The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The attribute based signature scheme could verify the signature by the attribute instead of public key. But, a large number of bilinear operations are concentrated in the verification process, so the amount of computation required for signature verification is much larger than that of signature generation. To solve this problem, this paper proposed an attribute based signature scheme with aided-verification,...
The accuracy of user location information is inversely proportional to the user's privacy preserving degree k, and is proportional to quality of query service. In order to balance the conflict between privacy preserving security and query quality caused by the accuracy of location information, A clustering algorithm aiming at eliminating outliers based on k-anonymity location privacy preserving model...
In identity federation, each service provider verifies the identity of a user based on authentication performed by an authentication server called an Identity Provider (IdP). When the IdP suffers from a trouble such that an unauthorized person has cracked into the IdP or the IdP is unreachable due to a network problem, all services in the federation may be stopped by the single trouble. Simple replication...
Large public displays are widely used in public spaces for serving information. The flow of the information is largely a one-way passive communication due to a lack of user-content interaction, which in some ways limits its effectiveness as an information display system. We propose a use of mobile phones as a tool to interact with a public display. Our proposed mobile-public display user interaction...
Security of the smart metering infrastructure, which is a part of the smart grid initiative, intended at transitioning the legacy power grid system into a robust, reliable, adaptable and intelligent energy utility, is an imminent problem that needs to be addressed quickly. Moreover, the increasingly intensifying integration of smart metering infrastructure with other ecosystem applications and the...
Aided by advances in sensors and algorithms, systems for localizing and tracking target objects or events have become ubiquitous in recent years. Most of these systems operate on the principle of fusing measurements of distance and/or direction to the target made by a set of spatially distributed observers using sensors that measure signals such as RF, acoustic, or optical. The computation of the...
Cloud storage providers can reduce storage costs by detecting identical files and storing only one instance of them. While appealing to the storage providers, this deduplication set-up raises various privacy concerns among clients. Various techniques to retrofit content confidentiality in deduplication have been studied in the literature. Nevertheless, data encryption alone is insufficient to protect...
Proximity detection is one of the critical components in Location-based Social Networks (LBSNS), which has attracted much attention recently. With the advent of LBSNS, more and more users' location information will be collected by the service providers. However, with a potentially untrusted server, such a proximity detection service may threaten the privacy of users. In this paper, aiming at achieving...
Using a broadcast channel to transmit clients' data requests may impose privacy risks. In this paper, we tackle such privacy concerns in the index coding framework. We show how a curious client can infer some information about the requests and side information of other clients by learning the encoding matrix used by the server. We propose an information-theoretic metric to measure the level of privacy...
We consider the problem of designing PIR scheme on coded data when certain nodes are unresponsive. We provide the construction of ν-robust PIR schemes that can tolerate up to ν unresponsive nodes. These schemes are adaptive and universally optimal in the sense of achieving (asymptotically) optimal download cost for any number of unresponsive nodes up to ν.
The design and implementation of cryptographic systems offer many subtle pitfalls. One such pitfall is that cryptography may create unique identifiers potentially usable to repeatedly and precisely re-identify and hence track users. This work investigates TLS Client Certificate Authentication (CCA), which currently transmits certificates in plain text. We demonstrate CCA's impact on client traceability...
Ciphertext Policy - Attribute Based Encryption (CPABE) has emerged as a feasible solution to address challenges of access control to a diverse set of users. In CP-ABE, owner encrypts its data under a policy of attributes, while any data consumer satisfying it can decrypt the data. Problem of existing CP-ABE schemes is that the access matrix is sent in plaintext along with the ciphertext. Hence, to...
A (K, N, T, Kc) instance of the MDS-TPIR problem is comprised of K messages and N distributed servers. Each message is separately encoded through an (N, Kc) MDS storage code. A user wishes to retrieve one message, as efficiently as possible, while revealing no information about the desired message index to any colluding set of up to T servers. The fundamental limit on the efficiency of retrieval,...
As a promising cryptographic primitive, attributebased encryption (ABE) is adopted to protect outsourced data. However, there are some issues in existing attribute-based encryption schemes. First, the attribute authority manages attributes of users, so it may cause the leakage of users' privacy information. Second, because the access structures are directed along with the ciphertexts and may violate...
The popularity of Location-Based Services (LBSs) has resulted in varieties of applications with more conveniences in our daily life. However, since mobile users need to submit some sensitive information to the untrusted LBS servers, they may lose their privacy while they are enjoying the provided social activities. In this paper, we first point out and define the Time-Sensitive Side Information (TSSI)...
Radio Frequency Identification (RFID) makes it a supporting technology for the Internet of things (IoT). While RFID has been widely used and developed rapidly, its security and privacy issues cannot be ignored. With the development of cloud computing, cloud based RFID system has become a new solution. Protecting the security of RFID system in cloud environment is particularly important. Not verifying...
The increasing adoption of the Internet of Things introduces new threats that affect the privacy of users. Current privacy enhancing technologies are not sufficient to address all these new threats. This paper explains one of the most powerful protocols, namely DC-net. The DC-net protocol, while more than 30 years old, was never used in real-life due to its overhead and sensitivity with regards to...
In order to realize data sharing in mobile cloud computing, decentralized attribute-based encryption (ABE) has been widely concerned. However, the existing ABE schemes are full of flaws. First, the main drawback of ABE is that the computation cost of encryption and decryption are expensive. Second, the existing ABE schemes are inapplicable due to the inefficiency of user revocation. Besides, in a...
Dynamic spectrum access (DSA) technique has emerged as a fundamental approach to mitigate the spectrum scarcity problem. As a key form of DSA, the government is proposing to release more federal spectrum for sharing with commercial wireless users. However, the flourish of federal-commercial sharing hinges upon how the federal privacy is managed. In current DSA proposals, the sensitive exclusion zone...
With the rapid development of the social networks, Collaborative Filtering (CF)-based recommender systems have been increasingly prevalent and become widely accepted by users. The CF-based techniques generate recommendations by collecting privacy sensitive data from users. Usually, the users are sensitive to disclosure of personal information and, consequently, there are unavoidable security concerns...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.