Abstract

Several methods use cache for decreasing the number of connections to protect privacy of user data and improve performance in Location Based Services (LBS). Many of these methods require users to trust other users or third parties, which could be servers. An intruder could be disguised as a user or a third party. In this article, we propose a new method, known as “Double Cache Approach”, which uses a pair of caches to reduce the vulnerability of trust between users or third party and offers a vast improvement in privacy and security of user data in healthcare and other applications that use LBS. This approach divides the area into many cells and manages the cooperation among users within two caches at the access point with wireless communication. To demonstrate the superiority, we also provide simulation results of user queries, comparing the proposed method with those using only one cache. We believe that our approach would solve the trust problem optimally, achieve a comprehensive protection for users’ data, and enhance the privacy and security levels.

Highlights

  • Healthcare is one of the critical domains [1] where Internet of Things (IoT) has enhanced its quality and usability [2, 3] with smart phones or wearable devices like RFID tags

  • Authors in [23] have created an integration between the cache technique and another one for exchanging queries among each pair of users to provide a solution of some problems and challenges. This includes the overhead in generating dummies and the need to trust in third party (TP) and the cache hit ratio, but at the cost of trusting another peer

  • We propose a new technique, known as Double Cache Approach (DCA), which uses a pair of caches and replaced the freshness technique with a proposed one

Read more

Summary

Introduction

Healthcare is one of the critical domains [1] where Internet of Things (IoT) has enhanced its quality and usability [2, 3] with smart phones or wearable devices like RFID tags. Most of the healthcare applications use Location Based Services (LBS) for searching points or places of interest like hospitals, health centres, and pharmacies with the help of GPS technology [4,5,6]. This technology plays a significant role in medical emergencies, healthcare applications, and establishing contacts in other domains [7, 8]. Many methods and techniques exist to protect privacy in application and services of IoT but none of them can ensure total protection Before embarking on these methods, let us discuss the standard format of queries that are launched from clients to LBS server.

Literature Review
Proposed Method
12 End Function
Simulation and Results
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call