The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Secure interoperation is an important technology to protect shared data in multi-domain environments. IRBAC (Interoperable Role-based Access Control) 2000 model has been proposed to achieve security interoperation between two or more RBAC administrative domains. Static Separation of Duties (SSoD) is an important security policy in RBAC, but it has not been enforced in the IRBAC 2000 model. As a result,...
With the development of smart terminals and mobile social networks, users can find potential friends who have similar interests by sharing personal attribute profile in mobile social networks (MSN). However, the personal attribute profile usually contains sensitive information, and if this information is captured by attackers, it may cause unexpected consequences. In this paper, we propose a privacy-preserving...
For the sake of privacy in range search, a new privacy-preserving range search protocol is proposed using cryptology technology. First, a privacy-preserving vector dominance protocol is suggested. Then, on base of the protocol, our scheme is presented in semi-honest model. Security and complexity are analyzed in the end. Different from previous protocols, the servers are not allowed to get anything...
Mobile social networks (MSN) provide services formobile users to discover and interact with potential friends. Now, more and more people begin to pay attention to lookingfor a friend who has similar interests. However, when theymanage to measure the proximity between their own and other people's profile, they may do not want to reveal their private data. In this paper, we design a cloud aided privacy-preserving...
For single-owner multi-user wireless sensor networks, there is the demand to implement the user privacy-preserving access control protocol in WSNs. Firstly, we propose a new access control protocol based on an efficient attribute-based signature. In the protocol, users need to pay for query, and the protocol achieves fine-grained access control and privacy protection. Then, the protocol is analyzed...
Location-aware mobile advertising is expanding very rapidly and is forecast to grow much faster than any other industry in the digital era. Unfortunately, with the rise and expansion of on-line behavioral advertising, consumers have grown very skeptical of the vast amount of data that is extracted and mined from advertisers. As a result, the consensus has shifted towards stricter privacy requirements...
Personal profiles usually contain sensitive information of people, while the emerging requirement of profile matching in mobile social networks may occasionally leak the sensitive information and hence violate people' privacy. In this paper we propose a user self-controllable profile matching protocol in privacy-preserving mobile social networks. By using our protocol, users can customize the matching...
Special secure multi-party computation is a hot topic in recent years' research. Privacy preserving path planning is that how to do path planning without leakage of privacy information. It has a very broad application prospects, but there is little study about it. In this paper, we propose a generation protocol for the common tangent of two circles in a privacy-preserving way, also analyze the correctness,...
In this paper, we propose a privacy-preserving framework, called PLAM, for local-area mobile social networks. The proposed PLAM framework employs a privacy-preserving request aggregation protocol with k-Anonymity and l-Diversity properties while without involving a trusted anonymizer server to keep user preference privacy when querying location-based service (LBS), and integrates unlinkable pseudo-ID...
Making new social interactions with other users in vicinity is a crucial service in Proximity-based Mobile Social Networks (PMSNs), where a user can find a best matching friend directly through the Bluetooth/WiFi interfaces built in her mobile device. In existing work for such services, users have to publish their interests to do the matching. However, it conflicts with users' growing privacy concerns...
Existing work on RFID authentication problems always make assumptions that 1) hash function can be fully used in designing RFID protocols; 2) channels between readers and the server are always secure. However, the first assumption is not suitable for EPC Class-1 Gen-2 tags, which has been challenged in many research work, while the second one cannot be adopted in mobile RFID applications where the...
Mobile content dissemination is very useful for many mobile applications in delay tolerant networks (DTNs), like instant messaging, file sharing, and advertisement dissemination, etc. Recently, social-based approaches, which attempt to exploit social behaviors of DTN users to forward time-insensitive data, such as family photos and friends' sightseeing video clips, have attracted intensive attentions...
The recent penetration of smart mobile devices into the consumer market sets a stage for novel network applications. In particular, we envision a paradigm shift in the commercial advertising model facilitated by the widespread uses of these devices: advertisements circulate in a word-of-mouth fashion among device users and reach potential customers based on the users' knowledge about their contacts...
TCG's Trusted Platform Modules provide the functionality of remote attestation, which based on the integrity of software components in a specific platform configuration. Integrity Measurement Architecture(IMA) is the accredited remote attestation methods which formulates the integrity measurement process and integrity reporting protocol. However, as a binary attestation, all integrity measurements...
This paper considers the privacy issues in attribute-based access control systems, and presents a privacy-preserving access control protocol named as symmetrically oblivious envelope protocol. Its important property is symmetric privacy, i.e., the resource owner can't learn attribute values of the resource requester, and the resource requester can't learn access control policies established by resource...
With the growth of decentralized network users, preserving privacy becomes a critical issue in this open community. Kad-based network, as a typical decentralized system, has been widely used nowadays. However, there is not enough research to achieve anonymity on it. In this paper, we propose an anonymous protocol based on Kad network, named Anonymous Kad (A-Kad), which achieves complete privacy and...
Secure multi-party computation (SMC) is dedicated to solve trust problems in cooperative computing with each participantpsilas private data. Privacy preserving computational geometry (PPCG) is a special area in SMC and is being widely used. This paper investigates the problem of judging whether a point is in a convex hull or not. We firstly present a secure protocol to determine the position of a...
It is a primary task in the privacy-preserving data mining in the distributed environment how to protect privacy and at the same time acquire accurate data relation. This paper shows how two parties built a decision tree collaboratively without revealing privacy when datasets is vertically distributed, including a PPC4.5 algorithm for privacy preserving via C4.5 over vertically distributed datasets...
Reputation systems are designed for reducing the risk entailed in interactions among total strangers in electronic marketplaces. Such systems can be used to collect and aggregate feedback on the past behavior of participants in electronic transactions, so as to derive reputation scores assumed to predict likely future behavior.The security of reputation system is vital for the system to run correctly,...
Secure multi-party computation has been a hot research topic of cryptograhy for about two decades, and the convex hulls problem is a special case of it. However, the precise convex hulls will certainly expose all vertexes and even bring about unfairness. Therefore the practical approximate convex hulls are in need. In this paper, we summarize and discuss the convex hulls problem, and then we present...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.