Filters








946 Hits in 6.2 sec

The Interface of Privacy and Data Security in Automated City Shuttles: The GDPR Analysis

Meriem Benyahya, Sotiria Kechagia, Anastasija Collen, Niels Alexander Nijdam
2022 Applied Sciences  
Secondly, the compatibility of privacy laws with security technologies focusing on the gap between the legal definitions and the technological implementation of privacy-preserving techniques are discussed  ...  The interdisciplinary approach will ensure that the overlapping stakeholder roles and the blurring implementation of data privacy-preserving techniques within the ACSs landscape are efficiently addressed  ...  Acknowledgments: The photo in Figure 1 was provided by the Geneva Public Transport, Switzerland. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/app12094413 fatcat:zveop6hjdrc4hkht77didszh2e

Lightweight Cryptographic Techniques for Automotive Cybersecurity

Ahmer Khan Jadoon, Licheng Wang, Tong Li, Muhammad Azam Zia
2018 Wireless Communications and Mobile Computing  
This article presents a survey about developments in vehicular networks from the perspective of lightweight cryptographic protocols and privacy preserving algorithms.  ...  Vehicular networks are unique in terms of characteristics, challenges, architecture, and applications.  ...  Li et al. proposed a malware detection system based on permission usage analysis by significant permission identification technique. 3 levels of pruning by mining the permission data are developed to identify  ... 
doi:10.1155/2018/1640167 fatcat:nitjuwgn2jffjjdcif5fez7t4u

Privacy-Preserving Schemes for Ad Hoc Social Networks: A Survey

Mohamed Amine Ferrag, Leandros Maglaras, Ahmed Ahmim
2017 IEEE Communications Surveys and Tutorials  
In this paper, we review the state of the art of privacy-preserving schemes for ad hoc social networks, including, mobile social networks (MSNs) and vehicular social networks (VSNs).  ...  With this survey, readers can have a more thorough understanding of research trends in privacy-preserving schemes for ad hoc social networks.  ...  In addition, PACP is efficient in terms of protocol latency analysis and comparison of search times for revocation.  ... 
doi:10.1109/comst.2017.2718178 fatcat:pmlbjv3dnvfclfoqg2pnxlc7mi

A Privacy-Preserving Fog Computing Framework for Vehicular Crowdsensing Networks

Jiannan Wei, Xiaojie Wang, Nan Li, Guomin Yang, Yi Mu
2018 IEEE Access  
In this paper, a fog-based privacy-preserving scheme is proposed to enhance the security of the vehicular crowdsensing network.  ...  In this paper, a fog-based privacy-preserving scheme is proposed to enhance the security of the vehicular crowdsensing network.  ...  ACKNOWLEDGMENT The authors wish to thank the reviewers for their helpful comments.  ... 
doi:10.1109/access.2018.2861430 fatcat:jdyurlqwrvhnzjts4qqqgdktju

Blockchain-Enabled Vehicular Ad Hoc Networks: A Systematic Literature Review

Muhammad Saad, Muhammad Khalid Khan, Maaz Bin Ahmad
2022 Sustainability  
The techniques, limitations, and advantages of blockchain deployment in VANETs are discussed for the effective implementation of a decentralized network.  ...  Therefore, this study also emphasizes the identification of any blockchain-related open issues for future prospects.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/su14073919 fatcat:tvcdbygjkjea3a3u55amrftkha

Table of Contents

2018 2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA)  
264 Privacy Preserving Data Aggregation On Secure Cloud 265 A Skill Based Image Grid Authentication Scheme 266 Pob Number System Based Multi-Image Secret Sharing 267 Ram Forensics: The Analysis  ...  Data Technologies : A Survey 219 Survey On Frequent Item-Set Mining Approaches In Market Basket Analysis 220 Privacy-Preserving Outsourced Mining Of D-Eclat Association Rules On Vertically Partitioned  ... 
doi:10.1109/iccubea.2018.8697655 fatcat:jvjgmcrh3fhxtkf4kyydawnkiq

A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks

Chun-Ta Li, Min-Shiang Hwang, Yen-Ping Chu
2008 Computer Communications  
Privacy and security should be paid much more attention in secure vehicular ad hoc networks (VANETs).  ...  techniques into the scheme in allowing mobile vehicles to anonymously interact with the services of roadside infrastructure.  ...  ) but also provides the advantage of user privacy preservation.  ... 
doi:10.1016/j.comcom.2007.12.005 fatcat:pujum4l6rjd2bjjevhan4snrqe

Blockchain-Based Secure Data Storage for Distributed Vehicular Networks

Muhammad Umar Javed, Mubariz Rehman, Nadeem Javaid, Abdulaziz Aldegheishem, Nabil Alrajeh, Muhammad Tahir
2020 Applied Sciences  
In this paper, a blockchain-based secure data sharing mechanism is proposed for Vehicular Networks (VNs).  ...  It is used to tackle the issues related to data storage in centralized architectures, such as data tampering, lack of privacy, vulnerability to hackers, etc.  ...  sharing scenario Efficient access control and permission levels Data chain and behaviour chain is used for data sharing Security and privacy preserving data sharing systems Proposed system is  ... 
doi:10.3390/app10062011 fatcat:flgkbzadvrbn5nig52vajk6c3i

Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes [article]

Mohamed Amine Ferrag, Leandros Maglaras, Antonios Argyriou, Dimitrios Kosmanos, Helge Janicke
2017 arXiv   pre-print
In addition, we provide a taxonomy and comparison of authentication and privacy-preserving schemes for 4G and 5G cellular networks in form of tables.  ...  The countermeasures and informal and formal security analysis techniques used by the authentication and privacy preserving schemes are summarized in form of tables.  ...  VII. summarizes the informal and formal security analysis techniques used in authentication and privacy preserving schemes for 4G and 5G Cellular Networks.  ... 
arXiv:1708.04027v1 fatcat:lozrjocwq5eblkams72kk4rv6i

A Privacy-Preservation Framework based on Biometrics Blockchain (BBC) to Prevent Attacks in VANET

Abdullah Alharthi, Qiang Ni, Richard Jiang
2021 IEEE Access  
In another work authors have proposed a technique in vehicleto-grid (V2G) networks to enable data sharing without compromising user data safety using blockchain.  ...  On the one hand, communication in VANET shall provide privacy preservation by employing anonymity of vehicles.  ... 
doi:10.1109/access.2021.3086225 fatcat:fs3sdya6kfaebj5lo3vmn542xe

Modeling Adversarial Behavior Against Mobility Data Privacy

Roberto Pellungrini, Luca Pappalardo, Filippo Simini, Anna Monreale
2020 IEEE transactions on intelligent transportation systems (Print)  
Privacy risk assessment is a crucial issue in any privacy-aware analysis process.  ...  In this work, we propose Simulated Privacy Annealing (SPA), a new adversarial behavior model for privacy risk assessment in mobility data.  ...  Many privacy-preserving techniques for human mobility data have been proposed in literature [12] .  ... 
doi:10.1109/tits.2020.3021911 fatcat:i7krbpufcnhudcunzukwz5yph4

Recommender system for privacy-preserving solutions in smart metering

Juan E. Rubio, Cristina Alcaraz, Javier Lopez
2017 Pervasive and Mobile Computing  
However, Smart Meters introduce many privacy issues if consumption data is analysed. In this paper we analyse the main techniques that address privacy when collecting electricity readings.  ...  In addition to privacy, it is equally important to preserve efficiency to carry on with monitoring operations, so further control requirements and communication protocols are also studied.  ...  In addition, this work has been partially supported by the Spanish Ministry of Economy and Competitiveness through the PERSIST (TIN2013-41739-R) and SMOG (TIN2016-79095-C2-1-R) projects.  ... 
doi:10.1016/j.pmcj.2017.03.008 fatcat:77lfptdl2ffapcwjum4i6m4hou

Security and Privacy in IoT Using Machine Learning and Blockchain: Threats Countermeasures [article]

Nazar Waheed, Xiangjian He, Muhammad Ikram, Muhammad Usman, Saad Sajid Hashmi, Muhammad Usman
2020 arXiv   pre-print
Security and privacy of the users have become significant concerns due to the involvement of the Internet of things (IoT) devices in numerous applications.  ...  However, these studies target either security or privacy issues using ML algorithms or BC techniques, thus posing a need for a combined survey on efforts made in recent years addressing both security and  ...  In the future, we aim to design and develop a privacy-preserving IoT framework, which will offer privacy-preserving data sharing and privacy-preserving data analysis.  ... 
arXiv:2002.03488v4 fatcat:cxavellepncexgkfcs5phdj53u

DIFFERENTIAL PRIVACY FOR IOT-ENABLED CRITICAL INFRASTRUCTURE: A COMPREHENSIVE SURVEY

Muhammad Akbar Husnoo, Adnan Anwar, Ripon K. Chakrabortty, Robin Doss, Mike J. Ryan
2021 IEEE Access  
Adversaries carry out privacy-oriented attacks to gain access to the sensitive and confidential data of critical infrastructure for various self-centered, political and commercial gains.  ...  Therefore, Dwork's differential privacy has emerged as the most viable privacy preservation strategy for IoT-enabled critical infrastructure.  ...  loss enables the control on the amount of information leakage allowed whilst preserving data utility and comparison of the different techniques of privacy preservation [23] , [24] , [83] .  ... 
doi:10.1109/access.2021.3124309 fatcat:vejtyjyrwffeffi7ob2o2svyja

In Depth Analysis of Attacks & Countermeasures in Vehicular Ad Hoc Network

Naziya Hussain, Anoop Singh, Piyush Kumar Shukla
2016 International Journal of Software Engineering and Its Applications  
A vehicular ad hoc network (VANETs) is very important factor for improving the road safety and comforting of the travelers.  ...  It's associate spontaneous network for the longer term Intelligent Transport System (ITS) sensible progress achieved by the investigator on study of Vehicular Ad hoc Network.  ...  Anoop Singh has given me additional support for my research design, data collection, analysis and interpretation.  ... 
doi:10.14257/ijseia.2016.10.12.29 fatcat:xxmgwvakyzbs5hctuyunwslguq
« Previous Showing results 1 — 15 out of 946 results