The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the development of intelligent transport systems (ITS) and vehicular ad hoc network (VANET), vehicular cloud computing (VCC) has been proposed to bring essential and potential benefits, such as improving traffic safety and offering computational services to road users. To make such computational services reliable and secure, the computation results from the vehicular cloud (VC) should be verifiable...
Crowdsensing recently attracts great attention from both industry and academia. By fusing and analyzing multi- dimensional sensing data collected from crowdsensing users, it is possible to support health caring, environment mentoring, traffic mentoring and social behavior mentoring. Nonetheless, how to preserve users' data privacy during data fusing, e.g., data aggregation, has been rarely discussed...
The compromise of confidential information will lead to catastrophic disaster during the operation and control in the next generation of power grid. With more advanced yet vulnerable techniques integrated, the system is more exposed to malicious attackers compared with isolated old systems. In this paper, we investigate the privacy issues in the optimal control of load-frequency with information exchange...
Protecting the location privacy is still one of the main challenges in Vehicular Ad-hoc Networks(VANETs). Although, standardization bodies such as IEEE and ETSI have adopted the pseudonymous scheme as a solution to this problem, an efficient pseudonym changing and management is still an open issue. In this paper, we propose a complete and efficient pseudonym management and changing scheme based on...
In the private information retrieval (PIR) problem a user wishes to retrieve, as efficiently as possible, one out of K messages from N non-communicating databases (each holds all K messages) while revealing nothing about the identity of the desired message index to any individual database. The information theoretic capacity of PIR is the maximum number of bits of desired information that can be privately...
In online social networks (OSNs), individual users have a strong desire to expand their social networks through OSN activities and try to maximize the benefits from the social relationships, called social capital. However, with a large-scale social network, their privacy rights have been significantly intruded by adversarial users that perform social attacks including false / illegal private information...
Although using geolocation databases for spectrum sharing has many pragmatic advantages, it also raises potentially serious operational security (OPSEC) issues. OPSEC is especially a paramount consideration in the light of recent calls in the U.S. for spectrum sharing between federal government (including military) systems and non- government systems (e.g., cellular service providers). In this paper,...
In this paper, we propose an efficient, secure and privacy-preserving scheme for smart grid downlink communication. Specifically, we propose an efficient identity based signcryption scheme, called EIBSC, providing privacy preservation in downlink communication for smart grids. The proposed scheme is characterized by employing the concealing destination technique on a tree network topology to protect...
Vehicular cloud, which is constituted by gathering the under-utilized on-board capabilities on the road, has received considerable attention in recent years. In this paper, we propose a novel secure and privacy-preserving incentive mechanism in vehicular cloud, which employs the Stackelberg Game to model the interaction between the leader and follower vehicles. With the proposed incentive mechanism,...
Mobile location-based services (LBSs) empowered by mobile crowdsourcing provide users with context- aware intelligent services based on user locations. As smartphones are capable of collecting and disseminating massive user location-embedded sensing information, privacy preservation for mobile users has become a crucial issue. This paper proposes a metric called privacy exposure to quantify the notion...
With the increasing use of Wireless Sensor Networks, the privacy of the user is of main concern. The sensors maintain a layer 2 address that lasts for the node lifetime. As a consequence, an eavesdropper can easy trace the user and his activities, even in case the nodes send ciphered traffic.We propose a 6LoWPAN-ND extension to improve privacy and overcome the traceability of the user. With our method...
In this paper, we propose an efficient scheme that utilizes symmetric-key-cryptography and hashing operations to collect consumption data. The idea is based on sending masked power consumption readings from the meters and removing these masks by adding all the meters' messages, so that the utility can learn the aggregated reading but cannot learn the individual readings. We also introduce a key management...
With more and more trajectory traces available, conducting analysis and mining on those trajectories can obtain valuable information. Although the published traces are often made anonymous by substituting the true identities of mobile nodes with random identifiers, the privacy concern remains. In this paper, we propose a new de-anonymization attack based on the movement pattern of moving objects....
Spectrum trading benefits secondary users (SUs) with accessing opportunities and primary users (PUs) with monetary gains in cognitive radio networks. In the spectrum trading market, bidding privacy is a serious concern for SUs, since untrustworthy PUs or spectrum traders may leverage bidding information to manipulate the trading or leak SU's bids to other SU competitors for illegal gains. Current...
This paper studies privacy-preserving for downlink transmission in multiuser relay systems, where a source communicates with multiple users via a relay employing the amplify-and-forward (AF) protocol. At any scheduling unit, only one user (desired user) is selected to receive the source information, and the other users (undesired users) are viewed as potential eavesdroppers due to the broadcast nature...
Researchers and engineers have paid more attention to cloud-based application systems, whose features are virtualization and services provisioning. Fortunately the technology can be just right to healthcare. Meanwhile, security has also become more challenging. Although many cloud-based RFID authentication protocols have been proposed, some of them only improve the function and performance without...
In applications of Wireless Sensor Networks (WSNs), all data packets are directed towards a single base-station (BS) over multi-hop routes. The BS is usually responsible for processing the collected data and interfacing the WSN to remote users. The continuous flow of packets towards the BS enables the adversary to analyze the traffic and uncover the BS position. In this paper, we present a technique...
Many crowdsourcing platforms have been developed, which enable workers to complete a broad range of complex tasks published by task requesters. Existing task recommendation systems require sensitive information such as task content and interests of workers, which has raised serious privacy concerns. In order to preserve users' privacy in crowdsourcing, we propose a secure task recommendation scheme...
In spite of the pronounced benefit brought by crowdsensing, a user would not participate in sensing without adequate incentive, indicating that effective incentive design plays a critical role in making crowdsensing a reality. In this work, we examine the impact of two conflicting factors on incentives for users' participation: 1) the concern about privacy leakage and 2) the (positive) network effect...
The technological advancements in the health care system have made possible the massive integration of biomedical sensors for monitoring patients' health and disease progression. In this paper, we consider a three tier medical body area network (MBAN): intra-MBAN, inter-MBAN, and beyond-MBAN. The intra-MBAN transmits sensors' data to a controller, which in turn transmits them in the inter-MBAN tier...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.