49,562 research outputs found

    User-centric Privacy Engineering for the Internet of Things

    Get PDF
    User privacy concerns are widely regarded as a key obstacle to the success of modern smart cyber-physical systems. In this paper, we analyse, through an example, some of the requirements that future data collection architectures of these systems should implement to provide effective privacy protection for users. Then, we give an example of how these requirements can be implemented in a smart home scenario. Our example architecture allows the user to balance the privacy risks with the potential benefits and take a practical decision determining the extent of the sharing. Based on this example architecture, we identify a number of challenges that must be addressed by future data processing systems in order to achieve effective privacy management for smart cyber-physical systems.Comment: 12 Page

    Architecture and Implementation of a Trust Model for Pervasive Applications

    Get PDF
    Collaborative effort to share resources is a significant feature of pervasive computing environments. To achieve secure service discovery and sharing, and to distinguish between malevolent and benevolent entities, trust models must be defined. It is critical to estimate a device\u27s initial trust value because of the transient nature of pervasive smart space; however, most of the prior research work on trust models for pervasive applications used the notion of constant initial trust assignment. In this paper, we design and implement a trust model called DIRT. We categorize services in different security levels and depending on the service requester\u27s context information, we calculate the initial trust value. Our trust value is assigned for each device and for each service. Our overall trust estimation for a service depends on the recommendations of the neighbouring devices, inference from other service-trust values for that device, and direct trust experience. We provide an extensive survey of related work, and we demonstrate the distinguishing features of our proposed model with respect to the existing models. We implement a healthcare-monitoring application and a location-based service prototype over DIRT. We also provide a performance analysis of the model with respect to some of its important characteristics tested in various scenarios

    Privacy-preserving scoring of tree ensembles : a novel framework for AI in healthcare

    Get PDF
    Machine Learning (ML) techniques now impact a wide variety of domains. Highly regulated industries such as healthcare and finance have stringent compliance and data governance policies around data sharing. Advances in secure multiparty computation (SMC) for privacy-preserving machine learning (PPML) can help transform these regulated industries by allowing ML computations over encrypted data with personally identifiable information (PII). Yet very little of SMC-based PPML has been put into practice so far. In this paper we present the very first framework for privacy-preserving classification of tree ensembles with application in healthcare. We first describe the underlying cryptographic protocols that enable a healthcare organization to send encrypted data securely to a ML scoring service and obtain encrypted class labels without the scoring service actually seeing that input in the clear. We then describe the deployment challenges we solved to integrate these protocols in a cloud based scalable risk-prediction platform with multiple ML models for healthcare AI. Included are system internals, and evaluations of our deployment for supporting physicians to drive better clinical outcomes in an accurate, scalable, and provably secure manner. To the best of our knowledge, this is the first such applied framework with SMC-based privacy-preserving machine learning for healthcare

    Extending remote patient monitoring with mobile real time clinical decision support

    Get PDF
    Large scale implementation of telemedicine services such as telemonitoring and teletreatment will generate huge amounts of clinical data. Even small amounts of data from continuous patient monitoring cannot be scrutinised in real time and round the clock by health professionals. In future huge volumes of such data will have to be routinely screened by intelligent software systems. We investigate how to make m-health systems for ambulatory care more intelligent by applying a Decision Support approach in the analysis and interpretation of biosignal data and to support adherence to evidence-based best practice such as is expressed in treatment protocols and clinical practice guidelines. The resulting Clinical Decision Support Systems must be able to accept and interpret real time streaming biosignals and context data as well as the patient’s (relatively less dynamic) clinical and administrative data. In this position paper we describe the telemonitoring/teletreatment system developed at the University of Twente, based on Body Area Network (BAN) technology, and present our vision of how BAN-based telemedicine services can be enhanced by incorporating mobile real time Clinical Decision Support. We believe that the main innovative aspects of the vision relate to the implementation of decision support on a mobile platform; incorporation of real time input and analysis of streaming\ud biosignals into the inferencing process; implementation of decision support in a distributed system; and the consequent challenges such as maintenance of consistency of knowledge, state and beliefs across a distributed environment

    Mechatronics & the cloud

    Get PDF
    Conventionally, the engineering design process has assumed that the design team is able to exercise control over all elements of the design, either directly or indirectly in the case of sub-systems through their specifications. The introduction of Cyber-Physical Systems (CPS) and the Internet of Things (IoT) means that a design team’s ability to have control over all elements of a system is no longer the case, particularly as the actual system configuration may well be being dynamically reconfigured in real-time according to user (and vendor) context and need. Additionally, the integration of the Internet of Things with elements of Big Data means that information becomes a commodity to be autonomously traded by and between systems, again according to context and need, all of which has implications for the privacy of system users. The paper therefore considers the relationship between mechatronics and cloud-basedtechnologies in relation to issues such as the distribution of functionality and user privacy

    Plan Now for Managing Electronic Data and Avoid Tomorrow’s Legal Risks

    Get PDF
    [Excerpt] In a world where the use of electronic data is rapidly increasing, companies must find ways to manage data now so that they effectively control compliance risks. The proliferation of electronic data is both astonishing and overwhelming. Given the storage power of average computers today, even the most modest mom-and-pop business may have electronic storage capacity equivalent to 2,000 four-drawer file cabinets. The task of managing electronic data is further compounded by the fact that the data is no longer just tangible pieces of paper, but rather are bytes of information that are constantly being edited, changed, and updated from different people and sources. Proper archiving, retention, monitoring, filtering, and encryption of electronic data are no longer optional: they are imperative

    At Face Value: Visual Antecedents of Impression Formation in Servicescapes

    Get PDF
    Consumers may base employee impressions on physical appearance\ud and displayed personal objects. In a scenario experiment,\ud using photos of a physician and a 360-degree panorama of his\ud consultation room, we examined the effects of appearance and\ud tangibles on impression formation. Study 1 shows that observers\ud employ various strategies of combining information from different\ud sources when forming an impression of the employee’s friendliness\ud and competence. Whereas previous research has shown that impression\ud formation based on personal appearances proceeds in an\ud automatic fashion, the findings of study 2 indicate that impression\ud formation grounded in the perception of tangibles requires more\ud elaborate processin
    corecore