The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In an increasingly networked society users are spending more and more time on online activities every day. This is enforced by the continuous migration of applications from local environments to web-based offerings. As a consequence the daily life of people and industries are already depending on the availability of online resources. Still end-user devices are not providing detailed insight in networked...
Behavior-based tracking is an unobtrusive technique that allows observers on the Internet to monitor user activities over long periods of time - in spite of changing IP addresses. Our technique uses semi-supervised machine learning, which allows observers to track users without the need for multiple labeled training sessions. We present evaluation results obtained on a realistic dataset that contains...
As citizens debate the morality of using global surveillance to enforce cyber security, software technologies that can proliferate illegal distribution of copyright material are evolving rapidly. One such technology is Peer-to-Peer networking which, through well-known implementations such as Napster, Bittorrent and eMule, has enabled users to share files at optimal speeds and at near infinite scale...
In Cloud computing system data owner stores the data files remotely to utilize the cloud resources. Though data sharing in cloud computing is most common approach used in most communication network because of the different advantages but it also having some difficulties. This scheme involves three general approaches. Treebased Group Diffie-Hellman (TGDH) based group key agreement, proxy re-encryption...
Cloud computing plays a vital role in today's IT industry, as it offers tremendous computing and storage facilities for the tasks and outsourced data respectively. The major security concern during the computations is to protect customer's confidential data. The mechanism of this paper decomposes widely applicable linear programming (LP) computation outsourcing into public LP solvers running on a...
In this paper, we propose a privacy preserving protocol for cloud system utilization based on extreme learning machine (ELM). The purpose is to implement aware agents (A-agents) on portable/wearable computing devices (P/WCD). The proposed protocol is useful to reduce the calculation cost on the P/WCD. The basic idea of the protocol is to divide an ELM-based A-agent into two parts, one containing the...
Crowdsensing recently attracts great attention from both industry and academia. By fusing and analyzing multi- dimensional sensing data collected from crowdsensing users, it is possible to support health caring, environment mentoring, traffic mentoring and social behavior mentoring. Nonetheless, how to preserve users' data privacy during data fusing, e.g., data aggregation, has been rarely discussed...
Ad hoc network is a networking concept, which emerged in the beginning of the 1990's. Also known as Peer to Peer (P2P) network, these types of networks have facilitated connections among computers. Currently, smartphones are connected to each other wirelessly to share information through hotspot ad hoc feature. These types of connections have led to many threats and attacks. There have been limited...
Vehicular cloud, which is constituted by gathering the under-utilized on-board capabilities on the road, has received considerable attention in recent years. In this paper, we propose a novel secure and privacy-preserving incentive mechanism in vehicular cloud, which employs the Stackelberg Game to model the interaction between the leader and follower vehicles. With the proposed incentive mechanism,...
Sparse Mobile Crowdsensing (MCS) has become a compelling approach to acquire and make inference on urban-scale sensing data. However, participants risk their location privacy when reporting data with their actual sensing positions. To address this issue, we adopt e-differential-privacy in Sparse MCS to provide a theoretical guarantee for participants' location privacy regardless of an adversary's...
Differential privacy (DP) has emerged as a popular standard for privacy protection and received great attention from the research community. However, practitioners often find DP cumbersome to implement, since it requires additional protocols (e.g., for randomized response, noise addition) and changes to existing database systems. To avoid these issues we introduce Explode, a platform for differentially...
Privacy preserving data mining have been studied widely on static data. Static algorithms are not suitable for streaming data. This imposes the study of new algorithms for privacy preserving that cope with data streams characteristics. Recently, effective anonymization algorithms have been studied on centralized data streams. In this paper we propose an approach for anonymizing distributed data streams...
Network-based moving target defense systems are a valuable addition to the world of computer security and privacy. Ongoing research attempts to push the boundaries of network-based moving target defenses by adding client/server functionality to the Moving Target IPv6 Defense (MT6D) system. While this additional functionality provides a great many benefits, it is important to fully understand the impact...
Numerous services are being offered over the Internet and require identification of users as in face-to-face interactions. To simplify the authentication procedure and reduce the need to manage multiple credentials to access services, electronic identification (eID) schemes have been introduced that involve many service providers (SPs) and identity providers (IDPs) which verify the identity of users...
The implementation of security protocols within Wireless Body Sensor Network (WBSN) creates chances for more observations in the sake of performance evaluation. The robustness of such protocols can be verified by formalizing its components using different techniques. In addition, simulating the security protocol can provide an insight into several design parameters, such as response to inputs, and...
Security mechanisms recommended by VANET standardization bodies are not sufficient to stop authorized vehicles from sending bogus or fake messages that in the worst cases could put people's life at risk. There are efforts in evaluating the behaviour of the vehicles in VANETs, based on reputation mechanisms. However, the most of them compromise the privacy, the messages are linkable and no anonymous...
Information Centric Networking (ICN) is a proposal for a future network architecture that shifts from the current end-to-end host based TCP/IP internet architecture by prioritizing content rather than hosts. To this end, ICN relies on in-network caching where routers cache content they have seen with the hope of satisfying future requests for the same content and relieving the original data servers...
In the Public Key infrastructure (PKI) model, digital certificates play a vital role in securing online communication. Communicating parties exchange and validate these certificates, the validation fails if a certificate has been revoked. In this paper we propose the Certificate Revocation Guard (CRG) to efficiently check certificate revocation while minimising bandwidth, latency and storage overheads...
Crowdsensing applications rely on volunteers to collect sensor readings using their mobile devices. Since the collected sensor readings are annotated with spatiotemporal information, the volunteers' privacy may be endangered. Existing privacy-preserving solutions often disclose the volunteers' location information to either a central third party or their peers. As a result, the volunteers need to...
Wireless network traces have been widely used to understand human behaviors and provide value-added services. Sanitization based techniques have been shown to be severely lacking in protecting sensitive user information embedded in such traces. In this paper, we take an encryption based approach that provides much stronger protection of user privacy. One challenge in encrypting wireless network traces...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.