The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the development of intelligent transport systems (ITS) and vehicular ad hoc network (VANET), vehicular cloud computing (VCC) has been proposed to bring essential and potential benefits, such as improving traffic safety and offering computational services to road users. To make such computational services reliable and secure, the computation results from the vehicular cloud (VC) should be verifiable...
Crowdsensing recently attracts great attention from both industry and academia. By fusing and analyzing multi- dimensional sensing data collected from crowdsensing users, it is possible to support health caring, environment mentoring, traffic mentoring and social behavior mentoring. Nonetheless, how to preserve users' data privacy during data fusing, e.g., data aggregation, has been rarely discussed...
In the private information retrieval (PIR) problem a user wishes to retrieve, as efficiently as possible, one out of K messages from N non-communicating databases (each holds all K messages) while revealing nothing about the identity of the desired message index to any individual database. The information theoretic capacity of PIR is the maximum number of bits of desired information that can be privately...
Although using geolocation databases for spectrum sharing has many pragmatic advantages, it also raises potentially serious operational security (OPSEC) issues. OPSEC is especially a paramount consideration in the light of recent calls in the U.S. for spectrum sharing between federal government (including military) systems and non- government systems (e.g., cellular service providers). In this paper,...
In this paper, we propose an efficient, secure and privacy-preserving scheme for smart grid downlink communication. Specifically, we propose an efficient identity based signcryption scheme, called EIBSC, providing privacy preservation in downlink communication for smart grids. The proposed scheme is characterized by employing the concealing destination technique on a tree network topology to protect...
Vehicular cloud, which is constituted by gathering the under-utilized on-board capabilities on the road, has received considerable attention in recent years. In this paper, we propose a novel secure and privacy-preserving incentive mechanism in vehicular cloud, which employs the Stackelberg Game to model the interaction between the leader and follower vehicles. With the proposed incentive mechanism,...
With the increasing use of Wireless Sensor Networks, the privacy of the user is of main concern. The sensors maintain a layer 2 address that lasts for the node lifetime. As a consequence, an eavesdropper can easy trace the user and his activities, even in case the nodes send ciphered traffic.We propose a 6LoWPAN-ND extension to improve privacy and overcome the traceability of the user. With our method...
In this paper, we propose an efficient scheme that utilizes symmetric-key-cryptography and hashing operations to collect consumption data. The idea is based on sending masked power consumption readings from the meters and removing these masks by adding all the meters' messages, so that the utility can learn the aggregated reading but cannot learn the individual readings. We also introduce a key management...
With more and more trajectory traces available, conducting analysis and mining on those trajectories can obtain valuable information. Although the published traces are often made anonymous by substituting the true identities of mobile nodes with random identifiers, the privacy concern remains. In this paper, we propose a new de-anonymization attack based on the movement pattern of moving objects....
Spectrum trading benefits secondary users (SUs) with accessing opportunities and primary users (PUs) with monetary gains in cognitive radio networks. In the spectrum trading market, bidding privacy is a serious concern for SUs, since untrustworthy PUs or spectrum traders may leverage bidding information to manipulate the trading or leak SU's bids to other SU competitors for illegal gains. Current...
Researchers and engineers have paid more attention to cloud-based application systems, whose features are virtualization and services provisioning. Fortunately the technology can be just right to healthcare. Meanwhile, security has also become more challenging. Although many cloud-based RFID authentication protocols have been proposed, some of them only improve the function and performance without...
Many crowdsourcing platforms have been developed, which enable workers to complete a broad range of complex tasks published by task requesters. Existing task recommendation systems require sensitive information such as task content and interests of workers, which has raised serious privacy concerns. In order to preserve users' privacy in crowdsourcing, we propose a secure task recommendation scheme...
In spite of the pronounced benefit brought by crowdsensing, a user would not participate in sensing without adequate incentive, indicating that effective incentive design plays a critical role in making crowdsensing a reality. In this work, we examine the impact of two conflicting factors on incentives for users' participation: 1) the concern about privacy leakage and 2) the (positive) network effect...
The technological advancements in the health care system have made possible the massive integration of biomedical sensors for monitoring patients' health and disease progression. In this paper, we consider a three tier medical body area network (MBAN): intra-MBAN, inter-MBAN, and beyond-MBAN. The intra-MBAN transmits sensors' data to a controller, which in turn transmits them in the inter-MBAN tier...
The database-driven cognitive radio network (CRN) is regarded as a promising way for a better utilization of spectrum resources without introducing the interference to primary users (PUs). However, there are some critical security and privacy issues in database-driven CRNs, which have been rarely discussed before. First of all, in order to retrieve the spectrum available information (SAI) of one's...
Mobile healthcare system integrating wearable sensing and wireless communication technologies continuously monitors the users' health status. However, the mHealth system raises a severe privacy concern as the data it collects are private information, such as heart rate and blood pressure. In this paper, we propose an efficient and privacy-preserving mHealth data release approach for the statistic...
In cognitive radio networks (CRNs), spectrum database has been well recognized as an effective means to dynamically sharing licensed spectrum among primary users (PUs) and secondary users (SUs). In spectrum database, the protected incumbents (a.k.a. PUs) and the CRs (a.k.a. SUs) are required to register in database their operational specifications such as transmitting power, antenna height, time of...
Due to health information sensitivity, privacy-preserving is a crucial issue in electronic health record systems. Users must provide their health information to insurance companies for their applications. This introduces potential threats to user privacy. In this paper, we propose the fairness-aware and privacy-preserving (FAPP) protocol for online health insurance systems. In the FAPP protocol, a...
It is of significant importance to provide incentives to smartphone users in mobile crowd sensing systems. And a number of auction-based incentive mechanisms have been proposed. However, an auction-based incentive mechanism may unexpectedly release the location privacy of smartphone users, which may seriously reduce users' willingness of participating in mobile crowd sensing. In an auction-based mechanism,...
The compromise of confidential information will lead to catastrophic disaster during the operation and control in the next generation of power grid. With more advanced yet vulnerable techniques integrated, the system is more exposed to malicious attackers compared with isolated old systems. In this paper, we investigate the privacy issues in the optimal control of load-frequency with information exchange...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.