20 research outputs found
An Efficient and Privacy-Preserving Multiuser Cloud-Based LBS Query Scheme
Location-based services (LBSs) are increasingly popular in today’s society. People reveal their location information to LBS providers to obtain personalized services such as map directions, restaurant recommendations, and taxi reservations. Usually, LBS providers offer user privacy protection statement to assure users that their private location information would not be given away. However, many LBSs run on third-party cloud infrastructures. It is challenging to guarantee user location privacy against curious cloud operators while still permitting users to query their own location information data. In this paper, we propose an efficient privacy-preserving cloud-based LBS query scheme for the multiuser setting. We encrypt LBS data and LBS queries with a hybrid encryption mechanism, which can efficiently implement privacy-preserving search over encrypted LBS data and is very suitable for the multiuser setting with secure and effective user enrollment and user revocation. This paper contains security analysis and performance experiments to demonstrate the privacy-preserving properties and efficiency of our proposed scheme
An Efficient Queries Processing Model Based on Multi Broadcast Searchable Keywords Encryption (MBSKE)
Cloud computing is a technology which has enabled many organizations to outsource their data in an encrypted form to improve processing times. The public Internet was not initially designed to handle massive quantities of data flowing through millions of networks. So the rapid increase of broadcast users and the growth of the amount broadcasted information leads to slow sending quires and receiving encrypted data from the cloud. In order to solve this problem Next Generation Internet (NGI) is developed with high speed, while keeping the privacy of data. This research proposes a novel search algorithm called Multi-broadcast Searchable Keywords Encryption, which processes queries having a set of keywords. This set of keywords is sent from the users to the cloud server in an encrypted form, thus hiding all information about the user or the content of the queries from the cloud server. The proposed method uses caching algorithm and provide an improvement of 40% in terms of runtime and trapdoor. In addition, the method minimizes computational costs, complexity, and maximizes throughput, in the cloud environment, whilst maintaining privacy and confidentiality of both the user and the cloud. The cloud returns encrypted query results to the user, where data is decrypted using the users’ private keys
Recommended from our members
Efficient Spectrum Sensing and Sharing Techniques for Dynamic Wideband Spectrum Access
Besides enabling an enhanced mobile broadband access, fifth-generation (5G) wireless mobile networks are envisioned to support the connectivity of massive, heterogeneous Internet of Things (IoT) devices. Connecting these devices through 5G systems and providing them with their needed data rates require huge amounts of spectrum and power resources, thus calling for the development and design of innovative, dynamic resource identification, access and sharing methods that make effective use of these limited resources. This thesis focuses specifically on wideband spectrum sensing, and presents innovative techniques that enable efficient identification and recovery of unused spectrum opportunities in wideband dynamic spectrum access. Recent research efforts have focused on leveraging compressive sampling (CS) theory to enable wideband spectrum sensing recovery at sub-Nyquist rates. However, these approaches suffer from the following shortcomings. First, they consider homogenous wideband spectrum, where all
bands are assumed to have similar primary users (PU)s traffic characteristics whereas in practice, the wideband spectrum occupancy is heterogeneous. Second, the number of measurements that receiver hardware designs are able to perform is practically way smaller than the number of measurements required by the CS-based sensing approaches. Third, the number of measurements required by the CS-based sensing approaches depends on the number of occupied bands (i.e., sparsity level), which is often unknown
in advance and changes over time. Forth, current wideband spectrum databases suffer from scalability issues in that they incur lots of sensing overhead. This thesis proposes a set of new, complementary techniques that overcome these aforementioned challenges. More specifically, in this thesis,
1. We design efficient spectrum occupancy information recovery techniques for heterogeneous wideband spectrum access. Our proposed techniques exploit the block-like structure of spectrum occupancy behavior observed in wideband spectrum access networks to enable the development of compressed spectrum sensing algorithms. Our proposed spectrum sensing algorithms achieve more stable spectrum information
recovery than that achieved by existing approaches.
2. We develop distributed CS-based spectrum sensing techniques for cooperative wideband spectrum access that require lesser measurements while overcoming time-variability of spectrum occupancy and addressing hidden terminal challenges. Also, we propose non-uniform sensing matrices design that exploits the heterogeneity in the wideband spectrum access to further improve the spectrum sensing recovery
accuracy.
3. We develop scalable spectrum occupancy information recovery techniques for database-driven wideband spectrum access networks. The novelty of our developed techniques lies in combining the merit of compressive sampling theory with that of low-rank matrix theory to enable scalable and accurate wideband spectrum occupancy recovery at low sensing overhead.
4. We propose joint data and energy transfer optimization frameworks for powering mobile cellular devices through RF energy harvesting. Our proposed framework accounts for both the consumed power at the base station and the battery power available at the end users to ensure that end users achieve their required data rates with as little battery power consumption as possible. We also analytically derive closed-form expressions of the optimal power allocations required for meeting the data rate requirements of the downlink and uplink communications between the base station and its mobile users
A comprehensive survey of V2X cybersecurity mechanisms and future research paths
Recent advancements in vehicle-to-everything (V2X) communication have notably improved existing transport systems by enabling increased connectivity and driving autonomy levels. The remarkable benefits of V2X connectivity come inadvertently with challenges which involve security vulnerabilities and breaches. Addressing security concerns is essential for seamless and safe operation of mission-critical V2X use cases. This paper surveys current literature on V2X security and provides a systematic and comprehensive review of the most relevant security enhancements to date. An in-depth classification of V2X attacks is first performed according to key security and privacy requirements. Our methodology resumes with a taxonomy of security mechanisms based on their proactive/reactive defensive approach, which helps identify strengths and limitations of state-of-the-art countermeasures for V2X attacks. In addition, this paper delves into the potential of emerging security approaches leveraging artificial intelligence tools to meet security objectives. Promising data-driven solutions tailored to tackle security, privacy and trust issues are thoroughly discussed along with new threat vectors introduced inevitably by these enablers. The lessons learned from the detailed review of existing works are also compiled and highlighted. We conclude this survey with a structured synthesis of open challenges and future research directions to foster contributions in this prominent field.This work is supported by the H2020-INSPIRE-5Gplus project (under Grant agreement No. 871808), the ”Ministerio de Asuntos Económicos y Transformacion Digital” and the European Union-NextGenerationEU in the frameworks of the ”Plan de Recuperación, Transformación y Resiliencia” and of the ”Mecanismo de Recuperación y Resiliencia” under references TSI-063000-2021-39/40/41, and the CHIST-ERA-17-BDSI-003 FIREMAN project funded by the Spanish National Foundation (Grant PCI2019-103780).Peer ReviewedPostprint (published version
Recommended from our members
Design and Implementation of System Components for Radio Frequency Based Asset Tracking Devices to Enhance Location Based Services. Study of angle of arrival techniques, effects of mutual coupling, design of an angle of arrival algorithm, design of a novel miniature reconfigurable antenna optimised for wireless communication systems
The angle of arrival estimation of multiple sources plays a vital role in the field of array signal
processing as MIMO systems can be employed at both the transmitter and the receiver end
and the system capacity, reliability and throughput can be significantly increased by using array
signal processing. Almost all applications require accurate direction of arrival (DOA) estimation
to localize the sources of the signals. Another important parameter of localization systems is
the array geometry and sensor design which can be application specific and is used to
estimate the DOA.
In this work, various array geometries and arrival estimation algorithms are studied and then a
new scheme for multiple source estimation is proposed and evaluated based on the
performance of subspace and non-subspace decomposition methods. The proposed scheme
has shown to outperform the conventional Multiple Signal Classification (MUSIC) estimation
and Bartlett estimation techniques. The new scheme has a better performance advantage at
low and high signal to noise ratio values (SNRs).
The research work also studies different array geometries for both single and multiple incident
sources and proposes a geometry which is cost effective and efficient for 3, 4, and 5 antenna
array elements. This research also considers the shape of the ground plane and its effects on
the angle of arrival estimation and in addition it shows how the mutual couplings between the
elements effect the overall estimation and how this error can be minimised by using a decoupling
matrix.
At the end, a novel miniaturised multi element reconfigurable antenna to represent the receiver
base station is designed and tested. The antenna radiation patterns in the azimuth angle are
almost omni-directional with linear polarisation. The antenna geometry is uniplanar printed logspiral
with striplines feeding network and biased components to improve the impedance
bandwidth. The antenna provides the benefit of small size, and re-configurability and is very
well suited for the asset tracking applications
Internet of Things Applications - From Research and Innovation to Market Deployment
The book aims to provide a broad overview of various topics of Internet of Things from the research, innovation and development priorities to enabling technologies, nanoelectronics, cyber physical systems, architecture, interoperability and industrial applications. It is intended to be a standalone book in a series that covers the Internet of Things activities of the IERC – Internet of Things European Research Cluster from technology to international cooperation and the global "state of play".The book builds on the ideas put forward by the European research Cluster on the Internet of Things Strategic Research Agenda and presents global views and state of the art results on the challenges facing the research, development and deployment of IoT at the global level. Internet of Things is creating a revolutionary new paradigm, with opportunities in every industry from Health Care, Pharmaceuticals, Food and Beverage, Agriculture, Computer, Electronics Telecommunications, Automotive, Aeronautics, Transportation Energy and Retail to apply the massive potential of the IoT to achieving real-world solutions. The beneficiaries will include as well semiconductor companies, device and product companies, infrastructure software companies, application software companies, consulting companies, telecommunication and cloud service providers. IoT will create new revenues annually for these stakeholders, and potentially create substantial market share shakeups due to increased technology competition. The IoT will fuel technology innovation by creating the means for machines to communicate many different types of information with one another while contributing in the increased value of information created by the number of interconnections among things and the transformation of the processed information into knowledge shared into the Internet of Everything. The success of IoT depends strongly on enabling technology development, market acceptance and standardization, which provides interoperability, compatibility, reliability, and effective operations on a global scale. The connected devices are part of ecosystems connecting people, processes, data, and things which are communicating in the cloud using the increased storage and computing power and pushing for standardization of communication and metadata. In this context security, privacy, safety, trust have to be address by the product manufacturers through the life cycle of their products from design to the support processes. The IoT developments address the whole IoT spectrum - from devices at the edge to cloud and datacentres on the backend and everything in between, through ecosystems are created by industry, research and application stakeholders that enable real-world use cases to accelerate the Internet of Things and establish open interoperability standards and common architectures for IoT solutions. Enabling technologies such as nanoelectronics, sensors/actuators, cyber-physical systems, intelligent device management, smart gateways, telematics, smart network infrastructure, cloud computing and software technologies will create new products, new services, new interfaces by creating smart environments and smart spaces with applications ranging from Smart Cities, smart transport, buildings, energy, grid, to smart health and life. Technical topics discussed in the book include: • Introduction• Internet of Things Strategic Research and Innovation Agenda• Internet of Things in the industrial context: Time for deployment.• Integration of heterogeneous smart objects, applications and services• Evolution from device to semantic and business interoperability• Software define and virtualization of network resources• Innovation through interoperability and standardisation when everything is connected anytime at anyplace• Dynamic context-aware scalable and trust-based IoT Security, Privacy framework• Federated Cloud service management and the Internet of Things• Internet of Things Application
Sistema de geolocalización para la atención de solicitudes de búsqueda servicios móviles. Caso aplicado en la empresa BITEL
Esta tesis abarca el desarrollo de un sistema de geolocalización, mediante la
metodología de desarrollo RUP, para la atencion de solicitudes de búsquedas de
servicios móviles en la empresa VIETTEL PERU S.A.C., la empresa antes de la
implementación de la aplicación presentaba deficiencias en cuanto a el índice de
eficacia y la disponibilidad del servicio, los cuales fueron importantes para resolver
los objetivos, incrementar el índice de eficacia y disponibilidad de servicio para la
atencion de solicitudes de localización.
Se utilizó la metodología RUP para el desarrollo de la aplicación, debido a que se
ajusta al desarrollo iterativo. La investigación es de tipo aplicada, el diseño es
experimental y el enfoque es cuantitativo. La muestra fue de 348 solicitudes de
localización. La técnica de recolección da datos fue el fichaje y el instrumento
ficha de registro. Los datos se procesaron y analizaron con el software SPSS V25.
La implementación del sistema de geolocalización permitió aumentar el índice de
eficacia de 94,32% a 99,20%, de forma similar, se consiguió incrementar la
disponibilidad del servicio de 96,39% a 99,58%. Entonces se puede concluir que
el sistema de geolocalización logró mejorar la atención de solicitudes de
búsqueda de servicios móviles
Radio Communications
In the last decades the restless evolution of information and communication technologies (ICT) brought to a deep transformation of our habits. The growth of the Internet and the advances in hardware and software implementations modified our way to communicate and to share information. In this book, an overview of the major issues faced today by researchers in the field of radio communications is given through 35 high quality chapters written by specialists working in universities and research centers all over the world. Various aspects will be deeply discussed: channel modeling, beamforming, multiple antennas, cooperative networks, opportunistic scheduling, advanced admission control, handover management, systems performance assessment, routing issues in mobility conditions, localization, web security. Advanced techniques for the radio resource management will be discussed both in single and multiple radio technologies; either in infrastructure, mesh or ad hoc networks