20,252 research outputs found
Preserving Privacy in Cyber-physical-social systems: An Anonymity and Access Control Approach
With the significant development of mobile commerce, the integration of physical, social, and cyber worlds is increasingly common.
The term Cyber Physical Social Systems is used to capture technology’s human-centric role. With the revolutionization of CPSS,
privacy protections become a major concern for both customers
and enterprises. Although data generalization by obfuscation and
anonymity can provide protection for an individual’s privacy, overgeneralization may lead to less-valuable data. In this paper, we
contrive generalization boundary techniques (k-anonymity) to maximize data usability while minimizing disclosure with a privacy
access control mechanism. This paper proposes a combination of
purpose-based access control models with an anonymity technique
in distributed computing environments for privacy preserving policies and mechanisms that demonstrate policy conflicting problems.
This combined approach will provide protections for individual personal information and make data sharable to authorized party with
proper purposes. Here, we have examined data with k-anonymity
to create a specific level of obfuscation that maintains the usefulness of data and used a heuristic approach to a privacy access
control framework in which the privacy requirement is to satisfy
the k-anonymity. The extensive experiments on both real-world
and synthetic data sets show that the proposed privacy aware access
control model with k- anonymity is practical and effective. It will
generate an anonymized data set in accordance with the privacy
clearance of a certain request and allow users access at different
privacy levels, fulfilling some set of obligations and addressing privacy and utility requirements, flexible access control, and improved
data availability, while guaranteeing a certain level of privacy.Ope
Asynchronous Remote Medical Consultation for Ghana
Computer-mediated communication systems can be used to bridge the gap between
doctors in underserved regions with local shortages of medical expertise and
medical specialists worldwide. To this end, we describe the design of a
prototype remote consultation system intended to provide the social,
institutional and infrastructural context for sustained, self-organizing growth
of a globally-distributed Ghanaian medical community. The design is grounded in
an iterative design process that included two rounds of extended design
fieldwork throughout Ghana and draws on three key design principles (social
networks as a framework on which to build incentives within a self-organizing
network; optional and incremental integration with existing referral
mechanisms; and a weakly-connected, distributed architecture that allows for a
highly interactive, responsive system despite failures in connectivity). We
discuss initial experiences from an ongoing trial deployment in southern Ghana.Comment: 10 page
MARINE: Man-in-the-middle attack resistant trust model IN connEcted vehicles
Vehicular Ad-hoc NETwork (VANET), a novel technology holds a paramount importance within the transportation domain due to its abilities to increase traffic efficiency and safety. Connected vehicles propagate sensitive information which must be shared with the neighbors in a secure environment. However, VANET may also include dishonest nodes such as Man-in-the-Middle (MiTM) attackers aiming to distribute and share malicious content with the vehicles, thus polluting the network with compromised information. In this regard, establishing trust among connected vehicles can increase security as every participating vehicle will generate and propagate authentic, accurate and trusted content within the network. In this paper, we propose a novel trust model, namely, Man-in-the-middle Attack Resistance trust model IN connEcted vehicles (MARINE), which identifies dishonest nodes performing MiTM attacks in an efficient way as well as revokes their credentials. Every node running MARINE system first establishes trust for the sender by performing multi-dimensional plausibility checks. Once the receiver verifies the trustworthiness of the sender, the received data is then evaluated both directly and indirectly. Extensive simulations are carried out to evaluate the performance and accuracy of MARINE rigorously across three MiTM attacker models and the bench-marked trust model. Simulation results show that for a network containing 35% MiTM attackers, MARINE outperforms the state of the art trust model by 15%, 18%, and 17% improvements in precision, recall and F-score, respectively.N/A
Conceptualising Human-centric Cyber Security in the Arctic in Light of Digitalisation and Climate Change
The following article revisits existing scholarship on human-centric approaches to security in cyberspace and argues that a holistic understanding of cyber security in the Arctic must include discussion of the use of cyber technology in the everyday lives of individuals and communities, addressing both the ways such tools enable and undermine human security. Simultaneously, the article contextualises the Arctic as a region undergoing rapid change as a result of climate change and increased digitalisation and seeks to understand the consequent implications for human security. In light of these considerations, the article analyses the existing constraints and possibilities that cyber security and digitalisation pose for human security and revisits them from a humancentric perspective of cyber security. It also seeks to contextualise such security influences in relation to the role of climate change and its influence on the region. Finally, several examples are discussed to underline the interdependent implications of digitalisation and climate change from a human-centric perspective of cyber security in the Arctic
- …