The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
For the sake of privacy in range search, a new privacy-preserving range search protocol is proposed using cryptology technology. First, a privacy-preserving vector dominance protocol is suggested. Then, on base of the protocol, our scheme is presented in semi-honest model. Security and complexity are analyzed in the end. Different from previous protocols, the servers are not allowed to get anything...
We propose in this paper a security protocol based on a dynamic change of pseudonyms for privacy in Vehicular Ad hoc NETworks (VANET). Our proposal ensures privacy for the driver and his vehicle whether he is transmitter or receiver of the message. By handling all possible cases of changes in vehicle behavior during traffic, we ensure a safe and secure traffic management. We built the architecture...
In this paper, we design a distributed platform for anonymized dataset trading without any centralized trusted third party. The platform consists of peers and consensus-based blockchain mechanism, and each peer acts as a data broker, data receiver, or verifier for blockchain in a data transfer transaction. A data broker collects data from data owners under their consent for data trading. The Privacy...
Location-disclosure is a major privacy issue in vehicular social networks when people are interested in traffic-related cooperation drive, location-aware services, and other applications. In this paper, we propose a Social-aware Location-privacy Protection (SLP) method in vehicular social networks to protect location privacy. This method enables trustworthy users to obfuscate an original sender's...
Location-based Services (LBS) are a kind of important applications which identify the resources close to users, i.e. return the nearest gas stations, restaurants, banks etc, as well as identification of the optimal route to reach destination according to user position. However, privacy threat is the inherent problem in LBS as the location data is very effective for service provisioning. Thus, we focus...
Privacy is considered as one of the hottest issues in nowadays communication research areas. It focuses on protecting the content of the transmitted data and on preserving the contextual information such as the identity of the communicating entities. This paper presents an overview of research done in this area in order to build a foundation that helps the research community to understand more the...
Privacy is an important aspect of network communications, but privacy protocols require an investment of network resources. For any such protocol to be of use, we need to understand quantitatively how much privacy to expect, as well as the tradeoff between privacy and other network properties, for any given configuration of networks and parameters. We develop a practical privacy measure and protocol...
Deep packet filtering (DPF) has been demonstrated as an essential technique for effective fine-grained access controls, but it is commonly recognized that the technique may invade the individual privacy of the users. Secure computation can address the tradeoff between privacy and DPF functionality, but the current solutions limit the scalability of the network due to the intensive computation overheads...
Location based services are widely used to access location information such as nearest ATMs and hospitals. These services are accessed by sending location queries containing user's current location to the Location based service(LBS) server. LBS server can retrieve the the current location of user from this query and misuse it, threatening his privacy. In security critical application like defense,...
Conventional quantum key distribution (QKD) schemes determine the amount of leaked information through estimation of signal disturbance. Here we present a QKD protocol based on an entirely different principle, which works without monitoring the disturbance.
Since centralized Social Networking Services (SNSs) inherently have privacy concerns, researchers are working on decentralized SNSs for solving them. However, it is very difficult to replace all the roles of the centralized SNSs with decentralize ones. This paper describes the Friend News System, a messaging system that works together with a centralized SNS while maintaining a necessary level of privacy...
With the rise and extensive usage of Bit coin, a peer-to-peer electronic cash system beginning at 2008, the number of transactions is growing. In order to analyze the activity in this currency system, we present a parallel analysis approach for meeting the need of building the transaction graph of this financial system. In order to test the performance and the realistic possibility of our approach,...
The blind signature scheme is a very useful protocol for a requester to obtain a signature on a message from a signer without revealing the linkage of the message content and the signature to the signer. After Chaum's scheme was first proposed in 1982, many extended protocols have been published and already used for many related applications. In 1995, the fair blind signature was first introduced...
Traditional low-latency anonymization techniques apply non-standardized, complex, and often even proprietary protocols. Apart from poor performance, the high development effort leads to the existence of at most one single implementation. This in turn increases the risk of creating so-called software monocultures, where failures in the single implementation can compromise the overall security. In this...
with the worldwide increasing of Internet censorship, censorship-resistance technology has attracted more and more attentions, some famous systems, such as Tor and JAP, have been deployed to provide public service for censorship-resistance. However, these systems all rely on dedicated infrastructure and entry points for service accessibility. The network infrastructure and entry points may become...
The Internet Protocol version 6 (IPv6) brings with it a seemingly endless supply of network addresses. It does not, however, solve many of the vulnerabilities that existed in Internet Protocol version 4 (IPv4). In fact, privacy-related crimes in IPv6 are made easier due to the way IPv6 addresses are formed. We developed a Moving Target IPv6 Defense (MT6D) that leverages the immense address space of...
The increasing amount of personal and sensitive information disseminated over the Internet prompts commen-surately growing privacy concerns. Digital data often lingers indefinitely and users lose its control. This motivates the desire to restrict content availability to an expiration time set by the data owner. This paper presents and formalizes the notion of Ephemeral Publishing (EphPub), to prevent...
Receiver-location privacy is an important security requirement in privacy-preserving Vehicular Ad hoc Networks (VANETs), yet the unavailable receiver's location information makes many existing packet forwarding protocols inefficient in VANETs. To tackle this challenging issue, in this paper, we propose an efficient social-tier-assisted packet forwarding protocol, called STAP, for achieving receiver-location...
Security mechanisms such as authentication, message integrity, and non-repudiation are extremely important features for both vehicle-to-vehicle and vehicle-to-infrastructure communications in vehicular ad hoc networks. This paper proposes an Efficient and Scalable Authentication Protocol (ESAP) that provides anonymity and conditional privacy for vehicular ad hoc networks based on the self-generated...
In this paper, to simultaneously protect the receiver-location privacy and improve the performance of packet delivery in VANET, we utilize ``Sacrificing the Plum Tree for the Peach Tree" - one of the Thirty-Six Strategies of Ancient China, to propose a socialspot-based packet forwarding (SPF) protocol, where each vehicle receiver only reveals a non-sensitive socialspot, e.g., a shopping mall,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.