scholarly journals Limiting Privacy Breaches in Average-Distance Query

2020 ◽  
Vol 2020 ◽  
pp. 1-24
Author(s):  
Huihua Xia ◽  
Yan Xiong ◽  
Wenchao Huang ◽  
Zhaoyi Meng ◽  
Fuyou Miao

Querying average distances is useful for real-world applications such as business decision and medical diagnosis, as it can help a decision maker to better understand the users’ data in a database. However, privacy has been an increasing concern. People are now suffering serious privacy leakage from various kinds of sources, especially service providers who provide insufficient protection on user’s private data. In this paper, we discover a new type of attack in an average-distance query (AVGD query) with noisy results. The attack is general that it can be used to reveal private data of different dimensions. We theoretically analyze how different factors affect the accuracy of the attack and propose the privacy-preserving mechanism based on the analysis. We experiment on two real-life datasets to show the feasibility and severity of the attack. The results show that the severity of the attack is mainly influenced by the factors including the noise magnitude, the number of queries, and the number of users in each query. Also, we validate the correctness of our theoretical analysis by comparing with the experimental results and confirm the effectiveness of the privacy-preserving mechanism.

Sensors ◽  
2019 ◽  
Vol 19 (24) ◽  
pp. 5463 ◽  
Author(s):  
Po-Wen Chi ◽  
Ming-Hung Wang

Cloud-assisted cyber–physical systems (CCPSs) integrate the physical space with cloud computing. To do so, sensors on the field collect real-life data and forward it to clouds for further data analysis and decision-making. Since multiple services may be accessed at the same time, sensor data should be forwarded to different cloud service providers (CSPs). In this scenario, attribute-based encryption (ABE) is an appropriate technique for securing data communication between sensors and clouds. Each cloud has its own attributes and a broker can determine which cloud is authorized to access data by the requirements set at the time of encryption. In this paper, we propose a privacy-preserving broker-ABE scheme for multiple CCPSs (MCCPS). The ABE separates the policy embedding job from the ABE task. To ease the computational burden of the sensors, this scheme leaves the policy embedding task to the broker, which is generally more powerful than the sensors. Moreover, the proposed scheme provides a way for CSPs to protect data privacy from outside coercion.


2017 ◽  
Vol 2017 ◽  
pp. 1-19 ◽  
Author(s):  
Hong Rong ◽  
Huimei Wang ◽  
Jian Liu ◽  
Jialu Hao ◽  
Ming Xian

With the advent of big data era, clients who lack computational and storage resources tend to outsource data mining tasks to cloud service providers in order to improve efficiency and reduce costs. It is also increasingly common for clients to perform collaborative mining to maximize profits. However, due to the rise of privacy leakage issues, the data contributed by clients should be encrypted using their own keys. This paper focuses on privacy-preserving k-means clustering over the joint datasets encrypted under multiple keys. Unfortunately, existing outsourcing k-means protocols are impractical because not only are they restricted to a single key setting, but also they are inefficient and nonscalable for distributed cloud computing. To address these issues, we propose a set of privacy-preserving building blocks and outsourced k-means clustering protocol under Spark framework. Theoretical analysis shows that our scheme protects the confidentiality of the joint database and mining results, as well as access patterns under the standard semihonest model with relatively small computational overhead. Experimental evaluations on real datasets also demonstrate its efficiency improvements compared with existing approaches.


2021 ◽  
Vol 17 (4) ◽  
pp. 1-30
Author(s):  
Qiben Yan ◽  
Jianzhi Lou ◽  
Mehmet C. Vuran ◽  
Suat Irmak

Precision agriculture has become a promising paradigm to transform modern agriculture. The recent revolution in big data and Internet-of-Things (IoT) provides unprecedented benefits including optimizing yield, minimizing environmental impact, and reducing cost. However, the mass collection of farm data in IoT applications raises serious concerns about potential privacy leakage that may harm the farmers’ welfare. In this work, we propose a novel scalable and private geo-distance evaluation system, called SPRIDE, to allow application servers to provide geographic-based services by computing the distances among sensors and farms privately. The servers determine the distances without learning any additional information about their locations. The key idea of SPRIDE is to perform efficient distance measurement and distance comparison on encrypted locations over a sphere by leveraging a homomorphic cryptosystem. To serve a large user base, we further propose SPRIDE+ with novel and practical performance enhancements based on pre-computation of cryptographic elements. Through extensive experiments using real-world datasets, we show SPRIDE+ achieves private distance evaluation on a large network of farms, attaining 3+ times runtime performance improvement over existing techniques. We further show SPRIDE+ can run on resource-constrained mobile devices, which offers a practical solution for privacy-preserving precision agriculture IoT applications.


2021 ◽  
pp. 1-12
Author(s):  
Gokay Saldamli ◽  
Richard Chow ◽  
Hongxia Jin

Social networking services are increasingly accessed through mobile devices. This trend has prompted services such as Facebook and Google+to incorporate location as a de facto feature of user interaction. At the same time, services based on location such as Foursquare and Shopkick are also growing as smartphone market penetration increases. In fact, this growth is happening despite concerns (growing at a similar pace) about security and third-party use of private location information (e.g., for advertising). Nevertheless, service providers have been unwilling to build truly private systems in which they do not have access to location information. In this paper, we describe an architecture and a trial implementation of a privacy-preserving location sharing system called ILSSPP. The system protects location information from the service provider and yet enables fine grained location-sharing. One main feature of the system is to protect an individual’s social network structure. The pattern of location sharing preferences towards contacts can reveal this structure without any knowledge of the locations themselves. ILSSPP protects locations sharing preferences through protocol unification and masking. ILSSPP has been implemented as a standalone solution, but the technology can also be integrated into location-based services to enhance privacy.


Author(s):  
Omar Kemmar ◽  
Karim Bouamrane ◽  
Shahin Gelareh

In this paper, we introduce a new hub-and-spoke structure for service networks based on round-trips as practiced by some transport service providers. This problem is a variant of Uncapacitated Hub Location Problem wherein the spoke nodes allocated to a hub node form round-trips (cycles) starting from and ending to the hub node. This problem is motivated by two real-life practices in logistics wherein  runaway  nodes and  runaway  connections with their associated economies of scale were foreseen to increase redundancy in the network. We propose a mixed integer linear programming mathematical model with exponential number of constraints. In addition to the separation routines for separating from among exponential constraints, we propose a hyper-heuristic based on reinforcement learning and its comparable counterpart as a variable neighborhood search. Our extensive computational experiments confirm efficiency of the proposed approaches.In this paper, we introduce a new hub-and-spoke structure for service networks based on round-trips as practiced by some transport service providers. This problem is a variant of Uncapacitated Hub Location Problem wherein the spoke nodes allocated to a hub node form round-trips (cycles) starting from and ending to the hub node. This problem is motivated by two real-life practices in logistics wherein  runaway  nodes and  runaway  connections with their associated economies of scale were foreseen to increase redundancy in the network. We propose a mixed integer linear programming mathematical model with exponential number of constraints. In addition to the separation routines for separating from among exponential constraints, we propose a hyper-heuristic based on reinforcement learning and its comparable counterpart as a variable neighborhood search. Our extensive computational experiments confirm efficiency of the proposed approaches.


Author(s):  
Junghoon Lee ◽  
Gyung-Leen Park

<p>This paper investigates the price effect to the charging demand coming from electric vehicles and then evaluates the performance of a pre-reservation mechanism using the real-life demand patterns. On the charging network in Jeju city, the occupancy rates for 3 price groups, namely, free, medium-price, and expensive chargers, are separated almost evenly by about 9.0 %, while a set of chargers dominates the charging demand during hot hours. The virtual pre-reservation scheme matches electric vehicles to a time slot of a charger so as not only to avoid intolerable waiting time in charging stations systematically but also to increase the revenue of service providers, taking into account both bidding levels specified by electric vehicles and preference criteria defined by chargers. The performance analysis results obtained by prototype implementation show that the proposed pre-reservation mechanism improves the revenue of service providers by up to 9.5 % and 42.9 %, compared with the legacy FCFS and reservation-less walk-in schemes for the given performance parameter sets.</p>


2017 ◽  
Vol 23 (2) ◽  
pp. 193-205 ◽  
Author(s):  
Adrián Todolí-Signes

The digital era has changed employment relationships dramatically, causing a considerable degree of legal uncertainty as to which rules apply in cyberspace. Technology is transforming business organisation in a way that makes employees – as subordinate workers – less necessary. New types of companies, based on the ‘on-demand economy’ or so-called ‘sharing economy’ and dedicated to connecting customers directly with individual service providers, are emerging. These companies conduct their entire core business through workers that they classify as self-employed. In this context, employment law is facing its greatest challenge, as it has to deal with a very different reality to the one existing when it was created. This article analyses the literature available about the classification of this new type of worker as an employee or as self-employed, concluding that there is a need for a new special labour regulation. It also describes and justifies the bases for this new special labour regulation.


2021 ◽  
pp. 67-74
Author(s):  
Liudmyla Zubyk ◽  
Yaroslav Zubyk

Big data is one of modern tools that have impacted the world industry a lot of. It also plays an important role in determining the ways in which businesses and organizations formulate their strategies and policies. However, very limited academic researches has been conducted into forecasting based on big data due to the difficulties in capturing, collecting, handling, and modeling of unstructured data, which is normally characterized by it’s confidential. We define big data in the context of ecosystem for future forecasting in business decision-making. It can be difficult for a single organization to possess all of the necessary capabilities to derive strategic business value from their findings. That’s why different organizations will build, and operate their own analytics ecosystems or tap into existing ones. An analytics ecosystem comprising a symbiosis of data, applications, platforms, talent, partnerships, and third-party service providers lets organizations be more agile and adapt to changing demands. Organizations participating in analytics ecosystems can examine, learn from, and influence not only their own business processes, but those of their partners. Architectures of popular platforms for forecasting based on big data are presented in this issue.


Author(s):  
Decebal Popescu ◽  
Nirvana Popescu ◽  
Ciprian Dobre

Public administration is subject to major changes affecting many countries, such as the need to implement the European Union Services Directive within the entire EU area. This chapter presents theoretical and practical approaches to developing e-Services and e-Government solutions and real experiences in developing two successful projects with great potential to improve complex Government procedures. The Point of Single Contact is an electronic means through which service providers can find information and complete the formalities necessary to doing business there. Each EU member state must have its own PSC, which should be a reliable source of electronic processing of information that should facilitate the interaction of citizens with the public administration. The design and implementation details of an e-Framework for optimizing the relationship between Governments and citizens using eServices will be presented. Evaluation results obtained by integrating a real-life workflow for opening a business in the Romanian environment are shown. Also, in order to optimize automatic data transfers, document workflows, and business reporting of business organizations, an e-Services system is used.


Author(s):  
J. Andrew Onesimu ◽  
Karthikeyan J. ◽  
D. Samuel Joshua Viswas ◽  
Robin D Sebastian

Deep learning is the buzz word in recent times in the research field due to its various advantages in the fields of healthcare, medicine, automobiles, etc. A huge amount of data is required for deep learning to achieve better accuracy; thus, it is important to protect the data from security and privacy breaches. In this chapter, a comprehensive survey of security and privacy challenges in deep learning is presented. The security attacks such as poisoning attacks, evasion attacks, and black-box attacks are explored with its prevention and defence techniques. A comparative analysis is done on various techniques to prevent the data from such security attacks. Privacy is another major challenge in deep learning. In this chapter, the authors presented an in-depth survey on various privacy-preserving techniques for deep learning such as differential privacy, homomorphic encryption, secret sharing, and secure multi-party computation. A detailed comparison table to compare the various privacy-preserving techniques and approaches is also presented.


Sign in / Sign up

Export Citation Format

Share Document