Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Machine learning has widely been used in crowdsourcing systems to analyze the behavior of their mobile users. However, it naturally raises privacy concerns, as personal data needs to be collected and analyzed in the cloud, and results need to be sent back to the users to improve their local estimates. In this paper, we focus on the use of a specific type of learning algorithms, called maximum a posteriori...
Recent developments induced by the Internet of Things (IoT) force a paradigm shift to deploy on demand services to a broad range of different computing architectures. Mainly single board computers (SBCs) gained a lot of attraction in recent years, shifting highly available processing power to service consumers and IoT devices. Simultaneously, container virtualization achieved a breakthrough by the...
In today's world usage of location based services on mobile devices such as smartphones, tablet PCs and laptops has become progressively popular. Even though location based services are proved to be very useful and convenient, they may cause risk to the users' location privacy, because for the retrieval of useful information based on user's location, user has to send his/her present location and the...
Web cookies are ubiquitously used to track and profile the behavior of users. Although there is a solid empirical foundation for understanding the use of cookies in the global world wide web, thus far, limited attention has been devoted for country-specific and company-level analysis of cookies. To patch this limitation in the literature, this paper investigates persistent third-party cookies used...
Anonymous network provides user privacy to protect identity. The onion routing (TOR) project is one kind of Internet anonymous networks which attracts many researchers and clients nowadays, because of its simplicity and scalability. However, there are some difficulties to analyze TOR performance within live TOR networks since it is distributed and its security nature. This paper presents a TOR network...
Location-Based Service (LBS) becomes increasingly important for our daily life. However, the localization information in the air is vulnerable to various attacks, which result in serious privacy concerns. To overcome this problem, we formulate a multi-objective optimization problem with considering both the query probability and the practical dummy location region. A low complexity dummy location...
DNSSEC Look-aside Validation (DLV) is examined, highlighting its lax specifications and privacy implications. By performing extensive experiments over datasets of domain names under comprehensive experimental settings, our findings firmly confirm the privacy leakages caused by DLV. We discover that a large number of domains that should not be sent to DLV servers are being leaked. We explore the root...
In this paper we study the problem of estimating the cardinality of pairwise set operations (union and intersection) over sets possessed by different data owners, while preserving differential privacy. In our problem setting, a data owner could only communicate with an untrusted server, and thus have to perturb its set data for privacy protection before sharing them with the server. This problem setting...
Proposals and some implementations of Internet of Things (IoT) systems for healthcare are described. Implications of current European Union legislation, the new General Data Protection Regulation, for the security and reliability of healthcare IoT systems and for the privacy of users of these systems are presented. Analytics of healthcare IoT data for the requirements of evidence based healthcare...
Smartphone, as a personal device, has been widely used in people's daily life. As a result, it unavoidably contains user's private and sensitive information, such as financial accounts and social contacts. Unfortunately, recent studies have shown that fingerprint of sensors in smartphones can be used for tracking them, which leads to a significant threat to user's privacy. More importantly, speakers...
The ubiquity of the Internet and email, have provided a mostly insecure communication medium for the consumer. During the last few decades, we have seen the development of several ways to secure email messages. However, these solutions are inflexible and difficult to use for encrypting email messages to protect security and privacy while communicating or collaborating via email. Under the current...
A major concern of the large-scale deployment of location based services (LBSs) is the safeguards of the user's location data collected by service providers, since person's location information may imply sensitive private information. Most existing techniques have addressed privacy protection mainly for snapshot queries. However, providing anonymity for continuous queries is important, since users'...
To address the risk of location privacy disclosure in location-based services (LBSs), existing solutions generally introduce a single trusted anonymizer between the users and the location service provider (LSP). However, a single anonymizer offers limited privacy guarantees and incurs high communication overhead in continuous LBSs. Once the anonymizer is compromised, it may put the user information...
In this paper, we investigate an effect on group detection based on human proximity depending on RSSI values, measured by BLE signals. To realize the investigation, we present a novel method for detecting groups. In the method, we developed a smartphone application for measurement of RSSI values of BLE, and determine a threshold of RSSI values which selected experimentally by making the propagation...
A major cyber-security concern to date for webservers are Distributed Denial of Service (DDoS) attacks. Previously we proposed a novel overlay-based method consisting of distributed network of public servers (PS) for preparation, and access nodes (AN) for actual communication. The AN's performance is evaluated under difficult to detect HTTP(S)-DDoS attacks. Yet, attackers may attempt service denial...
Many reports predicted that the number of connected IoT (Internet of Things) devices will reach to billions in the next several years, accordingly, how to securely and effectively manage, monitor and control them becomes a critical problem. In conventional IoT solutions, direct SSL/TLS based HTTP connections to IoT devices with high overhead are required and encryption is not considered due to low...
Cloud Computing is the current trend and will be future era because of its advantages like pay per usage and on demand services. Load Balancing is a key aspect of Cloud Computing. It is the distribution of network or applications traffic across a number of servers. As the volume of data is increasing day by day the organizations will migrate from traditional computer system to the cloud based system...
For the sake of privacy in range search, a new privacy-preserving range search protocol is proposed using cryptology technology. First, a privacy-preserving vector dominance protocol is suggested. Then, on base of the protocol, our scheme is presented in semi-honest model. Security and complexity are analyzed in the end. Different from previous protocols, the servers are not allowed to get anything...
Location-aware privacy protection is a key issue in mobile applications. And the issue is more concerned in Internet of Vehicles (IoV) because of the needs for more accurate location information. Conventional location hiding methods are not suitable to be used in IoV scenario, since they blur the location information fuzzily. In this paper, the dynamic pseudonym method is used to break the link between...
Cloud computing has brought much convenience to human life, however, how to realize secure and fine-grained authentication of the data stored in the cloud is an urgent issue. In this paper, we center on the data authentication in cloud computing and propose a key insulated attribute based signature scheme (KI-ABPS) to provide secure and fine-grained data authentication in the cloud. Our scheme allows...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.