The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recent developments induced by the Internet of Things (IoT) force a paradigm shift to deploy on demand services to a broad range of different computing architectures. Mainly single board computers (SBCs) gained a lot of attraction in recent years, shifting highly available processing power to service consumers and IoT devices. Simultaneously, container virtualization achieved a breakthrough by the...
To address the risk of location privacy disclosure in location-based services (LBSs), existing solutions generally introduce a single trusted anonymizer between the users and the location service provider (LSP). However, a single anonymizer offers limited privacy guarantees and incurs high communication overhead in continuous LBSs. Once the anonymizer is compromised, it may put the user information...
Proximity detection is one of the critical components in Location-based Social Networks (LBSNS), which has attracted much attention recently. With the advent of LBSNS, more and more users' location information will be collected by the service providers. However, with a potentially untrusted server, such a proximity detection service may threaten the privacy of users. In this paper, aiming at achieving...
VANET is used for interconnecting the nodes for exchanging secure data across the nodes. VANET has been utilized to give security and effectiveness in framework of transportation. Numerous activity signs are utilized yet it is very little powerful. An Authentication framework with Conditional Privacy-preservation and Non-repudiation (ACPN) has already been given in VANETs. In ACPN, the Public-Key...
With the increasing popularity of location-based services (LBSs), the concerns for location privacy have also been growing. To address this issue, existing solutions generally introduce a fully-trusted third party between the users and the location service provider (LSP). However, the fully-trusted third party offers limited privacy guarantees and incurs high communication overhead. Once the fully-trusted...
Public health interventions consisting of information dissemination to affect behavior have long been a significant form of public health campaign. These interventions can be considered 'push-based' as they push information out to a population. New smartphone technologies for the first time provide a platform for a new type of informational public health intervention, which can be referred to as 'pull-based'...
Location Base System (LBS) is considered one of the most beneficial technologies in our modern life, commonly imbedded in varies devices. It helps people find their required services in the least amount of time based on their positions. The users submit a query with their locations and their required services to an un-trusted LBS server. This raises the flag of user privacy where the user has to have...
Spatial Crowdsourcing (SC) is a novel and transformative platform that engages individuals, groups and communities in the act of collecting, analyzing, and disseminating environmental, social and other spatio-temporal information. SC outsources a set of spatio-temporal tasks to a set of workers, i.e., individuals with mobile devices that perform the tasks by physically traveling to specified locations...
Location privacy has been a serious concern for mobile users who use location-based services. However, existing cloaking methods suffer from computation and communication cost due to the large cloaking area. In this paper, we propose an adaptive spatial cloaking method based on the semantic locations to protect users' privacy. The cloaking region is generated in an asymmetric way and can obtain a...
Multi Server Computation (MSC) is used to accomplish a common computation among multiple users while keeping the data of each party secret from others. Cloud computing is a next generation computing solution in the field of Information and Communication Technology (ICT) which allows its users to use high speed infrastructure and services provided by Cloud Service Providers (CSP). Therefore, deployment...
Location privacy preservation has become an important issue in providing location based services (LBSs). When the mobile users report their locations to the LBS server or the third-party servers, they risk the leak of their location information if such servers are compromised. To address this issue, we propose a Location Privacy Preservation Scheme (LPPS) based on distributed cache pushing which is...
In present days, where anyone stays online nearly everywhere and everytime, it is crucial from the viewpoint of service providers to collect consumers data, so that questions such as “what kind of advertisement do they click on?”, “what do they buy online?”, “what IP-TV channels do they watch?” and “what do they like to do on social networks?” are answered and some relevant information about the users'...
Mobile cloud computing (MCC) is an emerging trend which combines the benefits of cloud computing with the mobile devices. This new technology not only offers tremendous computing power and storage to the mobile devices with limited processing and storage capabilities but also increases the affordability and reliability. Despite providing various benefits, MCC is still in its early stages in providing...
With the recent advancement in the mobile technology, devices are equipped with location computing facility. Devices are mounted with real entities such as human, animals, vehicles etc. In Location Based Services, user carrying device seeks service and hence user's location information is compromised and can be misused by service providers. In this paper, we present the review and propose the enhanced...
VDrive works on the baseline model of Storage-as-a-Service (SaaS), with an infrastructure built on volunteer computing. The project gives a model for storing user data as decentralized packets on nodes on the network. The model proposes a solution with redundant data to provide an efficient model, with maximum availability.
With the increasing adoption of location based services, privacy is becoming a major concern. To hide the identity and location of a request on location based service, most methods consider a set of users in a reasonable region so as to confuse their requests. When there are not enough users, the cloaking region needs expanding to a larger area or the response needs delay. Either way degrades the...
The recent introduction of the smart grids poses the need for a distributed communication infrastructure able to efficiently transmit the energy measurements collected by the smart meters, while simultaneously coping with several privacy and security constraints. In this work we introduce a novel communication architecture able to efficiently solve such a problem. Our proposal is based on a heterogeneous...
NoSQL database has been popular in cloud storage and document-oriented database also has attracted much attention as a kind of NoSQL database. This paper introduces document-oriented database-based privacy data protection architecture. This architecture maintains the feature as scheme-free and nested document of document-oriented database, and protects tenants' privacy through split value and confused...
The Internet is becoming increasingly mobile. Although several mobility solutions are proposed, none of them has been largely deployed. We propose a new system that can facilitate and support mobility on the Internet. The new mobility support service will be offered as a value-added service by mobility service providers to paying mobile customers. Therefore, the proposed solution is economically viable...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.