Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








15,245 Hits in 5.5 sec

Primary Users' Operational Privacy Preservation via Data-Driven Optimization

Jingyi Wang, Yanmin Gong, Lijun Qian, Riku Jaentti, Miao Pan, Zhu Han
2017 GLOBECOM 2017 - 2017 IEEE Global Communications Conference  
Recently opened spectrum within 3550-3700 MHz provides more accessing opportunities to secondary users (SUs), while it also raises concerns on the operational privacy of primary users (PUs), especially  ...  With joint consideration of PUs' privacy and uncertain SUs' demands, we formulate the data-driven risk-averse stochastic optimization, and provide corresponding solutions.  ...  To address the issues above, we propose a novel PUs' obfuscation strategy design, formulate the PUs' operational privacy preservation problem into a data-driven risk-averse optimization, and provide robust  ... 
doi:10.1109/glocom.2017.8254108 dblp:conf/globecom/WangGQJPH17 fatcat:oenxp3vqs5ajpaxz7vsyfkay7u

Differential Privacy in Cognitive Radio Networks: A Comprehensive Survey [article]

Muneeb Ul Hassan, Mubashir Husain Rehmani, Maaz Rehan, Jinjun Chen
2021 arXiv   pre-print
In order to preserve this privacy leakage, various privacy preserving strategies have been developed by researchers, and according to us differential privacy is the most significant among them.  ...  Various capabilities of CR nodes depend upon efficient and continuous reporting of data with each other and centralized base stations, which in turn can cause leakage in privacy.  ...  Operation time is the total activity time of primary user, which is also known as primary user activity time [73] .  ... 
arXiv:2111.02011v2 fatcat:a5hique4fvfxrclslvpgda5jyy

Cognitive Networking for Next-G Wireless Communications

Qingqi Pei, Pin-Han Ho, Yao Liu, Qinghua Li, Lin Chen
2016 International Journal of Distributed Sensor Networks  
The paper entitled "A New Distributed User-Demand-Driven Location Privacy Protection Scheme for Mobile Communication Network" by W.  ...  However, the rap development of smart grid will result in poor data security and privacy preservation. International Journal of Distributed Sensor Networks smart grid, called PAS.  ... 
doi:10.1155/2016/9172605 fatcat:kq4iek6ehfgdnngt3qwq7rqiou

Towards Privacy-Preserving IoT Systems Using Model Driven Engineering

Judith Michael, Lukas Netz, Bernhard Rumpe, Simon Varga
2019 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems  
This paper discusses a way to create privacy-preserving IoT systems using an MDE approach to support privacy and data transparency.  ...  For MDE approaches it is important to consider privacy already on model level.  ...  This data could be collected via smart devices and depth cameras. Every operator has certain Abilities (lines [25] [26] [27] .  ... 
dblp:conf/models/MichaelNRV19 fatcat:qd7m25oqxvf5vdctz7dt76topi

Optimal strategies for defending location inference attack in database-driven CRNs

Long Zhang, Chenliaohui Fang, Yi Li, Haojin Zhu, Mianxiong Dong
2015 2015 IEEE International Conference on Communications (ICC)  
Database-driven Cognitive Radio Network (CRN) has been proposed to replace the requirement of spectrum sensing of terminal devices so that the operation of users is simplified.  ...  However, location privacy issues introduce a big challenge for securing database-driven CRN due to spectrum availability information.  ...  In section IV, we give the location privacy preserving scheme and analyse the maximum location privacy which can be obtained by the users.  ... 
doi:10.1109/icc.2015.7249548 dblp:conf/icc/ZhangFLZD15 fatcat:h63geynjvfahritvwquaur3zom

Table of contents

2021 IEEE Transactions on Smart Grid  
Xue 5158 Data-Driven Distributionally Robust Co-Optimization of P2P Energy Trading and Network Operation for Interconnected Microgrids . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  ...  An Open-Source Simulator for Data-Driven Electric Vehicle Charging Research . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  ...  Data Analytics and Big Data Applications to Microgrids and ADNs  ... 
doi:10.1109/tsg.2021.3119763 fatcat:q4lez7najrcr5gv7idprsd52oy

Big Data Analytics in Cloud Environments

Pradeep C, Prof. Rahul Pawar
2024 International Journal of Research Publication and Reviews  
Cloud computing empowers big data analytics, transforming it into a powerful engine for data-driven decisions, uncovering hidden insights, and fueling innovation.  ...  and analyzing data.  ...  This aids businesses in minimizing downtime and preserving operations even in the case of natural disasters or hardware malfunctions.  ... 
doi:10.55248/gengpi.5.0324.07105 fatcat:rptgo73abbhazpj55zjihfjbtu

Finding Optimal Path and Privacy Preserving for Wireless Network

Manasi Kiranagi, Devika Dhoble, Madeeha Tahoor, Dr. Rekha Patil
2022 International Journal for Research in Applied Science and Engineering Technology  
We explicitly examine the privacyutility trade-off problem for wireless networks and develop a novel privacy-preserving routing algorithm called Optimal Privacy Enhancing Routing Algorithm (OPERA).  ...  OPERA uses a statistical decision-making framework to optimize the privacy of the routing protocol given a utility (or cost) constraint.  ...  Using ANOC, they can perform network coding to achieve a higher throughput, while still preserving user privacy in wireless mesh networks.  ... 
doi:10.22214/ijraset.2022.46949 fatcat:43mprab6sraollyoy6n3dox26u

Capturing Users' Privacy Expectations To Design Better Smart Car Applications

Nadine Ostern, Arved Eßer, Peter Buxmann
2018 Pacific Asia Conference on Information Systems  
Smart cars learn from gathered operating data to add value to the users' driving experience and increase security.  ...  Continuous collection of data can defy users' privacy expectations, which may lead to reluctant usage or even refusal to accept services offered by smart car providers.  ...  Acknowledgements This work has been supported by the Center for Research in Security and Privacy (CRISP), funded by BMBF and HMWK.  ... 
dblp:conf/pacis/OsternEB18 fatcat:2dtfuu2j7vbe3p2wdvjjexfebe

Security and Enforcement in Spectrum Sharing

Jung-Min Park, Jeffrey H. Reed, A. A. Beex, T. Charles Clancy, Vireshwar Kumar, Behnam Bahrak
2014 Proceedings of the IEEE  
In this paper, we review some of the critical security and privacy threats that impact spectrum sharing.  ...  In other words, operational privacy of PUs is the confidentiality of information regarding the primary users' operational characteristic.  ...  However, to the best of our knowledge, there is no existing work that addresses the problem of the primary users' operational privacy in the context of database-driven spectrum sharing. B.  ... 
doi:10.1109/jproc.2014.2301972 fatcat:k45w2ty4rzc57gjgflncrddkza

Optimization of Privacy-Utility Trade-offs under Informational Self-determination [article]

Thomas Asikis, Evangelos Pournaras
2018 arXiv   pre-print
There are several techniques that mask user-generated data to ensure privacy, e.g. differential privacy.  ...  Nevertheless, third parties that run and manage these systems (data consumers) do not always guarantee users' privacy.  ...  Individual privacy is still preserved for all users and their privacy settings.  ... 
arXiv:1710.03186v2 fatcat:6g53qtkfrbazfeaz4l26rfe7vi

User-Centric Privacy Preservation Solution to Control Third Party Access in Digital Databases

Muditha Tissera, Samantha Thelijjagoda, Jeevani Goonathilake
2017 Zenodo  
Such coarse-grain privacy preservation leads to violate individual's specific privacy requirements. Simply, user-centric privacy preservation is not guaranteed.  ...  The author attempts to solve this human critical problem by proposing a fine-grain privacy preservation solution.  ...  User-centric privacy User-Centric Privacy Preservation is a forward-thinking that extends beyond the general policy driven privacy enforcements. Privacy is a human right.  ... 
doi:10.5281/zenodo.3951349 fatcat:wtkemiwecngbtewxjpkdxtkume

Location Privacy in Cognitive Radio Networks: A Survey

Mohamed Grissa, Bechir Hamdaoui, Attila A. Yavuza
2017 IEEE Communications Surveys and Tutorials  
Despite the great benefits that CRNs offer in terms of their ability to improve spectrum utilization efficiency, they suffer from user location privacy issues.  ...  ' privacy.  ...  To find the optimal cloaking strategy, each SP projects its original sensing data to a single-dimensional space, with minimal data distortion [225] , using a privacy-preserving non-invertible projection  ... 
doi:10.1109/comst.2017.2693965 fatcat:4jkyw7tyxrcdzbbm5uocxawsie

Blockchain-empowered Data-driven Networks: A Survey and Outlook [article]

Xi Li, Zehua Wang, Victor C.M. Leung, Hong Ji, Yiming Liu, Heli Zhang
2021 arXiv   pre-print
For future data-driven networks (DDNs), blockchain is considered as a promising solution to enable the secure storage, sharing, and analytics of data, privacy protection for users, robust, trustworthy  ...  The paths leading to future networks are pointing towards a data-driven paradigm to better cater to the explosive growth of mobile services as well as the increasing heterogeneity of mobile devices, many  ...  Future Data-driven Networks The rapid development and widespread of data-driven applications have brought promising opportunities to reshape the Internet architectures as well as operation and optimization  ... 
arXiv:2101.12375v1 fatcat:7f6udfdxajczxc6bjqdyzb3hyi

A Review on Achieving Cloud Security using Third Party Auditor and Preserving Privacy for Shared Data over Public Cloud

Chakresh Kumar, Dr. Annamalai Giri A. A
2023 International Journal of Advanced Research in Science, Communication and Technology  
In the present paper a review related to Achieving Cloud Security using Third Party Auditor and Preserving Privacy for Shared Data over Public Cloudwas done.  ...  The access control is used to segregate users from data owners, and only those users who have been allowed access by the data owners can access the owner's data.  ...  A novel data driven scheduling is also developed for data processing optimization.  ... 
doi:10.48175/ijarsct-12044 fatcat:yvukdlxu5bdszfne3iql34xz4u
« Previous Showing results 1 — 15 out of 15,245 results