Filters








24,304 Hits in 6.2 sec

Vulnerability Characterization and Privacy Quantification for Cyber-Physical Systems

Arpan Bhattacharjee, Shahriar Badsha, Md Tamjid Hossain, Charalambos Konstantinou, Xueping Liang
2021 2021 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, Physical & Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics)  
First, we introduce a Standard Vulnerability Profiling Library (SVPL) by arranging the nodes of an energy-CPS from maximum to minimum vulnerable based on their privacy loss.  ...  However, most of the existing solutions have drawbacks, such as (i) lack of a proper vulnerability characterization model to accurately identify where privacy is needed, (ii) ignoring data providers privacy  ...  In the VAAG, every malicious attack (a ∈ E) is the result of a vulnerability C(e) on that node according to two privacy risk factors: Privacy Loss Magnitude (PLM) and Frequency of Privacy Loss Events (  ... 
doi:10.1109/ithings-greencom-cpscom-smartdata-cybermatics53846.2021.00045 fatcat:7ddy5t4gurchbnyplsz4ozjst4

Vulnerability Characterization and Privacy Quantification for Cyber-Physical Systems [article]

Arpan Bhattacharjee, Shahriar Badsha, Md Tamjid Hossain, Charalambos Konstantinou, Xueping Liang
2021 arXiv   pre-print
First, we introduce a Standard Vulnerability Profiling Library (SVPL) by arranging the nodes of an energy-CPS from maximum to minimum vulnerable based on their privacy loss.  ...  However, most of the existing solutions have drawbacks, such as (i) lack of a proper vulnerability characterization model to accurately identify where privacy is needed, (ii) ignoring data providers privacy  ...  In the VAAG, every malicious attack (a ∈ E) is the result of a vulnerability C(e) on that node according to two privacy risk factors: Privacy Loss Magnitude (PLM) and Frequency of Privacy Loss Events (  ... 
arXiv:2110.15417v2 fatcat:hxzvh6c7izc55i5iqvwkgwh6vq

On the Anonymity Risk of Time-Varying User Profiles

2017 Entropy  
We propose an information-theoretic approach to measure the differential update of the anonymity risk of time-varying user profiles.  ...  Every time a user publishes a new post or creates a link with another entity, either another user, or some online resource, new information is added to the user profile.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/e19050190 fatcat:jggfrwzgdvf2bh3iersapzhe7i

Towards Understanding the Advertiser's Perspective of Smartphone User Privacy

Yan Wang, Yingying Chen, Fan Ye, Jie Yang, Hongbo Liu
2015 2015 IEEE 35th International Conference on Distributed Computing Systems  
We further propose a privacy leakage inference framework and use real mobility traces and Foursquare data to quantify the consequences of privacy leakage.  ...  Despite recent study on protection mechanisms and analysis on apps' behavior, the understanding about the consequences of such privacy losses remains limited.  ...  In order to apply privacy leakage profiles to this dataset, we generate encounter events between participants as follows: for a particular venue, we give a visiting duration with a random length ranging  ... 
doi:10.1109/icdcs.2015.37 dblp:conf/icdcs/WangCYYL15 fatcat:o35u3rhb4vddranltirpfgvyfe

Privacy-by-design in big data analytics and social mining

Anna Monreale, Salvatore Rinzivillo, Francesca Pratesi, Fosca Giannotti, Dino Pedreschi
2014 EPJ Data Science  
As a result, privacy preservation simply cannot be accomplished by de-identification alone.  ...  In this paper, we propose the privacy-by-design paradigm to develop technological frameworks for countering the threats of undesirable, unlawful effects of privacy violation, without obstructing the knowledge  ...  to reveal zones with high frequency of movement events; (d) from the centroids of each cluster it is derived a voronoi tessellation of the territory; (e) original trajectories are generalized as sequence  ... 
doi:10.1140/epjds/s13688-014-0010-4 fatcat:z5jzjxbeqfdi3ko2rj3sok4dpi

POSTER

Qiuyu Xiao, Jiayi Chen, Le Yu, Huaxin Li, Haojin Zhu, Muyuan Li, Kui Ren
2014 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS '14  
The mobile users are facing a serious risk of losing location privacy (e.g., users' location information transmitted by open advertisement network, and the reported event of involuntary tracking of mobile  ...  With users' location profiles, LocMask can automatically determines the sensitiveness of these locations as well as their corresponding privacy protection level.  ...  Location Profile Building Module One of the main features of LocMask is to correlate the privacy protection levels of different locations with users' location profiles, which can naturally differentiate  ... 
doi:10.1145/2660267.2662367 dblp:conf/ccs/XiaoCYLZLR14 fatcat:bsxez5c4kffctnzdyli2sjlsdi

D2P

Rachid Guerraoui, Anne-Marie Kermarrec, Rhicheek Patra, Mahsa Taziki
2015 Proceedings of the VLDB Endowment  
This paper presents D2P, a novel protocol that ensures a strong form of differential privacy, which we call distance-based differential privacy, and which is particularly well suited to recommenders.  ...  D2P avoids revealing exact user profiles by creating altered profiles where each item is replaced with another one at some distance.  ...  In a user-level privacy scheme, more than one event can differ for a profile in two adjacent profile sets, whereas in an event-level privacy approach a single event differs for a profile in two adjacent  ... 
doi:10.14778/2757807.2757811 fatcat:pvpfafba4vcojdmy2pog52ji4u

Privacy and incongruence-focused disaggregation of water consumption data in real time

Georgios Kalogridis, Tim Farnham, James Wilcox, Mohammed Faies
2015 Procedia Engineering  
This paper presents a system of algorithms that identify and detect water activity events, and then analyse disaggregated information to distinguish between privacy-sensitive behaviour and incongruent  ...  While fixture-level disaggregation of water data has a number of applications in decision support systems, it also gives rise to data privacy risks.  ...  Further, in privacy-preserving data mining, the statistical metric of differential privacy [2] studies a class of privacy perturbations that have negligible effect on publicized statistics.  ... 
doi:10.1016/j.proeng.2015.08.950 fatcat:n3zirsqxxvat5pwze5p2u72qga

Extended model for Privacy Enhanced Personalized Web Search Ranking System

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
This results to the acquisition of personalization a major place in Web search. But the use of personalization breaches privacy in searching.  ...  To fulfill user need number of websites and webpages are added .The growing size of web data results to the difficulty in attaining useful information with a minimum clicks.  ...  Two factors are taken for ranking-• Frequency of page visit-Number of times the user visit the page is counted. This record is kept in a database along with URL searched.  ... 
doi:10.35940/ijitee.j1194.0881019 fatcat:ue3oeo6w45ezlmb6kuuxif7jnu

Quantifying Web-Search Privacy

Arthur Gervais, Reza Shokri, Adish Singla, Srdjan Capkun, Vincent Lenders
2014 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS '14  
Then, we quantify privacy of users with respect to linkage attacks.  ...  To illustrate our approach in practice, we analyze and compare privacy of users for two example obfuscation mechanisms on a set of real web-search logs.  ...  Given a set of query events SO, the adversary first 1 Note that in this paper we limit the study on tuples of two events, however more complex structures (e.g. cliques of three or more queries) might improve  ... 
doi:10.1145/2660267.2660367 dblp:conf/ccs/GervaisSSCL14 fatcat:k7nfgxfb7rbadh2znr2p24znha

Assessing the Privacy Cost in Centralized Event-Based Demand Response for Microgrids [article]

Areg Karapetyan, Syafiq Kamarul Azman, Zeyar Aung
2018 arXiv   pre-print
Under the paradigm of differential privacy, this paper initiates a systematic empirical study on quantifying the trade-off between privacy and optimality in centralized DR systems for maximizing cumulative  ...  The theoretical results derived from the analysis are complemented with empirical findings, corroborated extensively by simulations on a 4-bus MG system with up to thousands of customers.  ...  consumption profile and privacy levels.  ... 
arXiv:1703.02382v3 fatcat:tb5grxfmkfgxjagdvyzoxr7k5y

Looking at, looking up or keeping up with people?

Adam N. Joinson
2008 Proceeding of the twenty-sixth annual CHI conference on Human factors in computing systems - CHI '08  
User demographics, site visit patterns and the use of privacy settings were associated with different uses and gratifications.  ...  These phrases were coded into 46 items which were completed by 241 Facebook users in Study 2.  ...  ACKNOWLEDGEMENTS Jeff Hancock, Mina Vasalou, Pam Briggs and Martin Weller are thanked for their advice and comments on an earlier draft of this paper, as are three anonymous reviewers and the associate  ... 
doi:10.1145/1357054.1357213 dblp:conf/chi/Joinson08 fatcat:qzdlpzbjpvfrnoogzbr4ytbnk4

Holistic Privacy for Electricity, Water, and Natural Gas Metering in Next Generation Smart Homes [article]

Cihan Emre Kement, Bulent Tavli, Hakan Gultekin, Halim Yanikomeroglu
2020 arXiv   pre-print
Furthermore, a holistic privacy protection approach for all metered resources must be adopted as the information leak from any of the resources has a potential to render the privacy preserving countermeasures  ...  However, with the growing scarcity of natural resources, utilities other than electricity (such as water and natural gas) have also begun to be subject to HTG metering, which creates privacy issues similar  ...  The most precise metering can be achieved by using ultrasonic sensors with sampling frequency of up to 2 MHz and a resolution of 1.8 mL.  ... 
arXiv:2004.13363v3 fatcat:5np7w6vxjza47f36we2ksmbozq

Routes for breaching and protecting genetic privacy [article]

Yaniv Erlich, Arvind Narayanan
2013 bioRxiv   pre-print
Here, we technically map threats to genetic privacy and discuss potential mitigation strategies for privacy-preserving dissemination of genetic data.  ...  However, one growing concern is the ability to protect the genetic privacy of the data originators.  ...  This study was also supported by a gift from Cathy and Jim Stone.  ... 
doi:10.1101/000042 fatcat:gnmdq2mc2be7phgvcejoxu5clq

Routes for breaching and protecting genetic privacy [article]

Yaniv Erlich, Arvind Narayanan
2013 arXiv   pre-print
Here, we technically map threats to genetic privacy and discuss potential mitigation strategies for privacy-preserving dissemination of genetic data.  ...  However, one growing concern is the ability to protect the genetic privacy of the data originators.  ...  This study was also supported by a gift from Cathy and Jim Stone.  ... 
arXiv:1310.3197v1 fatcat:guexdcofhbhmfi2wblenbno5ni
« Previous Showing results 1 — 15 out of 24,304 results