Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








3,601 Hits in 4.5 sec

Location Oblivious Privacy Protection for Group Nearest Neighbor Queries [chapter]

A. K. M. Mustafizur Rahman Khan, Tanzima Hashem, Egemen Tanin, Lars Kulik
2014 Lecture Notes in Computer Science  
Up to now, users have had to rely on an external party, typically a location service provider (LSP), for computing an optimal meeting point.  ...  Our experimental results show that we provide a readily deployable solution for real life applications which can also be deployed for other geo-spatial queries and applications.  ...  Introduction Internet accessibility through smartphones has fueled the increased popularity of Location Based Services (LBS). Finding a convenient meeting point for a group is a common problem.  ... 
doi:10.1007/978-3-319-11593-1_20 fatcat:bo6eebyf5nabdp5rzajddczpsu

Location Privacy Preserving of Mobile Users using Secured Homomorphism

Nitin Kamble, Narendra Shekokar
2015 International Journal of Computer Applications  
This paper, proposes algorithms for location privacy preserving of mobile users.  ...  These applications often rely on current locations of individual users or a group of users to provide the desired service.  ...  Location privacy preservation in mobile surroundings is difficult for two reasons.  ... 
doi:10.5120/20533-2877 fatcat:6r2nc7nkzbgbxnlhakootmq2ta

Mobile Applications for Privacy-Preserving Digital Contact Tracing

Christos Laoudias, Steffen Meyer, Philippos Isaia, Thomas Windisch, Justus Benzler, Maximilian Lenkeit
2022 Zenodo  
Presentation slides of the advanced seminar "Mobile Applications for Privacy-Preserving Digital Contact Tracing" presented at the 23rd IEEE Intl. Conference on Mobile Data Management (MDM 2022).  ...  We provide an overview of this emerging field, while focusing on Bluetooth-based privacy-preserving solutions.  ...  Limited privacy 20 Mobile Applications for Privacy-Preserving Digital Contact Tracing @ 23 rd IEEE MDM 2022, Online, June 8, 2022 Mobile Applications for Privacy-Preserving Digital Contact Tracing  ... 
doi:10.5281/zenodo.6622627 fatcat:fkcwwnz4ebg6jhjpkpae77n7su

Reclaiming privacy for smartphone applications

Emiliano De Cristofaro, Anthony Durussel, Imad Aad
2011 2011 IEEE International Conference on Pervasive Computing and Communications (PerCom)  
As a result, the growing amount of sensitive information shared by smartphone users raises serious privacy concerns and motivates the need for appropriate privacy-preserving mechanisms.  ...  In this paper, we present a novel architecture geared for privacy-sensitive applications where personal information is shared among users and decisions are made based on given optimization criteria.  ...  We would like to thank the Program Committee and the Reviewers of the 9th IEEE International Conference on Pervasive Computing and Communications (PerCom'11) as well as Valtteri Niemi for the very precious  ... 
doi:10.1109/percom.2011.5767598 dblp:conf/percom/CristofaroDA11 fatcat:mvabrjvkx5hmpfzrb2x2z2v7gi

Location-assured, multifactor authentication on smartphones via LTE communication

Torben Kuseler, Ihsan A. Lami, Hisham Al-Assam, Sos S. Agaian, Sabah A. Jassim, Eliza Y. Du
2013 Mobile Multimedia/Image Processing, Security, and Applications 2013  
location determined on and reported by the client's Smartphone.  ...  With the added security provided by LTE, geographical location has become an important factor for authentication to enhance the security of remote client authentication during mCommerce applications using  ...  This additional LTE-LS privacy feature can be used in combination with other privacy preserving authentication techniques, such as [11] , to meet the privacy protecting aspects required in any remote  ... 
doi:10.1117/12.2018027 fatcat:55haczoz7bc5dc64xg62npjvfi

A Practical PIR-based Scheme for Discovering Nearby Places for Smartphone Applications

Maryam Hezaveh, Carlisle Adams
2019 Advances in Science, Technology and Engineering Systems  
We present a privacy-preserving approach for discovering nearby places of interest to Alice.  ...  Our implementation results demonstrate that our approach has faster decode and retrieve time for the nearby POIs on smartphones compared with current similar work.  ...  Our privacy-preserving protocol for LBS helps Alice to search for specific nearby POIs on her smartphone by sending a query to the location based service provider (LBSP) over a wireless network.  ... 
doi:10.25046/aj040104 fatcat:q4e6xqyvz5duhdaezi6pnhxhbi

Incentive Mechanisms for Mobile Crowd Sensing: Current States and Challenges of Work [article]

Jiajun Sun
2014 arXiv   pre-print
Based on the architecture, we discuss various research challenges about incentive mechanism designs for MCS applications, followed by potential future work discussions.  ...  To better meet the demands of MCS applications at a societal scale, incentive mechanisms are indispensable.  ...  Our bidding-model based privacy-preserving verifiable incentive mechanism for MCS applications.  ... 
arXiv:1310.8364v2 fatcat:idpwttacungprh2eqnhc3i2nry

Protecting privacy for group nearest neighbor queries with crowdsourced data and computing

Tanzima Hashem, Mohammed Eunus Ali, Lars Kulik, Egemen Tanin, Anthony Quattrone
2013 Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing - UbiComp '13  
User privacy in location-based services (LBSs) has become an important research area.  ...  We focus on the group nearest neighbor (GNN) query that allows a group to meet at their nearest point of interest such as a restaurant that minimizes the total or maximum distance of the group.  ...  Threat Model Evaluating k GNNs from a data set depends on the locations of all group members. For privacy preserving kGNN queries, users do not reveal their locations to others.  ... 
doi:10.1145/2493432.2494524 dblp:conf/huc/HashemAKTQ13 fatcat:pasna6d6qvatrhmyq7iku4mjji

Proposing a Secure Cloud Database Storage [SCDS] Model

Amit Chaturvedi, Akanksha Kapoor, Harish Chandra Morya
2017 International Journal of Advanced Research in Computer Science and Software Engineering  
Being service based, there's no storage hardware to buy, manage and maintain, and depending on the service, it can greatly reduce, if not eliminate, data center and storage administrator costs.  ...  Here in this paper we have proposed a Secure Cloud Database Storage [SCDS] Model for improving the customer's satisfaction in third party cloud servers for database storage.  ...  Xiaofen Wang discussed One-round secure fair meeting location determination based on homomorphic encryption.  ... 
doi:10.23956/ijarcsse/v7i3/0144 fatcat:fyetg5igpfc6zpqcti6k3obpw4

Achieving Efficient Query Privacy for Location Based Services [chapter]

Femi Olumofin, Piotr K. Tysowski, Ian Goldberg, Urs Hengartner
2010 Lecture Notes in Computer Science  
Mobile smartphone users frequently need to search for nearby points of interest from a location based service, but in a way that preserves the privacy of the users' locations.  ...  We also measured the performance of our query technique on a smartphone and wireless network.  ...  Acknowledgments We would like to thank the anonymous reviewers for their helpful comments for improving this paper. We also gratefully acknowledge NSERC and MITACS for funding this research.  ... 
doi:10.1007/978-3-642-14527-8_6 fatcat:swyk6v2fyrbx7kmcz6lhx4elfe

P2DCA: A Privacy-Preserving based Data Collection and Analysis Framework for IoMT Applications

Muhammad Usman, Mian Ahmad Jan, Xiangjian He, Jinjun Chen
2019 IEEE Journal on Selected Areas in Communications  
In this paper, we propose an efficient privacy-preserving-based data collection and analysis framework for IoMT applications.  ...  Therefore, there is a need to preserve the privacy of MSNs during mobile data collection.  ...  In this paper, we propose an efficient privacy-preserving-based data collection and analysis framework for IoMT applications.  ... 
doi:10.1109/jsac.2019.2904349 fatcat:4h5uryourvcfbcomrfuqyo7zgu

Implementation and performance evaluation of privacy-preserving fair reconciliation protocols on ordered sets

Daniel A. Mayer, Dominik Teubert, Susanne Wetzel, Ulrike Meyer
2011 Proceedings of the first ACM conference on Data and application security and privacy - CODASPY '11  
Furthermore, we present details on the implementation of a privacy-preserving iPhone application built on top of this library.  ...  In particular, we present the design of a library for privacy-preserving reconciliation protocols and provide details on an efficient C++ implementation of this design.  ...  Our proof-of concept iPhone application is a first step to investigate whether or not privacy-preserving applications are already viable on smartphones.  ... 
doi:10.1145/1943513.1943529 dblp:conf/codaspy/MayerTWM11 fatcat:cxdik5gg2jfi7ofqs4j5ofawqa

Privacy-Preserving Positioning in Wi-Fi Fine Timing Measurement

Domien Schepers, Aanjhan Ranganathan
2022 Proceedings on Privacy Enhancing Technologies  
We address these shortcomings and present a privacy-preserving passive positioning system that leverages existing Wi-Fi FTM infrastructure and requires no hardware changes.  ...  In this paper, we perform the first privacy analysis of Wi-Fi FTM and evaluate devices from a wide variety of vendors. We find the protocol inherently leaks location-sensitive information.  ...  Acknowledgments We would like to thank our shepherd Travis Mayberry and reviewers for their valuable feedback. This work was partially supported by NSF grant 1850264.  ... 
doi:10.2478/popets-2022-0048 fatcat:7lu3fotup5ftzcwh3f5omrtm4a

Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices

Igor Bilogrevic, Murtuza Jadliwala, Vishal Joneja, Kubra Kalkan, Jean-Pierre Hubaux, Imad Aad
2014 IEEE Transactions on Information Forensics and Security  
Similar planning tools for determining optimal meeting locations, based on the location preferences of the users, are highly desirable for event planning and management in popular mobile phone applications  ...  In this paper, we address the problem of privacy-preserving optimal meetinglocation computation, especially focusing on its applicability to current mobile devices and applications.  ...  Nevertheless, as time scheduling and location determination are two fundamentally different problems, no such work seems to exist for the privacy-preserving meeting location problem.  ... 
doi:10.1109/tifs.2014.2318435 fatcat:el5vs7iz6jcrdaekez3dljfpba

Privacy-Preserving Indoor Localization on Smartphones

Andreas Konstantinidis, Georgios Chatzimilioudis, Demetrios Zeinalipour-Yazti, Paschalis Mpeis, Nikos Pelekis, Yannis Theodoridis
2015 IEEE Transactions on Knowledge and Data Engineering  
On the other hand, predominant Smartphone OS localization subsystems currently rely on server-side localization processes, allowing the service provider to know the location of a user at all times.  ...  In this paper, we propose an innovative algorithm for protecting users from location tracking by the localization service, without hindering the provisioning of fine-grained location updates on a continuous  ...  , Data Mining, and Privacy" and (DATASIM) "DATA science for SIMulating the era of electric vehicles", and an industrial award by MTN Cyprus.  ... 
doi:10.1109/tkde.2015.2441724 fatcat:zrfqj7hfwzajddorunhbmnhy5y
« Previous Showing results 1 — 15 out of 3,601 results