scholarly journals Enhanced Internet Mobility and Privacy Using Public Cloud

2017 ◽  
Vol 2017 ◽  
pp. 1-11 ◽  
Author(s):  
Ping Zhang ◽  
Mimoza Durresi ◽  
Arjan Durresi

Internet mobile users are concerned more and more about their privacy nowadays as both researches and real world incidents show that leaking of communication and location privacy can lead to serious consequence, and many research works have been done to anonymize individual user from aggregated location data. However, just the communication itself between the mobile users and their peers or website could collect considerable privacy of the mobile users, such as location history, to other parties. In this paper, we investigated the potential privacy risk of mobile Internet users and proposed a scalable system built on top of public cloud services that can hide mobile user’s network location and traffic from communication peers. This system creates a dynamic distributed proxy network for each mobile user to minimize performance overhead and operation cost.

2020 ◽  
Vol 1 (9) ◽  
pp. 59-68
Author(s):  
Ivan Opirskyy ◽  
Andrii Vynar

Phishing, as a type of information attack, has been used by intruders for selfish purposes for quite some time. They are very popular in the criminal world because it is much easier for a person to make certain profitable actions than a program. With the advent of new technologies, this type of attack has gradually adapted to the new conditions of engagement with its victim. Cloud services have become a great modern and widespread tool for phishing campaigns. The use of such services has given to malicious actors a number of significant advantages over the use of their own computing resources. The relative cheapness and ease of exploitation of these technologies has played an important role. The problem of information security with using cloud technologies is that this type of attack is difficult to detect, even more to prevent, without significantly affecting the comfort of using end users of information systems. The article analyzes the relevance of this type of attacks based on real data. We considered the algorithm of their work during a life cycle and analyzes the use of the basic available security methods of protection, their feasibility and problems of use. The analysis showed that not all modern security methods are capable of detecting and preventing phishing attacks, which use public cloud services. Even a combination of several or all methods cannot guarantee high protection for users against phishing threats. In the article were mentioned some examples of phishing campaigns that took place during 2019 and used such popular public cloud services as Azure Blob storage created by Microsoft and Google Drive developed by Google. A basic list of tips was also provided that would increase the level of security for internet users in order to reduce the risk of potential data compromise or its consequences.


2018 ◽  
Vol 56 (11) ◽  
pp. 2291-2307 ◽  
Author(s):  
Moez Ltifi

Purpose This study is exploratory in nature. The purpose of this paper is to examine the intention to use smartphones by mobile users for m-services in a growing market. In fact, it empirically studies the influence of ubiquity and immersion in the virtual context on the perceived value (utilitarian and hedonic) of the mobile user’s experience. Moreover, it is an academic embarkation upon the examination of the effect of perceived value on the intension of using smartphones by mobile users for the m-services. Finally, it tests the mediating role of the perceived (utilitarian and hedonic) value between ubiquity/immersion and the intention to use smartphones for m-services. Design/methodology/approach The data are collected from a sample of 300 Tunisian students and analyzed using the structural equation modeling technique. Findings The results show that ubiquity and immersion positively influence the value perceived by mobile internet users. They also confirm that the perceived (utilitarian and hedonic) value positively affects the intensity of smartphone usage by mobile internet users for m-services and show the mediating role of the perceived (utilitarian and hedonic) value between ubiquity/immersion and the intention to use smartphones for m-services. Practical implications Companies in place focus on the importance of smartphone shopping by communicating about the comparative advantages of this type of purchase to make this option a possible choice in the future. The immersive dimension in the virtual context of commerce can be exploited as a factor of differentiation, at a time when commercial trafficking is intensifying; for example, immersive merchant sites, to enrich their particular utilitarian value with an equally hedonic value. The hedonic and utilitarian dimensions of the perceived value constitute a mediator and an important lever for the distributors within the framework of the m-commerce. Due to a genuine consideration of the availability and the possibility to carry out the service at any time and any place in view of the fact that it is perceived as being useful and compatible with the needs and way of life of the individuals’ intention, the use of smartphones for the m-served is explained by the lived values which are in turn explained by the ubiquity. Originality/value Despite the massive adoption of information and communication technology, especially the internet, in distribution and service delivery, very little research has focused on the intensity of use of smartphones by mobile internet users for m-services. This exploratory study is the first to test the effect of ubiquity and immersion in the virtual context on the perceived (utilitarian and hedonic) value of the mobile internet users’ experience as well as the effect of the perceived value on the intensity of use of smartphones by mobile internet users for m-services in the Tunisian context. Moreover, it puts under scrutiny the mediating effect of the perceived value in the determination of the intention to use smartphones by mobile users for the m-services in the Tunisian context.


Mobile devices have several sensors, including GPS that can capture information about the location of a mobile user. The use of certain devices will, therefore, simplify services and make it simpler for operators to respond to the demands of mobile users. The main aim of this analysis is to incorporate middleware to pick suitable cloud services that leverage from mobile device position and cost preferences. If the number of small activities within a meta feature exceeds the number of major work, the Max min algorithm device operations are conducted in addition to big tasks, where the design of the process is dependent on how many functions it does. The model is wide since tasks cannot be conducted simultaneously. A new amendment to the computation system is used to overcome the drawbacks of the Max-Min algorithm. It encompasses the positives of Max-Min and eliminates drawbacks. This study focuses specifically on the number of resources and incidents. The work can be further expanded with the algorithm suggested for the cloud system and several other parameters such as scalability, performance, reliability, and others can be taken into account.


2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Hongtao Li ◽  
Yue Wang ◽  
Feng Guo ◽  
Jie Wang ◽  
Bo Wang ◽  
...  

Location-based services (LBS) have become an important research area with the rapid development of mobile Internet technology, GPS positioning technology, and the widespread application of smart phones and social networks. LBS can provide convenience and flexibility for the users’ daily life, but at the same time, it also brings security risks to the users’ privacy. Untrusted or malicious LBS servers can collect users’ location data through various ways and disclose it to the third party, thus causing users’ privacy leakage. In this paper, a differential privacy location protection method based on the Markov model for user’s location privacy is proposed. Firstly, the transition probability matrix between states of the n -order Markov model is used to predict the occurrence state and development trend of events; thereby, the user’s location is predicted, and then a location prediction algorithm based on the Markov model (LPAM) is proposed. Secondly, a location protection algorithm based on differential privacy (LPADP) is proposed, in which location privacy tree (LPT) is constructed according to the location data and the difficulty of retrieval, the two nodes with the largest predicted value of LPT are allocated with a reasonable privacy budget, and Laplace noise is added to protect location privacy. Theoretical analysis and experimental results show that the proposed method not only meets the requirements of differential privacy and protects location privacy effectively but also has high data availability and low time complexity.


2016 ◽  
Vol 2016 (4) ◽  
pp. 102-122 ◽  
Author(s):  
Kassem Fawaz ◽  
Kyu-Han Kim ◽  
Kang G. Shin

AbstractWith the advance of indoor localization technology, indoor location-based services (ILBS) are gaining popularity. They, however, accompany privacy concerns. ILBS providers track the users’ mobility to learn more about their behavior, and then provide them with improved and personalized services. Our survey of 200 individuals highlighted their concerns about this tracking for potential leakage of their personal/private traits, but also showed their willingness to accept reduced tracking for improved service. In this paper, we propose PR-LBS (Privacy vs. Reward for Location-Based Service), a system that addresses these seemingly conflicting requirements by balancing the users’ privacy concerns and the benefits of sharing location information in indoor location tracking environments. PR-LBS relies on a novel location-privacy criterion to quantify the privacy risks pertaining to sharing indoor location information. It also employs a repeated play model to ensure that the received service is proportionate to the privacy risk. We implement and evaluate PR-LBS extensively with various real-world user mobility traces. Results show that PR-LBS has low overhead, protects the users’ privacy, and makes a good tradeoff between the quality of service for the users and the utility of shared location data for service providers.


Author(s):  
Foivos Michclinakis ◽  
Hossein Doroud ◽  
Abbas Razaghpanah ◽  
Andra Lutu ◽  
Narseo Vallina-Rodriguez ◽  
...  

2018 ◽  
Vol 7 (11) ◽  
pp. 442 ◽  
Author(s):  
Mehrnaz Ataei ◽  
Auriol Degbelo ◽  
Christian Kray ◽  
Vitor Santos

An individual’s location data is very sensitive geoinformation. While its disclosure is necessary, e.g., to provide location-based services (LBS), it also facilitates deep insights into the lives of LBS users as well as various attacks on these users. Location privacy threats can be mitigated through privacy regulations such as the General Data Protection Regulation (GDPR), which was introduced recently and harmonises data privacy laws across Europe. While the GDPR is meant to protect users’ privacy, the main problem is that it does not provide explicit guidelines for designers and developers about how to build systems that comply with it. In order to bridge this gap, we systematically analysed the legal text, carried out expert interviews, and ran a nine-week-long take-home study with four developers. We particularly focused on user-facing issues, as these have received little attention compared to technical issues. Our main contributions are a list of aspects from the legal text of the GDPR that can be tackled at the user interface level and a set of guidelines on how to realise this. Our results can help service providers, designers and developers of applications dealing with location information from human users to comply with the GDPR.


Sign in / Sign up

Export Citation Format

Share Document