The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Trajectory privacy-preserving for Location-based Social Networks (LBSNs) has been received much attention to protect the sensitive location information of subscribers from leaking. Existing trajectory privacy-preserving schemes in literature are confronted with three problems: 1) it is limited for privacy-preserving by only considering the location anonymization in practical environment, and the sensitive...
Online social networks (OSNs), attract millions of people and hence users are drastically increasing day by day. Thus the users of the online social network increase ultimately. OSN users existing social relationship can be generalized as 1-hop trust relationship, and further they extend their network through a multi-hop trust chain during the recommendation of authenticated users. Unfortunately,...
Domain Name System (DNS) leakage occurs when queries for names within a private namespace are propagated in the public DNS infrastructure, which has various privacy implications. To reduce this leakage and improve Tor's privacy, Appelbaum and Muffet suggested in RFC 7686 the special-use of .onion domain name. They recommended how stub, recursive, and authority name servers should behave when encountering...
In the last decade, Tor proved to be a very successful and widely popular system to protect users' anonymity. However, Tor remains a practical system with a variety of limitations, some of which were indeed exploited in the recent past. In particular, Tor's security relies on the fact that a substantial number of its nodes do not misbehave. In this work we introduce, the concept of honey onions, a...
To protect privacy while using LBS, we propose a pattern-based cloaking system that incorporate a trusted privacy preserving server to compute the cloak region for each sensitive patterns. To prevent adversaries culling out some patterns with some simple clues, we define a pattern-safe-cloak (PSC) region as a rectangle area that contains at least other l−1 reasonable and dissimilar patterns. To facilitate...
Protection of location privacy by reducing the accuracy of location data, until a desired level of privacy (e.g., measured as k-anonymity) is reached, is a well-known concept that is typically implemented using a privacy proxy. To eliminate the risks associated with a central, trusted party, we propose a generic method to enforce k-anonymity of location data in a decentralized way, using a distributed...
Small and inexpensive computing devices are becoming potential players in the Internet arena as they are used for collecting or generating information and later relay them to the designated servers. The information gathered must be adequately protected against all kinds of attacks during storage and communication. However, smart constrained devices have limited resources and unable to run most of...
To make integrated broadcast-broadband services more attractive, service providers must be able to get the viewer's personal information securely. In this paper, we propose a privacy preserving system for integrated broadcast-broadband services that uses an attribute-based encryption scheme. Using our system, a viewer can easily get a variety of personalized services from a huge number of service...
Public health interventions comprising information dissemination to affect behavioral adjustment have long been a significant component of public health campaigns. However, there has been limited development of public health intervention systems to make use of advances in mobile computing and telecommunications technologies. Such developments pose significant challenges to privacy and security where...
Computational Private Information Retrieval (cPIR) protocols allow a client to retrieve one bit from a database, without the server inferring any information about the queried bit. These protocols are too costly in practice because they invoke complex arithmetic operations for every bit of the database. In this paper we present pCloud, a distributed system that constitutes the first attempt towards...
Accurate maps are increasingly important with the growth of smart phones and the development of location-based services. Several crowdsourcing based map generation protocols have been proposed that rely on volunteers to provide their traces. Being creative, however, those methods pose a significant threat to user privacy as the traces can easily imply user behavior patterns. On the flip side, crowdsourcing-based...
Location-Based Service (LBS) has become a vital part of our daily life. While enjoying the convenience provided by LBS, users may lose privacy since the untrusted LBS server has all the information about users in LBS and it may track them in various ways or release their personal data to third parties. To address the privacy issue, we propose a Dummy-Location Selection (DLS) algorithm to achieve k-anonymity...
Technological advancements in mobile technology and cloud computing open the door for another paradigm known as Mobile Cloud Computing (MCC). This integration of cloud computing and mobile technology gives numerous facilities to a mobile user, such as the ubiquitous availability of Location Based Services (LBS). The utilization of these LBS services require the knowledge of a user's location, hence...
The popularization of Location-Based Services (LBSs) has brought along benefits for users and service provider, in terms of improved quality of existing services and a better user experience. At the same time, location privacy has become one of the most critical concerns for ensuring users' right to protection. Despite the fact that one of the best ways to protect the location information is not to...
Positioning capabilities offered in modern mobile devices enable usage of location-based services. Privacy and security is of great importance for related applications. We present a framework that allows conducting research on anonymity techniques in a real-life environment using smartphones. The proposed solution also includes logging mechanisms that facilitate positioning research dataset development...
With the rapid deployment of M2M services, countless smart “things” with sensing and communication capabilities are collecting data about the physical world we live in. These data can be used by various service providers to make their services more customized with high quality. On the other hand the availability of personal information raises serious concerns over individual privacy. In order to prevent...
The following topics are dealt with: iris biometrics; face recognition; speaker identification; writer recognition; hand geometry; ear biometrics; multi-biometric methods; security and privacy; anti-spoofing methods; template aging; soft biometrics; biometric databases; and DNA biometrics.
Social network sites are very popular and draw a number of users' attention in the time of Web 2.0. In this paper, we emphasize the access control research about social network sites from the perspective that roles imply patterns of relationships. We analyze the access control requirement of social network site, and introduce the role into it. Most important of all is that we propose the role base...
Several protocols of secure processing of user's information in Location Based Service (LBS) have been raised up. Kohlweiss et al constructed a secure framework protecting for both the user's location information and user's usage profiles using oblivious transfer and homomorphic encryption. However, an intermediate proxy was introduced in the protocol to interact between the server and the user, which...
Location based services like finding nearest restaurants or finding friends have increasingly became more common, especially to mobile users. Nevertheless, misuse of location information could represent some threats to users' privacy. Great effort has been placed to propose new techniques which try to deal with these threats, but in most of these cases, techniques were not tested in real environments...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.