5,735 research outputs found
Exploratory Study of the Privacy Extension for System Theoretic Process Analysis (STPA-Priv) to elicit Privacy Risks in eHealth
Context: System Theoretic Process Analysis for Privacy (STPA-Priv) is a novel
privacy risk elicitation method using a top down approach. It has not gotten
very much attention but may offer a convenient structured approach and
generation of additional artifacts compared to other methods. Aim: The aim of
this exploratory study is to find out what benefits the privacy risk
elicitation method STPA-Priv has and to explain how the method can be used.
Method: Therefore we apply STPA-Priv to a real world health scenario that
involves a smart glucose measurement device used by children. Different kinds
of data from the smart device including location data should be shared with the
parents, physicians, and urban planners. This makes it a sociotechnical system
that offers adequate and complex privacy risks to be found. Results: We find
out that STPA-Priv is a structured method for privacy analysis and finds
complex privacy risks. The method is supported by a tool called XSTAMPP which
makes the analysis and its results more profound. Additionally, we learn that
an iterative application of the steps might be necessary to find more privacy
risks when more information about the system is available later. Conclusions:
STPA-Priv helps to identify complex privacy risks that are derived from
sociotechnical interactions in a system. It also outputs privacy constraints
that are to be enforced by the system to ensure privacy.Comment: author's post-prin
Profitable Task Allocation in Mobile Cloud Computing
We propose a game theoretic framework for task allocation in mobile cloud
computing that corresponds to offloading of compute tasks to a group of nearby
mobile devices. Specifically, in our framework, a distributor node holds a
multidimensional auction for allocating the tasks of a job among nearby mobile
nodes based on their computational capabilities and also the cost of
computation at these nodes, with the goal of reducing the overall job
completion time. Our proposed auction also has the desired incentive
compatibility property that ensures that mobile devices truthfully reveal their
capabilities and costs and that those devices benefit from the task allocation.
To deal with node mobility, we perform multiple auctions over adaptive time
intervals. We develop a heuristic approach to dynamically find the best time
intervals between auctions to minimize unnecessary auctions and the
accompanying overheads. We evaluate our framework and methods using both real
world and synthetic mobility traces. Our evaluation results show that our game
theoretic framework improves the job completion time by a factor of 2-5 in
comparison to the time taken for executing the job locally, while minimizing
the number of auctions and the accompanying overheads. Our approach is also
profitable for the nearby nodes that execute the distributor's tasks with these
nodes receiving a compensation higher than their actual costs
Location Verification Systems in Emerging Wireless Networks
As location-based techniques and applications become ubiquitous in emerging
wireless networks, the verification of location information will become of
growing importance. This has led in recent years to an explosion of activity
related to location verification techniques in wireless networks, with a
specific focus on Intelligent Transport Systems (ITS) being evident. Such focus
is largely due to the mission-critical nature of vehicle location verification
within the ITS scenario. In this work we review recent research in wireless
location verification related to the vehicular network scenario. We
particularly focus on location verification systems that rely on formal
mathematical classification frameworks, showing how many systems are either
partially or fully encompassed by such frameworks
REAP: An Efficient Incentive Mechanism for Reconciling Aggregation Accuracy and Individual Privacy in Crowdsensing
Incentive mechanism plays a critical role in privacy-aware crowdsensing. Most
previous studies on co-design of incentive mechanism and privacy preservation
assume a trustworthy fusion center (FC). Very recent work has taken steps to
relax the assumption on trustworthy FC and allows participatory users (PUs) to
add well calibrated noise to their raw sensing data before reporting them,
whereas the focus is on the equilibrium behavior of data subjects with binary
data. Making a paradigm shift, this paper aim to quantify the privacy
compensation for continuous data sensing while allowing FC to directly control
PUs. There are two conflicting objectives in such scenario: FC desires better
quality data in order to achieve higher aggregation accuracy whereas PUs prefer
adding larger noise for higher privacy-preserving levels (PPLs). To achieve a
good balance therein, we design an efficient incentive mechanism to REconcile
FC's Aggregation accuracy and individual PU's data Privacy (REAP).
Specifically, we adopt the celebrated notion of differential privacy to measure
PUs' PPLs and quantify their impacts on FC's aggregation accuracy. Then,
appealing to Contract Theory, we design an incentive mechanism to maximize FC's
aggregation accuracy under a given budget. The proposed incentive mechanism
offers different contracts to PUs with different privacy preferences, by which
FC can directly control PUs. It can further overcome the information asymmetry,
i.e., the FC typically does not know each PU's precise privacy preference. We
derive closed-form solutions for the optimal contracts in both complete
information and incomplete information scenarios. Further, the results are
generalized to the continuous case where PUs' privacy preferences take values
in a continuous domain. Extensive simulations are provided to validate the
feasibility and advantages of our proposed incentive mechanism.Comment: 11 pages, 6 figure
The Convergence of Machine Learning and Communications
The areas of machine learning and communication technology are converging.
Today's communications systems generate a huge amount of traffic data, which
can help to significantly enhance the design and management of networks and
communication components when combined with advanced machine learning methods.
Furthermore, recently developed end-to-end training procedures offer new ways
to jointly optimize the components of a communication system. Also in many
emerging application fields of communication technology, e.g., smart cities or
internet of things, machine learning methods are of central importance. This
paper gives an overview over the use of machine learning in different areas of
communications and discusses two exemplar applications in wireless networking.
Furthermore, it identifies promising future research topics and discusses their
potential impact.Comment: 8 pages, 4 figure
Hyperproperties for Robotics: Planning via HyperLTL
There is a growing interest on formal methods-based robotic planning for
temporal logic objectives. In this work, we extend the scope of existing
synthesis methods to hyper-temporal logics. We are motivated by the fact that
important planning objectives, such as optimality, robustness, and privacy,
(maybe implicitly) involve the interrelation between multiple paths. Such
objectives are thus hyperproperties, and cannot be expressed with usual
temporal logics like the linear temporal logic (LTL). We show that such
hyperproperties can be expressed by HyperLTL, an extension of LTL to multiple
paths. To handle the complexity of planning with HyperLTL specifications, we
introduce a symbolic approach for synthesizing planning strategies on discrete
transition systems. Our planning method is evaluated on several case studies
Energy and Information Management of Electric Vehicular Network: A Survey
The connected vehicle paradigm empowers vehicles with the capability to
communicate with neighboring vehicles and infrastructure, shifting the role of
vehicles from a transportation tool to an intelligent service platform.
Meanwhile, the transportation electrification pushes forward the electric
vehicle (EV) commercialization to reduce the greenhouse gas emission by
petroleum combustion. The unstoppable trends of connected vehicle and EVs
transform the traditional vehicular system to an electric vehicular network
(EVN), a clean, mobile, and safe system. However, due to the mobility and
heterogeneity of the EVN, improper management of the network could result in
charging overload and data congestion. Thus, energy and information management
of the EVN should be carefully studied. In this paper, we provide a
comprehensive survey on the deployment and management of EVN considering all
three aspects of energy flow, data communication, and computation. We first
introduce the management framework of EVN. Then, research works on the EV
aggregator (AG) deployment are reviewed to provide energy and information
infrastructure for the EVN. Based on the deployed AGs, we present the research
work review on EV scheduling that includes both charging and vehicle-to-grid
(V2G) scheduling. Moreover, related works on information communication and
computing are surveyed under each scenario. Finally, we discuss open research
issues in the EVN
A Game-Theoretic Taxonomy and Survey of Defensive Deception for Cybersecurity and Privacy
Cyberattacks on both databases and critical infrastructure have threatened
public and private sectors. Ubiquitous tracking and wearable computing have
infringed upon privacy. Advocates and engineers have recently proposed using
defensive deception as a means to leverage the information asymmetry typically
enjoyed by attackers as a tool for defenders. The term deception, however, has
been employed broadly and with a variety of meanings. In this paper, we survey
24 articles from 2008-2018 that use game theory to model defensive deception
for cybersecurity and privacy. Then we propose a taxonomy that defines six
types of deception: perturbation, moving target defense, obfuscation, mixing,
honey-x, and attacker engagement. These types are delineated by their
information structures, agents, actions, and duration: precisely concepts
captured by game theory. Our aims are to rigorously define types of defensive
deception, to capture a snapshot of the state of the literature, to provide a
menu of models which can be used for applied research, and to identify
promising areas for future work. Our taxonomy provides a systematic foundation
for understanding different types of defensive deception commonly encountered
in cybersecurity and privacy.Comment: To Appear in ACM Cumputing Surveys (CSUR
Exploratory study to explore the role of ICT in the process of knowledge management in an Indian business environment
In the 21st century and the emergence of a digital economy, knowledge and the knowledge base economy are rapidly growing. To effectively be able to understand the processes involved in the creating, managing and sharing of knowledge management in the business environment is critical to the success of an organization. This study builds on the previous research of the authors on the enablers of knowledge management by identifying the relationship between the enablers of knowledge management and the role played by information communication technologies (ICT) and ICT infrastructure in a business setting. This paper provides the findings of a survey collected from the four major Indian cities (Chennai, Coimbatore, Madurai and Villupuram) regarding their views and opinions about the enablers of knowledge management in business setting. A total of 80 organizations participated in the study with 100 participants in each city. The results show that ICT and ICT infrastructure can play a critical role in the creating, managing and sharing of knowledge in an Indian business environment
Secure and Private Cloud Storage Systems with Random Linear Fountain Codes
An information theoretic approach to security and privacy called Secure And
Private Information Retrieval (SAPIR) is introduced. SAPIR is applied to
distributed data storage systems. In this approach, random combinations of all
contents are stored across the network. Our coding approach is based on Random
Linear Fountain (RLF) codes. To retrieve a content, a group of servers
collaborate with each other to form a Reconstruction Group (RG). SAPIR achieves
asymptotic perfect secrecy if at least one of the servers within an RG is not
compromised. Further, a Private Information Retrieval (PIR) scheme based on
random queries is proposed. The PIR approach ensures the users privately
download their desired contents without the servers knowing about the requested
contents indices. The proposed scheme is adaptive and can provide privacy
against a significant number of colluding servers.Comment: 8 pages, 2 figure
- …