2,885 Hits in 4.2 sec

A Middleware Enforcing Location Privacy in Mobile Platform [chapter]

Asma Patel, Esther Palomar
2017 Lecture Notes in Computer Science  
Emerging indoor positioning and WiFi infrastructure enable building apps with numerous Location-based Services (LBS) that represent critical threats to smartphone users' location privacy provoking continuous  ...  In this paper we present the design, deployment and evaluation of PL-Protector, a location privacy-enhancing middleware, which through a caching technique minimises the interaction and data collection  ...  The contributions of this work are as follows: -To identify the required functionality goals that protect users from location-demanding apps through the analysis of location privacy specific challenges  ... 
doi:10.1007/978-3-319-64483-7_3 fatcat:stzoodtnqbaw3f4fhbggwolmea

LP-Cache: Privacy-aware Cache Model for Location-based Apps

Asma Patel, Esther Palomar
2016 Proceedings of the 13th International Joint Conference on e-Business and Telecommunications  
The daily use of smartphones along with third-party apps, which involve location data to be continuously collected, shared and used, have become a significant privacy concern.  ...  for the development of more user-friendly and sociallyaccepted approaches to location privacy preservation.  ...  Bootstrapping LP-Caché aims to protect user's private places.  ... 
doi:10.5220/0005970101830194 dblp:conf/secrypt/PatelP16 fatcat:i5euiumn4jaxbehur32mwim5iy

Forensic Analysis of Social Networking Applications on an Android Smartphone

Anoshia Menahil, Waseem Iqbal, Mohsin Iftikhar, Waleed Bin Shahid, Khwaja Mansoor, Saddaf Rubab, Ernestina Cianca
2021 Wireless Communications and Mobile Computing  
Smartphone users spend a substantial amount of time in browsing, emailing, and messaging through different social networking apps.  ...  The use of social networking apps on smartphones has become a dominating part of daily lives.  ...  Social networking apps (SNAs) allow users to create a profile, upload personal information such as pictures, videos, and location, and share that information through private messaging or public posts.  ... 
doi:10.1155/2021/5567592 fatcat:a2euetup4bbuvp7q5wi3ayysxa

Smartphone Forensics: A Proactive Investigation Scheme for Evidence Acquisition [chapter]

Alexios Mylonas, Vasilis Meletiadis, Bill Tsoumas, Lilian Mitrou, Dimitris Gritzalis
2012 IFIP Advances in Information and Communication Technology  
We propose a Proactive Smartphone Investigation Scheme that focuses on ad hoc acquisition of smartphone evidence.  ...  We also, take into consideration the legal implications of the proposed scheme, as it is essential that the scheme includes prevention mechanisms, so as to protect individuals from misuse by investigators  ...  Framework (Program HERACLEITUS II: Investing in knowledge society through the European Social Fund).  ... 
doi:10.1007/978-3-642-30436-1_21 fatcat:4rjfvlbauzcdvgd72sg6xysrza

Cache-Based Privacy Preserving Solution for Location and Content Protection in Location-Based Services

Yuanbo Cui, Fei Gao, Wenmin Li, Yijie Shi, Hua Zhang, Qiaoyan Wen, Emmanouil Panaousis
2020 Sensors  
To solve the problems above, in this paper we propose a Cache-Based Privacy-Preserving (CBPP) solution for users in LBSs.  ...  Evaluation results show that the proposed CBPP solution can effectively protect users' location and query privacy with a lower communication cost and better quality of service.  ...  A growing number of people are downloading location-based applications from the App Store or Google Play Store through their mobile devices (e.g., smartphones).  ... 
doi:10.3390/s20164651 pmid:32824808 fatcat:ghikwjmnnvdxnhos2u7r66njeu

Albatross: a Privacy-Preserving Location Sharing System [article]

Gokay Saldamli, Richard Chow, Hongxia Jin
2015 arXiv   pre-print
Albatross protects locations sharing preferences through protocol unification and masking.  ...  This trend has prompted services such as Facebook and Google+ to incorporate location as a de facto feature of user interaction.  ...  a smartphone.  ... 
arXiv:1502.03407v1 fatcat:l6ie3drvhfdk5grosqigwkshia

A Mobile App Development Guideline for Hospital Settings: Maximizing the Use of and Minimizing the Security Risks of "Bring Your Own Devices" Policies

Soleh U Al Ayubi, Alexandra Pelletier, Gajen Sunthara, Nitin Gujral, Vandna Mittal, Fabienne C Bourgeois
2016 JMIR mHealth and uHealth  
TaskList app was designed in four phases: (1) mobile app guideline development, (2) requirements gathering and developing of TaskList fitting the guideline, (3) deployment of TaskList using BYOD with end-users  ...  A survey revealed 53% of health care professionals used smartphones or tablets for work purposes through unsecured WiFi networks; 41% of the devices were not password protected; and only 52% reported having  ...  b virtual private networks.  ... 
doi:10.2196/mhealth.4424 pmid:27169345 pmcid:PMC4880739 fatcat:4zgjenltcjh7vprycajrrlx7bm


Yifan Zhang, Chiu Tan, Li Qun
2013 Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing - UbiComp '13  
CacheKeeper can not only effectively reduce overhead caused by poor web caching of mobile apps, but also utilizes cross-app caching opportunities in smartphones.  ...  Based on our analysis, we designed CacheKeeper, an OS web caching service transparent to mobile apps for smartphones.  ...  Declaring Private HTTP Transactions. As one of the design goals, CK should provide means to protect apps' cache privacy.  ... 
doi:10.1145/2493432.2493484 dblp:conf/huc/ZhangTL13 fatcat:4ojvql4rorhd7cw5w56vwy75jy

Taming Information-Stealing Smartphone Applications (on Android) [chapter]

Yajin Zhou, Xinwen Zhang, Xuxian Jiang, Vincent W. Freeh
2011 Lecture Notes in Computer Science  
Smartphones have been becoming ubiquitous and mobile users are increasingly relying on them to store and handle personal information.  ...  However, recent studies also reveal the disturbing fact that users' personal information is put at risk by (rogue) smartphone applications.  ...  To effectively protect user private information from malicious smartphone apps, in this paper, we argue for the need of a new privacy mode in smartphones.  ... 
doi:10.1007/978-3-642-21599-5_7 fatcat:bl6czvgurba2bauti4lawtgxsy

You've Got Photos! The design and evaluation of a location-based media-sharing application

Niko Kotilainen, maria Papadopouli
2008 Proceedings of the 4th International Mobile Multimedia Communications Conference  
PhotoJournal is a novel location-based media sharing application that enables users to build interactive journals that associate multimedia files with locations on maps and share this information with  ...  other users.  ...  Thus, it is important to provide mechanisms that allow a fine-level description of the privacy requirements and draw a balance between enhancing the service and protecting user privacy.  ... 
doi:10.4108/icst.mobimedia2008.4034 dblp:conf/mobimedia/KotilainenP08 fatcat:la5yrnuzazdilccwoovtnyfs5a

Reducing the Delay and Power Consumption of Web Browsing on Smartphones in 3G Networks

Bo Zhao, Byung Chul Tak, Guohong Cao
2011 2011 31st International Conference on Distributed Computing Systems  
These applications extend the functionalities of smartphones and make them more convenient for users to be connected.  ...  However, they also greatly increase the power consumption of smartphones and many users are frustrated with the long delay of web browsing when using smartphones.  ...  It is better for these service providers to build their own private cloud, which can be located closer to the 3G infrastructure to reduce the network traffic.  ... 
doi:10.1109/icdcs.2011.54 dblp:conf/icdcs/ZhaoTC11 fatcat:gek4rlic55gkreqsxve2lbmxca

On Inferring Browsing Activity on Smartphones via USB Power Analysis Side-Channel

Qing Yang, Paolo Gasti, Gang Zhou, Aydin Farajidavar, Kiran S. Balagani
2017 IEEE Transactions on Information Forensics and Security  
To evaluate this sidechannel, we collected power traces of Alexa top 50 websites on multiple smartphones under several conditions, including: battery charging level, browser cache enabled/disabled, taps  ...  In this paper, we show that public USB charging stations pose a significant privacy risk to smartphone users even when no data communication is possible between the station and the user's mobile device  ...  For this reason, PowerSpy infers location information without requesting any explicit permission to the user, in contrast with the use of privileged location APIs-which require explicit user confirmation  ... 
doi:10.1109/tifs.2016.2639446 fatcat:x4o3cp5axnfypbfeyywksj43am

Recovering residual forensic data from smartphone interactions with cloud storage providers [chapter]

George Grispos, William Bradley Glisson, Tim Storer
2015 The Cloud Security Ecosystem  
However, it is anticipated that end-devices such as smartphones, will retain data from these cloud storage services.  ...  the chapter contributes to the documentation and evidentiary discussion of the artefacts created from specific cloud storage applications and different versions of these applications on iOS and Android smartphones  ...  In other words, the potential recovery of data increases if a device has been used to view the files through a cloud storage application and the user has not attempted to clear the cache of recently viewed  ... 
doi:10.1016/b978-0-12-801595-7.00016-1 fatcat:rqwe2525fvf7zomjd3wbpu2j5m

LISA: Location information ScrAmbler for privacy protection on smartphones

Zhigang Chen, Xin Hu, Xiaoen Ju, Kang G. Shin
2013 2013 IEEE Conference on Communications and Network Security (CNS)  
We design, implement, and evaluate a privacyprotection system, called the Location Information ScrAmbler (LISA) which protects the user's location privacy by adjusting the location noise and hence, the  ...  As use of location-based services (LBSs) is becoming increasingly prevalent, mobile users are more and more enticed to reveal their locations, which may be exploited by attackers to infer the points of  ...  Location privacy refers to users' private information directly related to their locations, as well as other private information that can be inferred from the location information.  ... 
doi:10.1109/cns.2013.6682719 dblp:conf/cns/ChenHJS13 fatcat:hbwt4dwk4jhk3pr2ooxbmg5ou4


Giovanni Russello, Mauro Conti, Bruno Crispo, Earlence Fernandes
2012 Proceedings of the 17th ACM symposium on Access Control Models and Technologies - SACMAT '12  
Smartphones are very effective tools for increasing the productivity of business users.  ...  However, smartphone security mechanisms have been discovered to offer very limited protection against malicious applications that can leak data stored on them.  ...  More recent papers [9, 31] concentrate on the protection of the user's private data (satisfying only R3).  ... 
doi:10.1145/2295136.2295140 dblp:conf/sacmat/RusselloCCF12 fatcat:znvpui6jfnhbzpp6otcvqhu2xa
« Previous Showing results 1 — 15 out of 2,885 results