{"created":"2023-06-19T10:29:11.071145+00:00","id":8899,"links":{},"metadata":{"_buckets":{"deposit":"b9fcf09b-fd63-4943-b702-a63c91013b3c"},"_deposit":{"created_by":18,"id":"8899","owners":[18],"pid":{"revision_id":0,"type":"depid","value":"8899"},"status":"published"},"_oai":{"id":"oai:muroran-it.repo.nii.ac.jp:00008899","sets":["216:352","48"]},"author_link":["41902","41900","41901","39157","41899"],"item_1694052902339":{"attribute_name":"会議記述","attribute_value_mlt":[{"subitem_conference_country":"GBR","subitem_conference_date":{"subitem_conference_date_language":"en","subitem_conference_end_day":"12","subitem_conference_end_month":"6","subitem_conference_end_year":"2015","subitem_conference_period":"8-12 June 2015 ","subitem_conference_start_day":"8","subitem_conference_start_month":"6","subitem_conference_start_year":"2015"},"subitem_conference_names":[{"subitem_conference_name":"2015 IEEE International Conference on Communications (ICC)","subitem_conference_name_language":"en"}],"subitem_conference_places":[{"subitem_conference_place":"London","subitem_conference_place_language":"en"}]}]},"item_82_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2015","bibliographicIssueDateType":"Issued"},"bibliographicPageEnd":"7645","bibliographicPageStart":"7640","bibliographic_titles":[{"bibliographic_title":"2015 IEEE International Conference on Communications (ICC)","bibliographic_titleLang":"en"}]}]},"item_82_description_23":{"attribute_name":"フォーマット","attribute_value_mlt":[{"subitem_description":"application/pdf","subitem_description_type":"Other"}]},"item_82_description_7":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"Database-driven Cognitive Radio Network (CRN) has been proposed to replace the requirement of spectrum sensing of terminal devices so that the operation of users is simplified. However, location privacy issues introduce a big challenge for securing database-driven CRN due to spectrum availability information. The existing works consider either PU or SU's location privacy while not the both. In this study, we identify a unified attack framework in which a curious user could infer a target's location based on the spectrum availability/utilization information. Further, we propose a location privacy protection mechanism, which allows both SU and PU to protect their location privacy by adopting a series of countermeasures. The location privacy and spectrum utility are the trade-off. In the countermeasures of location privacy preserving spectrum query process, both SU and database aim to maximize the location privacy with constraints of spectrum utility. Thus, they can obtain higher location privacy level with sacrifice of spectrum utility as long as the spectrum utility meets the requirements. We evaluate the unified attack and defence approaches based on simulation and demonstrate the effectiveness of the proposed location privacy preserving approaches.","subitem_description_language":"en","subitem_description_type":"Abstract"}]},"item_82_description_8":{"attribute_name":"注記","attribute_value_mlt":[{"subitem_description":"Date of Conference: 8-12 June 2015","subitem_description_language":"en","subitem_description_type":"Other"},{"subitem_description":"Conference Location: London","subitem_description_language":"en","subitem_description_type":"Other"}]},"item_82_link_17":{"attribute_name":"出版者版へのリンク","attribute_value_mlt":[{"subitem_link_text":"10.1109/ICC.2015.7249548","subitem_link_url":"http://dx.doi.org/10.1109/ICC.2015.7249548"}]},"item_82_link_5":{"attribute_name":"室蘭工業大学研究者データベースへのリンク","attribute_value_mlt":[{"subitem_link_text":"董 冕雄(DONG Mianxiong)","subitem_link_url":"http://rdsoran.muroran-it.ac.jp/html/100000145_ja.html"}]},"item_82_publisher_11":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"IEEE","subitem_publisher_language":"en"}]},"item_82_relation_13":{"attribute_name":"ISBN","attribute_value_mlt":[{"subitem_relation_type_id":{"subitem_relation_type_id_text":"978-1-4673-6432-4","subitem_relation_type_select":"ISBN"}}]},"item_82_relation_14":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_relation_type_id":{"subitem_relation_type_id_text":"BB19797532","subitem_relation_type_select":"NCID"}}]},"item_82_relation_18":{"attribute_name":"DOI","attribute_value_mlt":[{"subitem_relation_type":"isVersionOf","subitem_relation_type_id":{"subitem_relation_type_id_text":"info:doi/10.1109/ICC.2015.7249548","subitem_relation_type_select":"DOI"}}]},"item_82_rights_19":{"attribute_name":"権利","attribute_value_mlt":[{"subitem_rights":"© 2015 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.","subitem_rights_language":"en"}]},"item_82_source_id_12":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"1550-3607","subitem_source_identifier_type":"PISSN"}]},"item_82_subject_9":{"attribute_name":"日本十進分類法","attribute_value_mlt":[{"subitem_subject":"547","subitem_subject_scheme":"NDC"}]},"item_82_version_type_21":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_ab4af688f83e57aa","subitem_version_type":"AM"}]},"item_access_right":{"attribute_name":"アクセス権","attribute_value_mlt":[{"subitem_access_right":"open access","subitem_access_right_uri":"http://purl.org/coar/access_right/c_abf2"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"ZHANG, Long","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"FANG, Chenliaohui","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"LI, Yi","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[],"affiliationNames":[{"affiliationName":""}]}],"creatorNames":[{"creatorName":"ZHU, Haojin","creatorNameLang":"en"}],"familyNames":[{}],"givenNames":[{}],"nameIdentifiers":[{}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[{}],"affiliationNames":[{},{}]}],"creatorNames":[{"creatorName":"DONG, Mianxiong","creatorNameLang":"en"},{"creatorName":"トウ, メンユウ","creatorNameLang":"ja-Kana"},{"creatorName":"董, 冕雄","creatorNameLang":"ja"}],"familyNames":[{},{},{}],"givenNames":[{},{},{}],"nameIdentifiers":[{},{}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2016-05-16"}],"displaytype":"detail","filename":"IEEE_2015_7640-7645.pdf","filesize":[{"value":"990.6 kB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"IEEE_2015_7640-7645","objectType":"fulltext","url":"https://muroran-it.repo.nii.ac.jp/record/8899/files/IEEE_2015_7640-7645.pdf"},"version_id":"8ece1fd4-5a5d-418f-8492-998bcccc8f33"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"conference paper","resourceuri":"http://purl.org/coar/resource_type/c_5794"}]},"item_title":"Optimal Strategies for Defending Location Inference Attack in Database-driven CRNs","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Optimal Strategies for Defending Location Inference Attack in Database-driven CRNs","subitem_title_language":"en"}]},"item_type_id":"82","owner":"18","path":["48","352"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2016-05-16"},"publish_date":"2016-05-16","publish_status":"0","recid":"8899","relation_version_is_last":true,"title":["Optimal Strategies for Defending Location Inference Attack in Database-driven CRNs"],"weko_creator_id":"18","weko_shared_id":-1},"updated":"2023-12-26T07:27:26.624940+00:00"}