Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








979 Hits in 4.8 sec

Privacy of Community Pseudonyms in Wireless Peer-to-Peer Networks

Julien Freudiger, Murtuza Jadliwala, Jean-Pierre Hubaux, Valtteri Niemi, Philip Ginzboorg
2012 Journal on spesial topics in mobile networks and applications  
We use the general concept of community pseudonyms to abstract anonymous community identification mechanisms and define two distinct notions of community privacy by using a challenge-response methodology  ...  After years of research, the deployment of such peer-to-peer wireless networks is finally being considered.  ...  Probabilistic Attacks In probabilistic attacks, the adversary constructs a probabilistic mapping of community pseudonyms P to communities C .  ... 
doi:10.1007/s11036-012-0406-y fatcat:ubsldombljdgbicagswqw3yvlm

Protecting Anonymity in Data-Driven Biomedical Science [chapter]

Peter Kieseberg, Heidelinde Hobel, Sebastian Schrittwieser, Edgar Weippl, Andreas Holzinger
2014 Lecture Notes in Computer Science  
One solution for this problem lies in the protection of sensitive information in medical data sets by applying appropriate anonymization.  ...  With recent improvements in data retrieval and processing, data mining, business intelligence and other empirical approaches have a vast potential for various fields of research.  ...  Table linkage attacks determine the presence or absence of the record owner, while probabilistic attacks refer to the threat of a change in the general probabilistic belief of the attacker after seeing  ... 
doi:10.1007/978-3-662-43968-5_17 fatcat:4q3yymgvqvfwpbt5w2sjq3ymnq

An Enhanced Communication Protocol for Location Privacy in WSN

Abdel-Shakour Abuzneid, Tarek Sobh, Miad Faezipour
2015 International Journal of Distributed Sensor Networks  
Providing an efficient location privacy solution would be challenging due to the open nature of the WSN. Anonymity is a key solution for location privacy.  ...  Wireless sensor network (WSN) is built of many sensor nodes. The sensors can sense a phenomenon, which will be represented in a form of data and sent to an aggregator for further processing.  ...  Conflict of Interests The authors declare that there is no conflict of interests regarding the publication of this paper.  ... 
doi:10.1155/2015/697098 fatcat:ndadnkexh5bzzeh6m5hfofjvou

Data De-identification Framework

Junhyoung Oh, Kyungho Lee
2023 Computers Materials & Continua  
De-identification/pseudonymization techniques have been studied a lot, but it is difficult for companies and researchers to know how to de-identify/pseudonymize data.  ...  Accordingly, collecting and analyzing data of the data subject has become one of the core competencies of the companies.  ...  Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.  ... 
doi:10.32604/cmc.2023.031491 fatcat:decsef3lpbdqply3vqclx5cifi

δ-calculus: A New Approach to Quantifying Location Privacy☆

Lihua YIN, Ran LI, Jingquan DING, Xiao LI, Yunchuan GUO, Huibing ZHANG, Ang LI
2020 Computers Materials & Continua  
In LBS, if the original location data are directly provided, serious privacy problems raise.  ...  Further, we use two calculus moving and probabilistic choice to model nodes' mobility and compute its probability distribution of nodes' locations, and a renaming function to model privacy leakage.  ...  Besides, many efforts are spent on the combination of k-anonymity with pseudonyms. For example, Liao et al.  ... 
doi:10.32604/cmc.2020.09667 fatcat:mrktga4ferhtzeuav2agngqtta

Fortified Anonymous Communication Protocol for Location Privacy in WSN: A Modular Approach

Abdel-Shakour Abuzneid, Tarek Sobh, Miad Faezipour, Ausif Mahmood, John James
2015 Sensors  
These sensors can sense a phenomenon (motion, temperature, humidity, average, max, min, etc.) and represent what they sense in a form of data.  ...  In these applications, data privacy itself might not be as important as the privacy of source location. In addition to the source location privacy, sink location privacy should also be provided.  ...  Ideally, the source should update the pseudonyms only after making sure the BS receives the data.  ... 
doi:10.3390/s150305820 pmid:25763649 pmcid:PMC4435140 fatcat:fjh2mukixzgbfp6f46uiv5mw4y

Security and Privacy in Location-Based Services for Vehicular and Mobile Communications: An Overview, Challenges and Countermeasures

Philip Asuquo, Haitham Cruickshank, Jeremy Morley, Chibueze P. Anyigor Ogah, Ao Lei, Waleed Hathal, Shihan Bao, Zhili Sun
2018 IEEE Internet of Things Journal  
In spite of the desirable features provided by LBS, the geographic locations of users are not adequately protected. Location privacy is one of the major challenges in vehicular and mobile networks.  ...  Location-based Services (LBS) have gained popularity as a result of the advances in mobile and communication technologies. LBS provide users with relevant information based on their location.  ...  Dummy Dummy-T [32] Entropy Inference attacks Historical data is protected from adver- saries with background information using dummy generating algorithm.  ... 
doi:10.1109/jiot.2018.2820039 fatcat:y2gdcllac5fbpdd2nnxn4tib2i

Tempest: Temporal Dynamics in Anonymity Systems

Ryan Wails, Yixin Sun, Aaron Johnson, Mung Chiang, Prateek Mittal
2018 Proceedings on Privacy Enhancing Technologies  
The adversary behind each attack is relatively weak – generally passive and in control of one network location or a small number of hosts.  ...  Using experimental analysis on real-world datasets, we demonstrate that these temporal attacks degrade user privacy across a wide range of anonymity networks, including deployed systems such as Tor; pathselection  ...  The views expressed in this work are strictly those of the authors and do not necessarily reflect the official policy or position of ONR or NSF.  ... 
doi:10.1515/popets-2018-0019 dblp:journals/popets/WailsSJCM18 fatcat:e6ckcbpp3zfq7ctq6ydabuazoe

Tempest: Temporal Dynamics in Anonymity Systems [article]

Ryan Wails, Yixin Sun, Aaron Johnson, Mung Chiang, Prateek Mittal
2018 arXiv   pre-print
The adversary behind each attack is relatively weak - generally passive and in control of one network location or a small number of hosts.  ...  Using experimental analysis on real-world datasets, we demonstrate that these temporal attacks degrade user privacy across a wide range of anonymity networks, including deployed systems such as Tor; path-selection  ...  The views expressed in this work are strictly those of the authors and do not necessarily reflect the official policy or position of ONR or NSF.  ... 
arXiv:1801.01932v2 fatcat:zgq3qgrz2jclfbc7xf3ggzzjc4

A New Approach to Privacy-Preserving Multiple Independent Data Publishing

A Hasan, Qingshan Jiang, Hui Chen, Shengrui Wang
2018 Applied Sciences  
Much of the published work makes use of techniques that reduce data utility as the price of preventing composition attacks on published datasets.  ...  Our cell generalization approach increases both protection of individual privacy from composition attack and data utility.  ...  Conflicts of Interest: The authors of the manuscript declare no conflict of interest.  ... 
doi:10.3390/app8050783 fatcat:cqrexszqjzgupgumc2ifyyk4qq

MobiMix: Protecting location privacy with mix-zones over road networks

Balaji Palanisamy, Ling Liu
2011 2011 IEEE 27th International Conference on Data Engineering  
Our experiments show that MobiMix offers high level of anonymity and high level of resilience to attacks compared to existing mix-zone approaches.  ...  Second, we develop a suite of road network mix-zone construction methods that provide higher level of attack resilience and yield a specified lower-bound on the level of anonymity.  ...  Any opinions, findings, and conclusions or recommendations expressed in this paper are those of the authors and do not necessarily reflect the views of the National Science Foundation and other funding  ... 
doi:10.1109/icde.2011.5767898 dblp:conf/icde/PalanisamyL11 fatcat:obdtel34dfavflulehhyqgqajy

Quantifying and protecting location privacy

Reza Shokri
2015 it - Information Technology  
AbstractThis thesis addresses the timely concern of protecting privacy in the age of big data.  ...  We cast the problem of quantifying privacy as computing the estimation error in a statistical (Bayesian) inference problem, where an adversary combines his observation, background knowledge and side channel  ...  He can measure the success of the attack by computing the certainty over the results.  ... 
doi:10.1515/itit-2015-0024 fatcat:jbn5cdvprbgedmdxyh4usyogy4

An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks

Jiejun Kong, Xiaoyan Hong, Mario Gerla
2007 IEEE Transactions on Mobile Computing  
This important change of the concept of anonymity has recently attracted attentions in mobile wireless security research.  ...  This paper presents identity-free routing and ondemand routing as two design principles of anonymous routing in mobile ad hoc networks.  ...  Intuitively, the route pseudonym N shared on a hop is used as the virtual circuit identifier (VCI) in data packets: hDAT A; route pseudonym; payloadi: After the source or the current forwarder transmits  ... 
doi:10.1109/tmc.2007.1021 fatcat:jzo6impc65gvpbafhxgzr6s3eq

IncogniSense: An anonymity-preserving reputation framework for participatory sensing applications

Delphine Christin, Christian Roßkopf, Matthias Hollick, Leonardo A. Martucci, Salil S. Kanhere
2013 Pervasive and Mobile Computing  
The reputation transfer process has an inherent trade-off between anonymity protection and loss in reputation.  ...  Our system utilizes periodic pseudonyms generated using blind signature and relies on reputation transfer between these pseudonyms.  ...  Hence, adversaries are not able to access stored data, or change the behavior of applications. Denial of service attacks are considered out of the scope of this paper. B.  ... 
doi:10.1016/j.pmcj.2013.01.003 fatcat:uvfecn6xsvdv5dxxnie6vjy65m

IncogniSense: An anonymity-preserving reputation framework for participatory sensing applications

Delphine Christin, Christian Rosskopf, Matthias Hollick, Leonardo A. Martucci, Salil S. Kanhere
2012 2012 IEEE International Conference on Pervasive Computing and Communications  
The reputation transfer process has an inherent trade-off between anonymity protection and loss in reputation.  ...  Our system utilizes periodic pseudonyms generated using blind signature and relies on reputation transfer between these pseudonyms.  ...  Hence, adversaries are not able to access stored data, or change the behavior of applications. Denial of service attacks are considered out of the scope of this paper. B.  ... 
doi:10.1109/percom.2012.6199860 dblp:conf/percom/ChristinRHMK12 fatcat:654x4ji5mbhdhk2hmfrz2l3zji
« Previous Showing results 1 — 15 out of 979 results