The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
For the sake of privacy in range search, a new privacy-preserving range search protocol is proposed using cryptology technology. First, a privacy-preserving vector dominance protocol is suggested. Then, on base of the protocol, our scheme is presented in semi-honest model. Security and complexity are analyzed in the end. Different from previous protocols, the servers are not allowed to get anything...
With the pervasiveness of mobile devices and the development of biometric technology, biometric identification, which can achieve individual authentication relies on personal biological or behavioral characteristics, has attracted widely considerable interest. However, privacy issues of biometric data bring out increasing concerns due to the highly sensitivity of biometric data. Aiming at this challenge,...
The ubiquity of sensors-equipped mobile devices has enabled citizens to contribute data via participatory sensing systems. This emergent paradigm comes with various applications to improve users' quality of life. However, the data collection process may compromise the participants' privacy when reporting data tagged or correlated with their sensitive information. Therefore, anonymization and location...
With the advancement of sensor-embedded mobile electronic devices, participatory sensing has attracted more and more attention because it can collect data, analyze information and outsource tasks to those devices' users. However, range query results obtained at the requesters and dissemination data produced at the providers are usually sensitive and private to be disclosed, e.g., users' locations,...
With the increasing popularity of location-based services (LBSs), the concerns for location privacy have also been growing. To address this issue, existing solutions generally introduce a fully-trusted third party between the users and the location service provider (LSP). However, the fully-trusted third party offers limited privacy guarantees and incurs high communication overhead. Once the fully-trusted...
Location-aware mobile advertising is expanding very rapidly and is forecast to grow much faster than any other industry in the digital era. Unfortunately, with the rise and expansion of on-line behavioral advertising, consumers have grown very skeptical of the vast amount of data that is extracted and mined from advertisers. As a result, the consensus has shifted towards stricter privacy requirements...
In this paper, a taxonomy of privacy-preserving approaches employed in digital right management systems are presented. These approaches are classified into two main approaches according to their design philosophy: cryptographic and noncryptographic approaches. Moreover, the pros and cons of the presented approaches are reported and compared in light of different viewpoints. Furthermore, some new directions...
Location-Based Service (LBS) is one of the fundamental and central functionalities of mobile social networks. Since users usually have to report their locations to the LBS providers while using services, the protection of user's location privacy poses a critical challenge. Although many existing approaches can preserve user's location privacy effectively, most of them must include and use the user's...
Internet usage has increased largely due to this the data has to be very largely stored in the database. Cloud computing is the latest model for storing large amount of data. As a reason administration of the data has so much of complexity. Due to this security of the complex data has to be in demand for the privacy of the data. In the field of data outsourcing cloud computing has turned into a moderate...
In recent years, mobile Online Social Networks (mOSNs) have gained more and more popularity. Compared with traditional social networks, mOSNs allow user's location to come into play. Thus, location sharing becomes a fundamental component of mOSNs, and many opportunities for location-based services arise which have a high value for the users. At the same time, the need to share location information...
Accurate maps are increasingly important with the growth of smart phones and the development of location-based services. Several crowdsourcing based map generation protocols have been proposed that rely on volunteers to provide their traces. Being creative, however, those methods pose a significant threat to user privacy as the traces can easily imply user behavior patterns. On the flip side, crowdsourcing-based...
Location-Based Services (LBSs) are becoming increasingly popular with rapid developments of social networks and location aware devices, such as smartphones and tablets. Users query the LBSs server and get service information about their surroundings. Unfortunately, these queries may lead to serious security and privacy concerns. It is very hard for users to access LBSs while keeping their privacy...
Existing work on RFID authentication problems always make assumptions that 1) hash function can be fully used in designing RFID protocols; 2) channels between readers and the server are always secure. However, the first assumption is not suitable for EPC Class-1 Gen-2 tags, which has been challenged in many research work, while the second one cannot be adopted in mobile RFID applications where the...
With cloud storage services, it is commonplace for data to be not only stored in the cloud, but also shared across multiple users. However, public auditing for such shared data --- while preserving identity privacy --- remains to be an open challenge. In this paper, we propose the first privacy-preserving mechanism that allows public auditing on shared data stored in the cloud. In particular, we exploit...
An era of cloud computing allows users to profit from many privileges. However, there are several new security challenges. In fact, anonymous password authentication in the traditional setting has been suffered from many inherent drawbacks such as ease of exposure to malicious attacks and users registered their passwords in the server. Our scheme proposes the phenomenal context according to three...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.