The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The popularity of mobile devices with positioning capability and Internet accessibility in recent years has caused a revolution in the Location Based Services (LBS) market. Unfortunately, without preserving the user's location privacy, LBS providers can collect and log the accurate locations of the service users. Many mechanisms have been developed to preserve the LBS user's location privacy. While...
Offloading has emerged as a promising idea to allow resource-constrained mobile devices to access intensive applications, without performance or energy costs, by leveraging external computing resources. This could be particularly useful in enterprise contexts where running line-of-business applications on mobile devices can enhance enterprise operations. However, we must address three practical roadblocks...
Location-Based Services (LBS) is used to identify the current location of the user and the user is able to search the point of interest such as hotels, parks which is located near to him. Many of the systems are still using GPS to search any location which does not have privacy. The systems which are proposed earlier have some drawbacks on privacy. The proposed system provides privacy by using Dynamic...
VANET is used for interconnecting the nodes for exchanging secure data across the nodes. VANET has been utilized to give security and effectiveness in framework of transportation. Numerous activity signs are utilized yet it is very little powerful. An Authentication framework with Conditional Privacy-preservation and Non-repudiation (ACPN) has already been given in VANETs. In ACPN, the Public-Key...
In this epoch of growing technology the data collected by organizations has the requirement to preserve the privacy of the individuals. The techniques like anonymization, randomization are used to achieve the goal. But unfortunately anonymization leads to certain level of information loss while preserving privacy. Due to drift of data over the centralized server has added to the more demand of preserving...
Advance in ICT and convergence technology, latest trend of e-commercial is O2O. Scale of O2O market is growing and famous platform firms start to invest this industry. However, O2O service's security requirements for safe O2O service has not been researched yet. In O2O Service, Data flows from Online to Offline or from Offline to Online, So, Traditional Online Security countermeasures is not appropriate...
Recently, cloud-based machine learning (ML) services are getting popular. A client sends input data to a cloud, which performs ML algorithms based on neural networks (NN) using its powerful server, and returns the result back to the client. In this scenario, the server can easily collect the users’ sensitive data, raising the privacy issues and making users reluctant to use the services. This paper...
Online social networks (OSNs), attract millions of people and hence users are drastically increasing day by day. Thus the users of the online social network increase ultimately. OSN users existing social relationship can be generalized as 1-hop trust relationship, and further they extend their network through a multi-hop trust chain during the recommendation of authenticated users. Unfortunately,...
Privacy protection has been in intensive concerns in Location Based Service (LBS). In existing research, tremendous efforts have been brought to obfuscation techniques and developing new anonymity to preserve the location privacy. However, these techniques may either sacrifice the service accuracy or rely on a trusted third party. To deal with this, in this paper, we propose a decentralized data forwarding...
Malicious actors are increasingly using TLS to evade deep packet inspection (DPI). In response, vendors and enterprises have turned to man-in-the-middle (MITM) proxies to enable security monitoring of encrypted traffic. This approach not only breaks the end-to-end authentication component of TLS but requires clients to trust a root certificate that allows the proxy to masquerade as any domain. This...
Recent cyber attacks are sophisticated so that it is difficult to prevent malware infection. Therefore, early malware infection detection becomes more important. Moreover, latest malware connects to C&C server by utilizing HTTP which is widely used on daily business. Furthermore, some of them utilizes HTTPS to hide its content from analyzer. Thus, it further makes malware infection detection harder...
This fast abstract proposes a privacy-preserving quantum-secure protocol for DBSCAN clustering algorithm. It allows multiple parties to jointly compute clusters without revealing their individual datasets to each other. We show how to outsource the DBSCAN computation on encrypted data to a cloud service provider securely such that the parties do not need to perform the expensive clustering computation...
Over the last five years, on-line analytical processing (OLAP) became one of the essential information processing technologies. OLAP technology has been successfully used in different areas: retail, financial services, telecommunication, health care etc. Because of this security of data stored in Data Warehouses became one of the most important aspect of this technology, especially when we speaking...
The possibility for the leakage of a user's location information and the content of the service request query in the use of the location based services raised the issue of personal information protection. To solve this problem, in the traditional approaches, an anonymity region was defined and used such that it is hard to identify the user from the knowledge on the content of a specific query and...
The Web has become an indispensable part of our society and is currently most commonly used mode of information delivery. Millions of users access the free services provided by the websites on daily basis and while providing these free services websites track and profile their web users. In this environment, the ability to track users and their online habits can be very lucrative for advertising companies,...
Yu et al. proposed a two-round multi-keyword ciphertext retrieval TRMCR) scheme by employing a vector space model and homomorphic encryption. A distinctive feature is to support top-k multi-keyword retrieval and hence TRMCR is an excellent choice for searching encrypted data over cloud with a desirable property of data privacy-preserving. Correct decryption is one of the fundamental requirements for...
Distance learning is essential for students in remote areas. According to some investigations, there are more and more students taking online courses using smart phones. Nevertheless, there is a risk of privacy violation, if the distance learning system is not properly designed. In this paper, we design a privacy preserving scheme for distant learning, in which students use smart phones to access...
Nowadays cloud servers become the primary choice to store and share data with multiple recipients. The storage of personal information on cloud servers may result in the exposure of confidential information to unauthorized individuals or organizations. Several solutions employing attribute-based encryption schemes have been proposed for secure sharing of data using cloud servers. However, most of...
Cloud storage supplies enormous convenience for numerous companies and individuals to manage their data. However, data owners lose ultimately physical control of their data, which introduces many potential safety hazards in the cloud storage environment. Many scholars have made studies on the security problem of cloud storage data. To solve the problem, we propose a secure audit scheme supporting...
Web Search Engines allow the user to retrieve data from the Internet using search query. WSEs maintain search query log to improve the result quality by retrieving personalized search result. WSE are known to sell query log related data to the marketing organizations for boosting revenues, which poses a threat to user privacy. Private web search is a concept in which the user gets data from the Internet...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.