22,456 research outputs found

    Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information

    Get PDF
    Search engines are the prevalently used tools to collect information about individuals on the Internet. Search results typically comprise a variety of sources that contain personal information -- either intentionally released by the person herself, or unintentionally leaked or published by third parties, often with detrimental effects on the individual's privacy. To grant individuals the ability to regain control over their disseminated personal information, the European Court of Justice recently ruled that EU citizens have a right to be forgotten in the sense that indexing systems, must offer them technical means to request removal of links from search results that point to sources violating their data protection rights. As of now, these technical means consist of a web form that requires a user to manually identify all relevant links upfront and to insert them into the web form, followed by a manual evaluation by employees of the indexing system to assess if the request is eligible and lawful. We propose a universal framework Oblivion to support the automation of the right to be forgotten in a scalable, provable and privacy-preserving manner. First, Oblivion enables a user to automatically find and tag her disseminated personal information using natural language processing and image recognition techniques and file a request in a privacy-preserving manner. Second, Oblivion provides indexing systems with an automated and provable eligibility mechanism, asserting that the author of a request is indeed affected by an online resource. The automated ligibility proof ensures censorship-resistance so that only legitimately affected individuals can request the removal of corresponding links from search results. We have conducted comprehensive evaluations, showing that Oblivion is capable of handling 278 removal requests per second, and is hence suitable for large-scale deployment

    Survey on: Multimedia Content Protection using Cloud

    Get PDF
    There is need for large scale multimedia content protection system. There are varying workloads for which cloud infrastructure provide cost efficiency, rapid development and scalability. Data protection along with security whole together contribute to the success of cloud. Security is very important in today�s online world. It is widely accepted that cloud computing has the unrealized ability to make privacy disable. The cloud is been chosen because it provides some security features. The greatest challenge is to process data securely in cloud. One of the factor leading to high performance in cloud is nothing but the security. For the protection purpose, a system for multimedia content protection on cloud infrastructure is presented. The system can be used to protect various multimedia contents such as 2D video and 3D videos, graphics which is animated, images, audios clips etc. Multimedia is the combination of data, text, image, audio, or video in a single application. The system can be deployed on both public cloud and private cloud. Two major components to be considered are method to create signatures of 3D videos and matching engine for multimedia objects. Depth signals are captured from 3D videos. This system detects the duplicated multimedia content that is copyright material in an online environment

    Software implementation of a secure firmware update solution in an IoT context

    Get PDF
    The present paper is concerned with the secure delivery of firmware updates to Internet of Things (IoT) devices. Additionally, it deals with the design of a safe and secure bootloader for a UHF RFID reader. A software implementation of a secure firmware update solution is performed. The results show there is space to integrate even more security features into existing devices

    GPUs as Storage System Accelerators

    Full text link
    Massively multicore processors, such as Graphics Processing Units (GPUs), provide, at a comparable price, a one order of magnitude higher peak performance than traditional CPUs. This drop in the cost of computation, as any order-of-magnitude drop in the cost per unit of performance for a class of system components, triggers the opportunity to redesign systems and to explore new ways to engineer them to recalibrate the cost-to-performance relation. This project explores the feasibility of harnessing GPUs' computational power to improve the performance, reliability, or security of distributed storage systems. In this context, we present the design of a storage system prototype that uses GPU offloading to accelerate a number of computationally intensive primitives based on hashing, and introduce techniques to efficiently leverage the processing power of GPUs. We evaluate the performance of this prototype under two configurations: as a content addressable storage system that facilitates online similarity detection between successive versions of the same file and as a traditional system that uses hashing to preserve data integrity. Further, we evaluate the impact of offloading to the GPU on competing applications' performance. Our results show that this technique can bring tangible performance gains without negatively impacting the performance of concurrently running applications.Comment: IEEE Transactions on Parallel and Distributed Systems, 201

    Glacier motion estimation using SAR offset-tracking procedures

    Get PDF
    Two image-to-image patch offset techniques for estimating feature motion between satellite synthetic aperture radar (SAR) images are discussed. Intensity tracking, based on patch intensity cross-correlation optimization, and coherence tracking, based on patch coherence optimization, are used to estimate the movement of glacier surfaces between two SAR images in both slant-range and azimuth direction. The accuracy and application range of the two methods are examined in the case of the surge of Monacobreen in Northern Svalbard between 1992 and 1996. Offset-tracking procedures of SAR images are an alternative to differential SAR interferometry for the estimation of glacier motion when differential SAR interferometry is limited by loss of coherence, i.e., in the case of rapid and incoherent flow and of large acquisition time intervals between the two SAR images. In addition, an offset-tracking procedure in the azimuth direction may be combined with differential SAR interferometry in the slant-range direction in order to retrieve a two-dimensional displacement map when SAR data of only one orbit configuration are available

    Graph Based Video Sequence Matching & BoF Method for Video Copy detection

    Get PDF
    In this paper we propose video copy detection method using Bag-of-Features and showing acyclic graph of matching frames of videos. This include use of both local (line, texture, color) and global (Scale Invariant Feature Transform i.e. SIFT) features. This process includes dividing video into small frames using dual threshold method which eliminates the redundant frames and select unique key frames. After that from each key frame binary features are extracted which known as Bag of Features (BoF) which are get stored into the database in format of matrix. When any query video is being uploading, same features are extracted and compared with stored database to detect copied video. If video detected as copied then using Graph Based Sequence Matching Method, actual matched sequence between key frames is displayed in acyclic graph. DOI: 10.17762/ijritcc2321-8169.15067

    A Multispectral Look at Oil Pollution Detection, Monitoring, and Law Enforcement

    Get PDF
    The problems of detecting oil films on water, mapping the areal extent of slicks, measuring the slick thickness, and identifying oil types are discussed. The signature properties of oil in the ultraviolet, visible, infrared, microwave, and radar regions are analyzed
    • …
    corecore