Filters








35,665 Hits in 3.9 sec

Maintaining trajectory privacy in mobile wireless sensor networks

Osman Kiraz, Albert Levi
2013 2013 IEEE Conference on Communications and Network Security (CNS)  
In this study, we propose a scheme for providing trajectory privacy of mobile sink nodes. The proposed scheme is based on random distribution of data packets.  ...  The results show that a network with up to 99% data delivery rate can be obtained by appropriate configuration while maintaining a fair level of trajectory privacy of the mobile sink node.  ...  The mote-level assumption is fair enough since otherwise analytically no defense system can maintain the privacy of mobile sink node.  ... 
doi:10.1109/cns.2013.6682748 dblp:conf/cns/KirazL13 fatcat:h4gmrgts3fhzvp6h73pihg222u

Privacy-Aware Infrastructure for Managing Personal Data

Yousef Amar, Hamed Haddadi, Richard Mortier
2016 Proceedings of the 2016 conference on ACM SIGCOMM 2016 Conference - SIGCOMM '16  
The Databox seeks to enable all the advantages of personal data analytics while at the same time enforcing accountability and control in order to protect a user's privacy.  ...  Alongside this surge, concerns over privacy, trust, and security are expressed more and more as different parties attempt to take advantage of this rich assortment of data.  ...  To data subjects, the advantages of control over privacy and personal analytics is obvious.  ... 
doi:10.1145/2934872.2959054 dblp:conf/sigcomm/AmarHM16 fatcat:lisjtahrrvda5nei777ypkhix4

2020 Index IEEE Transactions on Cloud Computing Vol. 8

2021 IEEE Transactions on Cloud Computing  
-March 2020 256-268 Privacy Aware Data Deduplication for Side Channel in Cloud Storage. Revenue Maximization for Dynamic Expansion of Geo-Distributed Cloud Data Centers.  ...  -March 2020 17-31 Cryptographic protocols Privacy Aware Data Deduplication for Side Channel in Cloud Storage.  ...  Frequency control Performance-Based Pricing in Multi-Core Geo-Distributed Cloud Computing. Lucanin, D., +, TCC Oct.-Dec. 2020  ... 
doi:10.1109/tcc.2021.3055041 fatcat:nppinqsievad3gr42ppehwp7yi

A Survey on Secure Data Analytics in Edge Computing

Dan Liu, Zheng Yan, Wenxiu Ding, Mohammed Atiquzzaman
2019 IEEE Internet of Things Journal  
Unfortunately, edge computing brings new security and privacy challenges when applied to data analytics.  ...  awareness.  ...  awareness and mobility due to its proximity to terminal devices.  ... 
doi:10.1109/jiot.2019.2897619 fatcat:fqmkiuse4vgafhiexe4ymqtx6m

A planetary nervous system for social mining and collective awareness

F. Giannotti, D. Pedreschi, A. Pentland, P. Lukowicz, D. Kossmann, J. Crowley, D. Helbing
2012 The European Physical Journal Special Topics  
Trusted networks and privacy-aware social mining is aimed at creating a new deal around the questions of privacy and data ownership empowering individual persons with full awareness and control on own  ...  mining, and the idea of trust networks and privacy-aware social mining.  ...  Trusted networks and privacy-aware social mining is aimed at creating a new deal around the questions of privacy and data ownership.  ... 
doi:10.1140/epjst/e2012-01688-9 fatcat:4bjj4ukpzvhd5fhpt2xnf45eli

Privacy-by-design in big data analytics and social mining

Anna Monreale, Salvatore Rinzivillo, Francesca Pratesi, Fosca Giannotti, Dino Pedreschi
2014 EPJ Data Science  
discovery opportunities of social mining and big data analytical technologies.  ...  Privacy is ever-growing concern in our society and is becoming a fundamental aspect to take into account when one wants to use, publish and analyze data involving human personal sensitive information.  ...  Acknowledgements This work has been partially supported by EU FET-Open project DATA SIM (FP7-ICT 270833) and EU Project PETRA n. 609042 (FP7-SMARTCITIES-2013).  ... 
doi:10.1140/epjds/s13688-014-0010-4 fatcat:z5jzjxbeqfdi3ko2rj3sok4dpi

Toward privacy-aware federated analytics of cohorts for smart mobility

Martin Gjoreski, Matías Laporte, Marc Langheinrich
2022 Frontiers in Computer Science  
We conclude that privacy-aware LBA can be achieved using existing mobile technologies and federated analytics.  ...  This study presents a novel privacy-aware approach to location-based federated analytics that removes the need for individuals to share their location traces with a central server.  ...  the cohort), enabling privacy-aware analytics.  ... 
doi:10.3389/fcomp.2022.891206 fatcat:wf5lkmevx5dmbpre4znlt64n7u

The Accuracy-Privacy Trade-off of Mobile Crowdsensing

Mohammad Abu Alsheikh, Yutao Jiao, Dusit Niyato, Ping Wang, Derek Leong, Zhu Han
2017 IEEE Communications Magazine  
We firstly define the individual contributions of crowdsensing users based on the accuracy in data analytics achieved by the service provider from buying their data.  ...  This article addresses the contradicting incentives of privacy preservation by crowdsensing users and accuracy maximization and collection of true data by service providers.  ...  Several major questions related to developing privacy-aware incentive models in mobile crowdsensing arise. First, how does M. Abu Alsheikh, Y. Jiao, D. Niyato, and P.  ... 
doi:10.1109/mcom.2017.1600737 fatcat:7umd2g2cd5ewjasdcg5s5x2jkm

The Accuracy-Privacy Tradeoff of Mobile Crowdsensing [article]

Mohammad Abu Alsheikh, Yutao Jiao, Dusit Niyato, Ping Wang, Derek Leong, Zhu Han
2017 arXiv   pre-print
We firstly define the individual contributions of crowdsensing users based on the accuracy in data analytics achieved by the service provider from buying their data.  ...  This article addresses the contradicting incentives of privacy preservation by crowdsensing users and accuracy maximization and collection of true data by service providers.  ...  Several major questions related to developing privacy-aware incentive models in mobile crowdsensing arise. First, how does M. Abu Alsheikh, Y. Jiao, D. Niyato, and P.  ... 
arXiv:1702.04565v1 fatcat:wuypzx5tovc2pdvw22i4he2xwe

Wide-Area Data Analytics [article]

Rachit Agarwal, Jen Rexford with contributions from numerous workshop attendees
2020 arXiv   pre-print
We increasingly live in a data-driven world, with diverse kinds of data distributed across many locations.  ...  Wide-area data analytics is any analysis of data that is generated by, or stored at, geographically dispersed entities.  ...  The emergence of these policies also drive user awareness and concern about privacy. ◗ Geo-distributed applications may analyze or combine data from multiple owners, who each want control over how their  ... 
arXiv:2006.10188v1 fatcat:gwphgw7kz5cjxldmpxlab2jqry

Towards Low Cost Prototyping of Mobile Opportunistic Disconnection Tolerant Networks and Systems

Milena Radenkovic, Jon Crowcroft, Mubashir Husain Rehmani
2016 IEEE Access  
We show deployment and analysis of two vastly different complex networking systems: a fault and disconnection-aware smart manufacturing sensor network and cognitive privacy for personal clouds.  ...  , real-time content processing, and real-time environment sensing with predictive analytics.  ...  and second, privacy aware mobile personal clouds (CogPriv) [4] .  ... 
doi:10.1109/access.2016.2606501 fatcat:maeic32geffvhpjrad63fgr2yy

Moving from cloud to fog: scenarios and security concerns

Aradhana
2018 International Journal of Recent Scientific Research  
Consequently skyrocketing data access needs require a new paradigm that can provide wide spread geographical distribution, location awareness and low latency.  ...  We discuss security and privacy issues in FC and state of the art of Fog Computing.  ...  In addition, FC supports mobility, location awareness and latency sensitive services.  ... 
doi:10.24327/ijrsr.2018.0904.1976 fatcat:4oyi5a2eabeapfncsqkhbbfcra

Ambient Privacy with Wireless Grids: Forging New Concepts of Relationship in 21st Century Information Society

H. Patricia McKenna, Marilyn P. Arnone, Michelle L. Kaarst-Brown, Lee W. McKnight, Sarah Chauncey
2014 International Journal for Information Security Research  
Use experience with WeJay social radio is explored in a virtual distributed environment. The research design incorporates a case study approach, employing multiple methods of inquiry and analysis.  ...  This research proposes an ambient privacy interaction dynamic; an ambient privacy research framework; and an agenda to guide ambient privacy research and practice for a 21 st century information society  ...  With the abundance of data generated in mobile environments, Johnson et al. [7] highlight the importance of learning analytics "for deciphering trends and patterns from educational big data."  ... 
doi:10.20533/ijisr.2042.4639.2014.0047 fatcat:kb5rqzmv6zg6hpq3cizkqkpoja

Privacy analytics

Hamed Haddadi, Richard Mortier, Steven Hand
2012 Computer communication review  
privacy, mobile computing and data mining.  ...  Users' mobile handsets could act as an interface to the Privacy Analytics Framework, enabling privacy preserving access to fine-grained energy consumption data.  ... 
doi:10.1145/2185376.2185390 fatcat:fa6emusj7zdxtjd3zgx5fkdxve

A Survey of IoT Stream Query Execution Latency Optimization within Edge and Cloud

Fatima Abdullah, Limei Peng, Byungchul Tak, Xiaojie Wang
2021 Wireless Communications and Mobile Computing  
IoT (Internet of Things) streaming data has increased dramatically over the recent years and continues to grow rapidly due to the exponential growth of connected IoT devices.  ...  To achieve better query performance and quality, researchers and practitioners have developed various types of query execution models—purely cloud-based, geo-distributed, edge-based, and edge-cloud-based  ...  [14] surveyed the WAN-aware geo-distributed data analytics frameworks.  ... 
doi:10.1155/2021/4811018 fatcat:kex7f5r2tzconkhhmjqjavusxi
« Previous Showing results 1 — 15 out of 35,665 results