Filters








195 Hits in 2.5 sec

LAP: Lightweight Anonymity and Privacy

Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim, Adrian Perrig, Akira Yamada, Samuel C. Nelson, Marco Gruteser, Wei Meng
2012 2012 IEEE Symposium on Security and Privacy  
We propose Lightweight Anonymity and Privacy (LAP), an efficient network-based solution featuring lightweight path establishment and stateless communication, by concealing an end-host's topological location  ...  To show practicality, we demonstrate that LAP can work on top of the current Internet and proposed future Internet architectures. IEEE Symposium on Security and Privacy  ...  feedback, and the anonymous reviewers for their valuable comments.  ... 
doi:10.1109/sp.2012.37 dblp:conf/sp/HsiaoKPYNGM12 fatcat:xzpnmg7ulvgmrms4s2vwhle63u

PHI: Path-Hidden Lightweight Anonymity Protocol at Network Layer

Chen Chen, Adrian Perrig
2017 Proceedings on Privacy Enhancing Technologies  
In this paper, we propose PHI, a Path-HIdden lightweight anonymity protocol that solves both challenges while maintaining the same level of efficiency as LAP and Dovetail.  ...  We identify two vulnerabilities for existing highspeed network-layer anonymity protocols, such as LAP and Dovetail.  ...  We also gratefully acknowledge support from ETH Zurich and from the Zurich Information Security and Privacy Center (ZISC).  ... 
doi:10.1515/popets-2017-0007 dblp:journals/popets/ChenP17 fatcat:tikbrtkb4zgqph5ys3blrkeb4q

On Building Onion Routing into Future Internet Architectures [chapter]

Daniele E. Asoni, Chen Chen, David Barrera, Adrian Perrig
2016 Lecture Notes in Computer Science  
We empirically investigate the requirements and trade-offs of different design choices.  ...  User privacy on the Internet has become a pressing concern in recent years largely due to the revelations of large scale network surveillance programs.  ...  Recent research has shown that network-level anonymous networks are not only feasible in practice, but can provide better performance and better privacy to any application.  ... 
doi:10.1007/978-3-319-39028-4_6 fatcat:h6ove4ae5nfvbkips6hxw22asi

Privacy in Internet of Things: from Principles to Technologies

Chao Li, Balaji Palanisamy
2018 IEEE Internet of Things Journal  
Information privacy in IoT is a broad and complex concept as its understanding and perception differ among individuals and its enforcement requires efforts from both legislation as well as technologies  ...  In this paper, we review the state-of-the-art principles of privacy laws, the architectures for IoT and the representative privacy enhancing technologies (PETs).  ...  In [88] , a counter was set to report the accumulated 1s in the data stream at each timestamp and each update value can be added with a Lap( 1 ) noise to guarantee the differential privacy.  ... 
doi:10.1109/jiot.2018.2864168 fatcat:ylasv2g72bghfnzu3do4wiksxq

dPHI: An improved high-speed network-layer anonymity protocol

Alexander Bajic, Georg T. Becker
2020 Proceedings on Privacy Enhancing Technologies  
To solve this problem, lightweight anonymous routing protocols such as LAP, DOVETAIL and most recently PHI have been proposed which are efficient enough to be deployed in a large scale infrastructure such  ...  The security analysis of dPHI includes a detailed quantitative anonymity analysis that compares dPHI with PHI, LAP and HORNET.  ...  The Lightweight Anonymity and Privacy (LAP) protocol [14] is the first proposed protocol in this category.  ... 
doi:10.2478/popets-2020-0054 fatcat:qeqcgfhyyfeqpctr6ny3ua6gpa

Anonymity Online for Everyone: What Is Missing for Zero-Effort Privacy on the Internet? [chapter]

Dominik Herrmann, Jens Lindemann, Ephraim Zimmer, Hannes Federrath
2016 Lecture Notes in Computer Science  
In this paper, we survey suitable lightweight anonymity solutions and present avenues for future research so that Internet service providers can offer anonymity online without compromising performance  ...  and usability, i. e. an effortless solution for customers.  ...  This paper surveys existing research on lightweight anonymity solutions that may be useful to turn this vision into a reality.  ... 
doi:10.1007/978-3-319-39028-4_7 fatcat:iviekmowhrbtzdexwm2u23byom

Dovetail: Stronger Anonymity in Next-Generation Internet Routing [article]

Jody Sankey, Matthew Wright
2014 arXiv   pre-print
We develop a systematic mechanism to measure the topological anonymity of our designs, and we demonstrate the privacy and efficiency of our proposal by simulation, using a model of the complete Internet  ...  Current low-latency anonymity systems use complex overlay networks to conceal a user's IP address, introducing significant latency and network efficiency penalties compared to normal Internet usage.  ...  In Lightweight Anonymity and Privacy (LAP) [18], Hsiao et al. propose the anonymity scheme that inspires our work.  ... 
arXiv:1405.0351v2 fatcat:q52o6bhhwzc2hm4rng66odak6a

Privacy-Preserving Algorithm for Medical Data

Yogesh Shilewar, Gurudev Sawarkar, Rahul Bhandekar
2022 International journal of innovations in engineering and science  
We begin by providing an overview of the privacy hazards of social network data and several sorts of assaults in this study.  ...  We propose a privacy protection algorithm based on privacy privacy to leak confidentiality to sensitive social networks.  ...  Ma et al. [16] aggregate multichip trust chain utilities by leveraging social network users' social attributes and trust relationships to implement friend recommendations, using a lightweight privacy protection  ... 
doi:10.46335/ijies.2022.7.4.24 fatcat:5zp4v3hanbbrrkv5h65rqpwkdy

UAV IoT Framework Views and Challenges: Towards Protecting Drones as "Things"

Thomas Lagkas, Vasileios Argyriou, Stamatia Bibi, Panagiotis Sarigiannidis
2018 Sensors  
However, there are many issues to be resolved before the effective use of UAVs can be made, including security, privacy, and management.  ...  As such, in this paper we review new UAV application areas enabled by the IoT and 5G technologies, analyze the sensor requirements, and overview solutions for fleet management over aerial-networking, privacy  ...  For achieving the aforementioned security and privacy goals, the proposed framework introduces: (a) a lightweight security toolbox, (b) vision-based solutions, and (c) privacy prevention and anonymity  ... 
doi:10.3390/s18114015 fatcat:rrt73vuvjbblxc5pk5bjr7lk4a

Programmable In-Network Obfuscation of Traffic [article]

Liang Wang, Hyojoon Kim, Prateek Mittal, Jennifer Rexford
2020 arXiv   pre-print
This paper presents PINOT, a lightweight in-network anonymity solution that runs at line rate within the memory and processing constraints of hardware switches.  ...  Recent advances in programmable switch hardware offer a fresh opportunity to protect user privacy.  ...  CONCLUSION PINOT is a lightweight in-network anonymity solution that hides users' IP addresses from downstream ASes and destination servers.  ... 
arXiv:2006.00097v1 fatcat:qh4vrnzaejd3pozgw4jjt7pqtu

On lightweight privacy-preserving collaborative learning for internet-of-things objects

Linshan Jiang, Rui Tan, Xin Lou, Guosheng Lin
2019 Proceedings of the International Conference on Internet of Things Design and Implementation - IoTDI '19  
Extensive comparative evaluation shows that this approach outperforms other lightweight approaches that apply additive noisification for differential privacy and/or support vector machines for learning  ...  This paper considers the design and implementation of a practical privacy-preserving collaborative learning scheme, in which a curious learning coordinator trains a better machine learning model based  ...  Yi Li for constructive discussions and Zhenyu Yan for managing the computation resources used in this paper.  ... 
doi:10.1145/3302505.3310070 dblp:conf/iotdi/JiangTLL19 fatcat:z6xrwwr7zjdvfboeoeul5aqszu

Survey on Prominent RFID Authentication Protocols for Passive Tags

Rania Baashirah, Abdelshakour Abuzneid
2018 Sensors  
In this article, we identify and review some of the most recent and enhanced authentication protocols that mainly focus on the authentication between a reader and a tag.  ...  as business, health, and manufacturing areas.  ...  Figure 10 . 10 Lightweight Authentication Protocol (LAP) by Chien. Figure 10 . 10 Lightweight Authentication Protocol (LAP) by Chien.  ... 
doi:10.3390/s18103584 fatcat:e2s6x54k35dljma2jn4tqophkq

Privacy preserving hybrid recommender system based on deep learning

2021 Turkish Journal of Electrical Engineering and Computer Sciences  
In 9 this paper, we address the privacy in hybrid system using Differential Privacy, a rigorous mathematical privacy mechanism 10 in statistical and machine learning systems.  ...  These hybrid systems combine the advantages of both content based and collaborative filtering approaches. 4 However, these learning systems hamper the user privacy and disclose sensitive information.  ...  Lightweight privacy-preserving ensemble classification for face recognition.  ... 
doi:10.3906/elk-2010-40 fatcat:blif5nyiq5cf5cemymauyr243a

Location Privacy Policy Management System [chapter]

Arej Muhammed, Dan Lin, Anna Squicciarini
2012 Lecture Notes in Computer Science  
Few works have sought to help users manage their privacy preferences; however management of privacy is an important issue in real applications.  ...  This work developed an easy-to-use location privacy management system.  ...  Unlike many anonymity approaches, it is lightweight enough to be used without the need for trusted privacy brokers.Obfuscation seeks a balance between the level of privacy of personal information and the  ... 
doi:10.1007/978-3-642-34129-8_41 fatcat:ushxb7byvjhjlaqdsfxssjmmiy

Anonymizing Masses: Practical Light-weight Anonymity at the Network Level [article]

Hooman Mohajeri Moghaddam, Arsalan Mosenia
2019 arXiv   pre-print
Existing overlay anonymity tools, such as the Tor network, suffer from performance limitations and recent proposals to embed anonymity into Internet protocols face fundamental deployment challenges.  ...  In this paper, we introduce Practical Anonymity at the NEtwork Level (PANEL), a practical light-weight anonymity solution based on hardware switching.  ...  Lightweight Anonymity and Privacy (LAP) [11] aims to protect end-host's identity from servers. In LAP, the first AS is trusted, similar to the PANEL design.  ... 
arXiv:1911.09642v1 fatcat:gb354rcl3ncqlpbri4vbi7zfkm
« Previous Showing results 1 — 15 out of 195 results