Cognitive Radio Oriented Wireless Networks. 13th EAI International Conference, CROWNCOM 2018, Ghent, Belgium, September 18–20, 2018, Proceedings

Research Article

Comparison of Incumbent User Privacy Preserving Technologies in Database Driven Dynamic Spectrum Access Systems

Download
98 downloads
  • @INPROCEEDINGS{10.1007/978-3-030-05490-8_6,
        author={He Li and Yaling Yang and Yanzhi Dou and Chang Lu and Doug Zabransky and Jung-Min Park},
        title={Comparison of Incumbent User Privacy Preserving Technologies in Database Driven Dynamic Spectrum Access Systems},
        proceedings={Cognitive Radio Oriented Wireless Networks. 13th EAI International Conference, CROWNCOM 2018, Ghent, Belgium, September 18--20, 2018, Proceedings},
        proceedings_a={CROWNCOM},
        year={2019},
        month={1},
        keywords={Dynamic spectrum access Privacy preserving technology},
        doi={10.1007/978-3-030-05490-8_6}
    }
    
  • He Li
    Yaling Yang
    Yanzhi Dou
    Chang Lu
    Doug Zabransky
    Jung-Min Park
    Year: 2019
    Comparison of Incumbent User Privacy Preserving Technologies in Database Driven Dynamic Spectrum Access Systems
    CROWNCOM
    Springer
    DOI: 10.1007/978-3-030-05490-8_6
He Li1,*, Yaling Yang1,*, Yanzhi Dou1,*, Chang Lu1,*, Doug Zabransky1,*, Jung-Min Park1,*
  • 1: Virgina Tech
*Contact email: heli@vt.edu, yyang8@vt.edu, yzdou@vt.edu, changl7@vt.edu, dmz5e@vt.edu, jungmin@vt.edu

Abstract

Database driven dynamic spectrum sharing is one of the most promising dynamic spectrum access (DSA) solution to address the spectrum scarcity issue. In such a database driven DSA system, the centralized spectrum management infrastructure, called spectrum access system (SAS), makes its spectrum allocation decisions to secondary users (SUs) according to sensitive operational data of incumbent users (IUs). Since both SAS and SUs are not necessarily fully trusted, privacy protection against untrusted SAS and SUs become critical for IUs that have high operational privacy requirements. To address this problem, many IU privacy preserving solutions emerge recently. However, there is a lack of understanding and comparison of capability in protecting IU operational privacy under these existing approaches. In this paper, thus, we fill in the void by providing a comparative study that investigates existing solutions and explores several existing metrics to evaluate the strength of privacy protection. Moreover, we propose two general metrics to evaluate privacy preserving level and evaluate existing works with them.