute_value_mlt": [{"subitem_link_text": "DONG Mianxiong(董 冕雄)", "subitem_link_url": "http://rdsoran.muroran-it.ac.jp/html/100000145_en.html"}]}, "item_82_publisher_11": {"attribute_name": "出版者", "attribute_value_mlt": [{"subitem_publisher": "IEEE", "subitem_publisher_language": "en"}]}, "item_82_relation_13": {"attribute_name": "ISBN", "attribute_value_mlt": [{"subitem_relation_type_id": {"subitem_relation_type_id_text": "978-1-4673-6432-4", "subitem_relation_type_select": "ISBN"}}]}, "item_82_relation_14": {"attribute_name": "書誌レコードID", "attribute_value_mlt": [{"subitem_relation_type_id": {"subitem_relation_type_id_text": "BB19797532", "subitem_relation_type_select": "NCID"}}]}, "item_82_relation_18": {"attribute_name": "DOI", "attribute_value_mlt": [{"subitem_relation_type": "isVersionOf", "subitem_relation_type_id": {"subitem_relation_type_id_text": "info:doi/10.1109/ICC.2015.7249548", "subitem_relation_type_select": "DOI"}}]}, "item_82_rights_19": {"attribute_name": "権利", "attribute_value_mlt": [{"subitem_rights": "© 2015 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.", "subitem_rights_language": "en"}]}, "item_82_source_id_12": {"attribute_name": "ISSN", "attribute_value_mlt": [{"subitem_source_identifier": "1550-3607", "subitem_source_identifier_type": "PISSN"}]}, "item_82_subject_9": {"attribute_name": "日本十進分類法", "attribute_value_mlt": [{"subitem_subject": "547", "subitem_subject_scheme": "NDC"}]}, "item_82_text_4": {"attribute_name": "著者ID(非表示)", "attribute_value_mlt": [{"subitem_text_value": "1000020728274"}]}, "item_82_version_type_21": {"attribute_name": "著者版フラグ", "attribute_value_mlt": [{"subitem_version_resource": "http://purl.org/coar/version/c_ab4af688f83e57aa", "subitem_version_type": "AM"}]}, "item_access_right": {"attribute_name": "アクセス権", "attribute_value_mlt": [{"subitem_access_right": "open access", "subitem_access_right_uri": "http://purl.org/coar/access_right/c_abf2"}]}, "item_creator": {"attribute_name": "著者", "attribute_type": "creator", "attribute_value_mlt": [{"creatorNames": [{"creatorName": "ZHANG, Long", "creatorNameLang": "en"}], "nameIdentifiers": [{"nameIdentifier": "41899", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "FANG, Chenliaohui", "creatorNameLang": "en"}], "nameIdentifiers": [{"nameIdentifier": "41900", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "LI, Yi", "creatorNameLang": "en"}], "nameIdentifiers": [{"nameIdentifier": "41901", "nameIdentifierScheme": "WEKO"}]}, {"creatorAffiliations": [{"affiliationNameIdentifiers": [], "affiliationNames": [{"affiliationName": "", "affiliationNameLang": "ja"}]}], "creatorNames": [{"creatorName": "ZHU, Haojin", "creatorNameLang": "en"}], "familyNames": [{"familyName": "ZHU", "familyNameLang": "en"}], "givenNames": [{"givenName": "Haojin", "givenNameLang": "en"}], "nameIdentifiers": [{"nameIdentifier": "41902", "nameIdentifierScheme": "WEKO"}]}, {"creatorAffiliations": [{"affiliationNameIdentifiers": [{"affiliationNameIdentifier": "10103", "affiliationNameIdentifierScheme": "kakenhi"}], "affiliationNames": [{"affiliationName": "室蘭工業大学", "affiliationNameLang": "ja"}, {"affiliationName": "Muroran Institute of Technology", "affiliationNameLang": "en"}]}], "creatorNames": [{"creatorName": "DONG, Mianxiong", "creatorNameLang": "en"}, {"creatorName": "トウ, メンユウ", "creatorNameLang": "ja-Kana"}, {"creatorName": "董, 冕雄", "creatorNameLang": "ja"}], "familyNames": [{"familyName": "DONG", "familyNameLang": "en"}, {"familyName": "トウ", "familyNameLang": "ja-Kana"}, {"familyName": "董", "familyNameLang": "ja"}], "givenNames": [{"givenName": " Mianxiong", "givenNameLang": "en"}, {"givenName": "メンユウ", "givenNameLang": "ja-Kana"}, {"givenName": "冕雄", "givenNameLang": "ja"}], "nameIdentifiers": [{"nameIdentifier": "39157", "nameIdentifierScheme": "WEKO"}, {"nameIdentifier": "1000020728274", "nameIdentifierScheme": "NRID", "nameIdentifierURI": "https://nrid.nii.ac.jp/ja/nrid/1000020728274"}]}]}, "item_files": {"attribute_name": "ファイル情報", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_date", "date": [{"dateType": "Available", "dateValue": "2016-05-16"}], "displaytype": "detail", "download_preview_message": "", "file_order": 0, "filename": "IEEE_2015_7640-7645.pdf", "filesize": [{"value": "990.6 kB"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_note", "mimetype": "application/pdf", "size": 990600.0, "url": {"label": "IEEE_2015_7640-7645", "objectType": "fulltext", "url": "https://muroran-it.repo.nii.ac.jp/record/8899/files/IEEE_2015_7640-7645.pdf"}, "version_id": "8ece1fd4-5a5d-418f-8492-998bcccc8f33"}]}, "item_language": {"attribute_name": "言語", "attribute_value_mlt": [{"subitem_language": "eng"}]}, "item_resource_type": {"attribute_name": "資源タイプ", "attribute_value_mlt": [{"resourcetype": "conference paper", "resourceuri": "http://purl.org/coar/resource_type/c_5794"}]}, "item_title": "Optimal Strategies for Defending Location Inference Attack in Database-driven CRNs", "item_titles": {"attribute_name": "タイトル", "attribute_value_mlt": [{"subitem_title": "Optimal Strategies for Defending Location Inference Attack in Database-driven CRNs", "subitem_title_language": "en"}]}, "item_type_id": "82", "owner": "18", "path": ["48", "352"], "permalink_uri": "http://hdl.handle.net/10258/00008889", "pubdate": {"attribute_name": "PubDate", "attribute_value": "2016-05-16"}, "publish_date": "2016-05-16", "publish_status": "0", "recid": "8899", "relation": {}, "relation_version_is_last": true, "title": ["Optimal Strategies for Defending Location Inference Attack in Database-driven CRNs"], "weko_shared_id": -1}
Optimal Strategies for Defending Location Inference Attack in Database-driven CRNs
http://hdl.handle.net/10258/00008889
http://hdl.handle.net/10258/00008889fca3d16e-77af-4c5a-8d5f-6bbf05d8cd7a
名前 / ファイル | ライセンス | アクション |
---|---|---|
IEEE_2015_7640-7645 (990.6 kB)
|
|
Item type | 会議発表論文 / Conference Paper(1) | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
公開日 | 2016-05-16 | |||||||||||
タイトル | ||||||||||||
言語 | en | |||||||||||
タイトル | Optimal Strategies for Defending Location Inference Attack in Database-driven CRNs | |||||||||||
言語 | ||||||||||||
言語 | eng | |||||||||||
資源タイプ | ||||||||||||
資源タイプ識別子 | http://purl.org/coar/resource_type/c_5794 | |||||||||||
資源タイプ | conference paper | |||||||||||
アクセス権 | ||||||||||||
アクセス権 | open access | |||||||||||
アクセス権URI | http://purl.org/coar/access_right/c_abf2 | |||||||||||
著者 |
ZHANG, Long
× ZHANG, Long× FANG, Chenliaohui× LI, Yi× ZHU, Haojin× 董, 冕雄
WEKO
39157
|
|||||||||||
室蘭工業大学研究者データベースへのリンク | ||||||||||||
董 冕雄(DONG Mianxiong) | ||||||||||||
http://rdsoran.muroran-it.ac.jp/html/100000145_ja.html | ||||||||||||
抄録 | ||||||||||||
内容記述タイプ | Abstract | |||||||||||
内容記述 | Database-driven Cognitive Radio Network (CRN) has been proposed to replace the requirement of spectrum sensing of terminal devices so that the operation of users is simplified. However, location privacy issues introduce a big challenge for securing database-driven CRN due to spectrum availability information. The existing works consider either PU or SU's location privacy while not the both. In this study, we identify a unified attack framework in which a curious user could infer a target's location based on the spectrum availability/utilization information. Further, we propose a location privacy protection mechanism, which allows both SU and PU to protect their location privacy by adopting a series of countermeasures. The location privacy and spectrum utility are the trade-off. In the countermeasures of location privacy preserving spectrum query process, both SU and database aim to maximize the location privacy with constraints of spectrum utility. Thus, they can obtain higher location privacy level with sacrifice of spectrum utility as long as the spectrum utility meets the requirements. We evaluate the unified attack and defence approaches based on simulation and demonstrate the effectiveness of the proposed location privacy preserving approaches. | |||||||||||
言語 | en | |||||||||||
書誌情報 |
en : 2015 IEEE International Conference on Communications (ICC) p. 7640-7645, 発行日 2015 |
|||||||||||
会議記述 | ||||||||||||
会議名 | 2015 IEEE International Conference on Communications (ICC) | |||||||||||
言語 | en | |||||||||||
開始年 | 2015 | |||||||||||
開始月 | 6 | |||||||||||
開始日 | 8 | |||||||||||
終了年 | 2015 | |||||||||||
終了月 | 6 | |||||||||||
終了日 | 12 | |||||||||||
開催期間 | 8-12 June 2015 | |||||||||||
言語 | en | |||||||||||
開催地 | London | |||||||||||
言語 | en | |||||||||||
開催国 | GBR | |||||||||||
注記 | ||||||||||||
内容記述タイプ | Other | |||||||||||
内容記述 | Date of Conference: 8-12 June 2015 | |||||||||||
言語 | en | |||||||||||
注記 | ||||||||||||
内容記述タイプ | Other | |||||||||||
内容記述 | Conference Location: London | |||||||||||
言語 | en | |||||||||||
出版者 | ||||||||||||
言語 | en | |||||||||||
出版者 | IEEE | |||||||||||
出版者版へのリンク | ||||||||||||
10.1109/ICC.2015.7249548 | ||||||||||||
http://dx.doi.org/10.1109/ICC.2015.7249548 | ||||||||||||
DOI | ||||||||||||
関連タイプ | isVersionOf | |||||||||||
識別子タイプ | DOI | |||||||||||
関連識別子 | info:doi/10.1109/ICC.2015.7249548 | |||||||||||
日本十進分類法 | ||||||||||||
主題Scheme | NDC | |||||||||||
主題 | 547 | |||||||||||
ISSN | ||||||||||||
収録物識別子タイプ | PISSN | |||||||||||
収録物識別子 | 1550-3607 | |||||||||||
ISBN | ||||||||||||
識別子タイプ | ISBN | |||||||||||
関連識別子 | 978-1-4673-6432-4 | |||||||||||
書誌レコードID | ||||||||||||
識別子タイプ | NCID | |||||||||||
関連識別子 | BB19797532 | |||||||||||
権利 | ||||||||||||
言語 | en | |||||||||||
権利情報 | © 2015 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. | |||||||||||
著者版フラグ | ||||||||||||
出版タイプ | AM | |||||||||||
出版タイプResource | http://purl.org/coar/version/c_ab4af688f83e57aa | |||||||||||
フォーマット | ||||||||||||
内容記述タイプ | Other | |||||||||||
内容記述 | application/pdf |