Filters








11,503 Hits in 3.7 sec

Privacy-preserving assessment of location data trustworthiness

Chenyun Dai, Fang-Yu Rao, Gabriel Ghinita, Elisa Bertino
2011 Proceedings of the 19th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems - GIS '11  
the accuracy of location trustworthiness assessment.  ...  Assessing the trustworthiness of location data corresponding to individuals is essential in several applications, such as forensic science and epidemic control.  ...  We proposed two privacy-preserving techniques for common pattern analysis and conflict/support analysis that can improve trustworthiness of location data with the help of large repositories of anonymized  ... 
doi:10.1145/2093973.2094005 dblp:conf/gis/DaiRGB11 fatcat:2pg54zmpxbbljdqdkqqolyieri

User privacy and data trustworthiness in mobile crowd sensing

Daojing He, Sammy Chan, Mohsen Guizani
2015 IEEE wireless communications  
DATA TRUSTWORTHINESS Data trustworthiness and user privacy preservation are two conflicting objectives in an MCS application.  ...  Strong mechanisms for protecting privacy might influence data trustworthiness. On the other hand, protecting the data trustworthiness counteracts the mechanisms for preserving privacy.  ...  If participants are malicious, they would provide falsified data and it is difficult to identify them especially when different task actions are not linked due to privacy protection.  ... 
doi:10.1109/mwc.2015.7054716 fatcat:lpfgc3pwc5fd5hsy4gxw5hjvl4

Data Security – Challenges and Research Opportunities [chapter]

Elisa Bertino
2014 Lecture Notes in Computer Science  
The proliferation of web-based applications and information systems, and recent trends such as cloud computing and outsourced data management, have increased the exposure of data and made security more  ...  In this paper we briefly discuss open issues, such as data protection from insider threat and how to reconcile security and privacy, and outline research directions.  ...  the cloud, thus preserving user privacy. • Privacy-preserving location-based role-based access control [6] .  ... 
doi:10.1007/978-3-319-06811-4_2 fatcat:alb6rnpz6zgaroa3an63bpt2dy

Trust-based privacy preservation for peer-to-peer data sharing

Yi Lu, Weichao Wang, B. Bhargava, Dongyan Xu
2006 IEEE transactions on systems, man and cybernetics. Part A. Systems and humans  
Privacy preservation in a peer-to-peer system tries to hide the association between the identity of a participant and the data that it is interested in.  ...  We propose a trust-based privacy preservation method for peer-to-peer data sharing. It adopts the trust relation between a peer and its collaborators (buddies).  ...  Trustworthiness of peers A model has been built to assess the trustworthiness of a buddy based on its behaviors and other peers' recommendations.  ... 
doi:10.1109/tsmca.2006.871795 fatcat:q7ever3y4zennbh5l5c6wibeki

PRIVACY PRESERVING AND OBSCURE DELICATE DATA WITH COLLABORATIVE TAGGING

A Divya .
2014 International Journal of Research in Engineering and Technology  
In actual system provide taxonomy of tagging system and system web technologies help to specify labels and rate for that labels which assess the trustworthiness of resources to enforce web access personalization  ...  The keyword may be the location, feedback or cost to analyze the data. The authentication of the portal is done by the management.  ...  The exploratory of privacy protection can assess the impact of PET (Privacy Preserving Technologies) namely Tag suppression.  ... 
doi:10.15623/ijret.2014.0310036 fatcat:s2535n7i3zfjxlyi2p7dhskt7i

A Survey on Security, Privacy, and Trust in Mobile Crowdsourcing

Wei Feng, Zheng Yan, Hengrun Zhang, Kai Zeng, Yu Xiao, Y. Thomas Hou
2018 IEEE Internet of Things Journal  
We analyze the characteristics of MCS, identify its security threats, and outline essential requirements on a secure, privacy-preserving, and trustworthy MCS system.  ...  With the popularity of sensor-rich mobile devices (e.g., smart phones and wearable devices), mobile crowdsourcing (MCS) has emerged as an effective method for data collection and processing.  ...  Data provenance can be used to form assessments on data quality, reliability or trustworthiness. Ceolin et al.  ... 
doi:10.1109/jiot.2017.2765699 fatcat:eapkruonuzh6hhzppoumnonlhq

Privacy in Pervasive Video Surveillance - Trust through Technology and Users Cooperation
english

Antoni Martínez-Ballesté, Agusti Solanas, Marc Vives, Hatem A. Rashwan
2014 Proceedings of the 4th International Conference on Pervasive and Embedded Computing and Communication Systems  
Hence, it is necessary to define a comprehensive model for trustworthy video surveillance, aiming at preserving the right to privacy of citizens.  ...  In this article we present a platform for trustworthy video surveillance.  ...  ACKNOWLEDGEMENTS This work was partly funded by the Spanish Government through project CONSOLIDER INGENIO 2010 CSD2007-0004 ARES, project TIN2011-27076-C03-01 CO-PRIVACY, and by the Rovira i Virgili University  ... 
doi:10.5220/0004724200490054 dblp:conf/peccs/Martinez-BallesteSVR14 fatcat:jt5isj2xgzew7jihky4p7ddwba

Trust-Based, Privacy-Preserving Context Aggregation and Sharing in Mobile Ubiquitous Computing [chapter]

Michael Xing, Christine Julien
2014 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
Given the individual context of multiple participants, one can compute an aggregate context that represents a shared state while at the same time preserves individual participants' privacy.  ...  Further, our approaches can accomplish high quality context sharing even in situations with low levels of trust, assuming the availability of a small number of highly trustworthy partners.  ...  Any findings, conclusions, or recommendations are those of the authors.  ... 
doi:10.1007/978-3-319-11569-6_25 fatcat:67lppqpyanbn7e3cveu6ojrbf4

Guest Editorial Special Issue on Trust, Security, and Privacy in Crowdsourcing

Zheng Yan, Kai Zeng, Yu Xiao, Thomas hou, Pierangela Samarati
2018 IEEE Internet of Things Journal  
), the Project Supported by Natural Science Basic Research Plan in Shaanxi Province of  ...  Acknowledgment This work is sponsored by the NSFC (grants 61672410 and U1536202), the National Key Research and Development Program of China (grant 2016YFB0800704), the NSFC (grants 61672410 and U1536202  ...  Therefore, it becomes essential to assess the trust of the data while preserving the data providers' privacy.  ... 
doi:10.1109/jiot.2018.2860302 fatcat:jsi4pc4lerbh3mqz66bmhmxhzy

Never Trust Anyone: Trust-Privacy Trade-offs in Vehicular Ad-Hoc Networks

Amit Tyagi, Sreenath Niladhuri, R. Priya
2016 British Journal of Mathematics & Computer Science  
This BJMCS, 19(6): 1-23, 2016; Article no.BJMCS.27737 2 data empowers a Location Service Provider (LSP) to construe after some time a thorough client profile with a high level of accuracy, which thus makes  ...  This work discusses maximum facts to improve trust, preserved privacy (with proposing a new design in spite of mix zone which has not been proposed before,), and trade-offs among them, in result this proposal  ...  Data disclosure means loss of privacy, but an increased level of trustworthiness reduces the need for privacy.  ... 
doi:10.9734/bjmcs/2016/27737 fatcat:aea52i5ejjgv3olbhwnsespemy

Trust in the Balance: Data Protection Laws as Tools for Privacy and Security in the Cloud

2017 Algorithms  
This article examines two legal tools for ensuring the privacy and security of records in the cloud, data protection laws, and data localization laws, through the framework of "trust" as understood in  ...  This framework of trust provides new directions for algorithmic research, identifying those areas of digital record creation and preservation most in need of novel solutions.  ...  Author Contributions: Darra Hofman has written the outline and contributed the content about privacy. Elissa How has contributed the content about data localization and portability.  ... 
doi:10.3390/a10020047 fatcat:gonj7bhmqfdidmdtkfb76okv44

Privacy Preservation Scheme for WSNs using Signature and Trust Value Computation

Pavithra M. N, Chinnaswamy C. N, Dr. T. H. Sreenivas
2016 International Journal of Engineering Research and  
In trust management, computing trust value is one of the crucial problems. In this scheme we compute trust value for each sensor node for preserving privacy of data.  ...  Nowadays more and more WSNs are implemented in different areas so high privacy is required in both context and data. To preserve privacy of wireless sensor network use various techniques.  ...  This paper however introduces a data-level location privacy problem, i.e., the Privacy preserving hop-distance computation (PPHC) problem, in this protocol, the data disguise techniques in the secure multi-party  ... 
doi:10.17577/ijertv5is060098 fatcat:lk4wuyyseragna6usgthvvmr4m

Privacy, Trust and Incentives in Participatory Sensing [chapter]

Mehdi Riahi, Rameez Rahman, Karl Aberer
2016 Understanding Complex Systems  
Privacy-aware trust and reputation management approaches aim at providing frameworks for assessing trustworthiness of the contributions while protecting participants' privacy even though these two goals  ...  This means that, in the absence of certainty about the match of the reported data to the ground truth, past behavior of a person captured by her reputation plays an important role in assessing the trustworthiness  ... 
doi:10.1007/978-3-319-25658-0_5 fatcat:66gkb65axjhb5pomhidckicoom

Privacy-Preserving Contact Tracing and Public Risk Assessment Using Blockchain for COVID-19 Pandemic

Paulo Valente Klaine, Lei Zhang, Bingpeng Zhou, Yao Sun, Hao Xu, Muhammad Imran
2020 IEEE Internet of Things Magazine  
Privacy-Preserving contact tracing and Public risk assessment using blockchain for covid-19 Pandemic IntroductIon In 2020, the whole world has experienced and seen the effects of a pandemic caused by  ...  By doing so, these locations can effectively report potential infection risks, while also guaranteeing privacy and trustworthiness in the information.  ...  He has been a consultant to international projects and local companies in the area of self-organized networks.  ... 
doi:10.1109/iotm.0001.2000078 fatcat:x5ozwei6yjdndjmivvdnuizt5u

Containing Future Epidemics with Trustworthy Federated Systems for Ubiquitous Warning and Response [article]

Dick Carrillo, Lam Duc Nguyen, Pedro H. J. Nardelli, Evangelos Pournaras, Plinio Morita, Demóstenes Z. Rodríguez, Merim Dzaferagic, Harun Siljak, Alexander Jung, Laurent Hébert-Dufresne, Irene Macaluso, Mehar Ullah (+2 others)
2021 arXiv   pre-print
It leverages the pervasiveness of wireless connectivity while being trustworthy and secure.  ...  However, the system reliability, privacy, and interoperability are guaranteed.  ...  Data privacy and trustworthiness Fine-grained data collection approaches raise two major concerns as highlighted in [24] : (1) user privacy; and (2) trustworthiness of the shared information.  ... 
arXiv:2010.13392v2 fatcat:4yy5vfjvd5aqte43jb24hxiqoe
« Previous Showing results 1 — 15 out of 11,503 results