The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The ubiquity of sensors-equipped mobile devices has enabled citizens to contribute data via participatory sensing systems. This emergent paradigm comes with various applications to improve users' quality of life. However, the data collection process may compromise the participants' privacy when reporting data tagged or correlated with their sensitive information. Therefore, anonymization and location...
In this paper we present an exploratory smartphone usage study with logs collected from users in the wild, combined with the sociodemographic, technological and cultural information provided by them. We observe a high diversity among users' most used applications, but by classifying applications into services we find significant correlations between service usage and socio-demographic profile. We...
In vehicular ad hoc network (VANET), vehicles are connected in a self-organized manner to collect and share various traffic data about the road condition, accidents, traffic congestions, and other related events, This data can be used to improve the driving quality, however VANET vehicles may receive unreliable data broadcasted by malicious vehicles which may result in unsafe driving and accidents...
Recently, with the maturity of cloud services and the development of distributed computing, increasing images and video data are stored in the cloud. However, cloud services are generally provided by the third party entities. In addition, the images and video which are stored in the cloud mostly depend on the security of the cloud servers, while the data are not encrypted, which is a great threat...
Domain Name System (DNS) leakage occurs when queries for names within a private namespace are propagated in the public DNS infrastructure, which has various privacy implications. To reduce this leakage and improve Tor's privacy, Appelbaum and Muffet suggested in RFC 7686 the special-use of .onion domain name. They recommended how stub, recursive, and authority name servers should behave when encountering...
Fingerprints as biometric authenticators are rapidly increasing in popularity, with fingerprint scanners available on many modern smartphones and laptops. Because these authenticators are non-revocable, special care must be taken to prevent leakage of the representative feature information of a user's fingerprint. While secure multiparty computation protocols have been designed to maintain fingerprint...
Cloud computing services provide a scalable solution for the storage and processing of images and multimedia files. However, concerns about privacy risks prevent users from sharing their personal images with third-party services. In this paper, we describe the design and implementation of CryptoImg, a library of modular privacy preserving image processing operations over encrypted images. By using...
In the last decade, Tor proved to be a very successful and widely popular system to protect users' anonymity. However, Tor remains a practical system with a variety of limitations, some of which were indeed exploited in the recent past. In particular, Tor's security relies on the fact that a substantial number of its nodes do not misbehave. In this work we introduce, the concept of honey onions, a...
Cloud computing is a modern technology and it gives access to the network upon request to required computing resources (network, servers, storage, applications and services). This exciting computing model depends on data traffic and controlled by a third party. Despite the expected savings in infrastructure and the development cost for business flexibility, security is still the biggest challenge...
A Radio Frequency Identification (RFID) system is a contactless automatic identification system that uses small and low-cost tags. The restricted computation ability and limited memory space of low-cost tags make existing RFID systems vulnerable. EPC Class 1 Generation 2 (EPC-C1G2) is the most popular standard for low cost passive RFID tags. For improving security of this standard; many security schemes...
Cloud computing has becoming the hotspot in the area of information technology. However, when indulging into its convenience and strong ability of the data processing, we also find that the great challenges also appear in terms of data security and privacy information protection. In this paper, on the one hand, the summary on the current security and privacy information challenges have been surveyed...
In the telecare medical information systems, thesensitive data of patients are closely related to their privacy. A sound remote transaction processing system for server-clients(one to many) structure is urgently needed. In this paper, adiagram of privacy encryption that features a star-like topologyis introduced. Security requirements are presented by an adhocmanner. We proposed a concrete star-topological...
Mobile technologies have become increasingly essential in our life as they offer great possibilities of uses, to users. Mobile cloud computing is a new paradigm that allows users to fully utilize mobile technologies exceeding the resources calculation limit. This exponential use of cloud services through mobile devices has allowed users to download, to share and retrieve their personal data anywhere...
Recently, different RFID authentication protocols conforming to EPC Class 1 Generation 2 (EPC C1 G2) standard have been proposed. In 2013, Xiao et al. have proposed an improved mutual authentication protocol which claimed to eliminate the weaknesses of Yoon's protocol that has been proposed in 2012. In this paper, we study the security and the privacy of Xiao et al.'s protocol. It is shown that their...
Disseminating sensory information from sensor nodes to the gateway node towards Data Center Server has to be guaranteed its fruitfulness. However, these important information commonly are transmitted over wireless connections whereas everyone including adversaries may join freely in the network. Hence, the correctness of received information should be emphasized. To do so, such information should...
Nowadays, the attacks are no longer performed from a single computer but from thousands, sometimes millions of systems that are located all over the globe and are grouped in a network called botnet. The most widely used technique to control a botnet is to try to connect to many domain names, generated according to an algorithm called domain generating algorithm (DGA). In this paper we present different...
When dealing with security concerns in the use of network infrastructures a good balance between security concerns and the right to privacy should be maintained. This is very important in scientific networks, because they were created with an open and decentralized philosophy, in favor of the transmission of knowledge, when security was not a essential topic. Although private and scientific information...
The wide deployment of public cloud computing infrastructures has become an appealing solution for the advantages of flexibility and cost saving, but the risk of being exposed to privacy and security issues refrains a lot of customers from risking their sensitive data to the cloud. The data owners do not want to move to the cloud unless the data confidentiality and the privacy of their queries are...
With the advancement of sensor-embedded mobile electronic devices, participatory sensing has attracted more and more attention because it can collect data, analyze information and outsource tasks to those devices' users. However, range query results obtained at the requesters and dissemination data produced at the providers are usually sensitive and private to be disclosed, e.g., users' locations,...
The Location-Based Services (LBSs) have attracted a lot of attention in recent years. For privacy concerns, there are abundant works focusing on the secure query over the location server. However, these works suffer from two main limitations. First, they cannot preserve the location privacy and content privacy simultaneously during LBS queries. Second, they do not support the ranked queries. In this...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.