373,385 research outputs found

    Game Theory Based Privacy Protection for Context-Aware Services

    Get PDF
    In the era of context-aware services, users are enjoying remarkable services based on data collected from a multitude of users. To receive services, they are at risk of leaking private information from adversaries possibly eavesdropping on the data and/or the un--trusted service platform selling off its data. Malicious adversaries may use leaked information to violate users\u27 privacy in unpredictable ways. To protect users\u27 privacy, many algorithms are proposed to protect users\u27 sensitive information by adding noise, thus causing context-aware service quality loss. Game theory has been utilized as a powerful tool to balance the tradeoff between privacy protection level and service quality. However, most of the existing schemes fail to depict the mutual relationship between any two parties involved: user, platform, and adversary. There is also an oversight to formulate the interaction occurring between multiple users, as well as the interaction between any two attributes. To solve these issues, this dissertation firstly proposes a three-party game framework to formulate the mutual interaction between three parties and study the optimal privacy protection level for context-aware services, thus optimize the service quality. Next, this dissertation extends the framework to a multi-user scenario and proposes a two-layer three-party game framework. This makes the proposed framework more realistic by further exploring the interaction, not only between different parties, but also between users. Finally, we focus on analyzing the impact of long-term time-serial data and the active actions of the platform and adversary. To achieve this objective, we design a three-party Stackelberg game model to help the user to decide whether to update information and the granularity of updated information

    Context storage using NoSQL

    Get PDF
    With the ubiquity and pervasiveness of mobile computing, together with the increasing number of social networks, end-users have learned to live and share all kinds of information about themselves. As an example, Facebook reports that it has currently 500 million active users, 200 million of which access its services on mobile systems; moreover, users that access Facebook through mobile applications are twice as active as non-mobile users, and it is used by 200 mobile operators in 60 countries [1]. More specific mobile platforms such as Foursquare, which unlike Facebook only collects location information, reports 6.5 million users worldwide, and also has a mobile presence (both with a web application and iPhone / Android applications) [2]. Context- aware architectures intend to explore this increasing number of context information sources and provide richer, targeted services to end-users, while also taking into account arising privacy issues. While multiple context management platform architectures have been devised [3], this paper focuses primarily on Context- Broker-based architectures, such as the ones proposed in the projects Mobilife [4] and C-Cast [5]. More specifically, it focuses on the context management platform XCoA [6]. This platform uses XMPP for its main communication protocol, and publishes context information in a Context-Broker. This context information is provided by Context-Agents, such as mobile terminals, sensor networks and social networks. Due to the nature of the XMPP protocol, the context information is provided in XML form. This paper proposes the usage of a NoSQL storage system for the purpose of context information storage and retrieval in an XMPP broker-based context platform such as XCoA, together with a full-text searching engine. Through a comparison made through prototypes, the paper clearly demonstrates the advantages of NoSQL storage systems applied to the area of Context Management

    A practical approach to product design for future worlds using scenario-development

    Get PDF
    The focus of consumer product design is shifting from primarily offering functionality, towards\ud experience and emotion driven product characteristics [1]. At the same time the functioning of\ud products is more and more defined in its social context. Product designers can play a major role in\ud developing our future social context, as long as they are aware of the responsibility towards users,\ud society and environment. In the master ‘Design & Styling’ of the Industrial Design Engineering\ud program of the University of Twente, we created a course “Create the Future”, addressing both these\ud future- and society oriented aspects of design. In this paper we describe the course structure and the\ud associated teaching methods, give examples of student results and discuss the points of interest and\ud application possibilities. In the 2008 edition the students explored the future of food. First the students\ud created a future context by investigating, building and visualizing multiple scenarios. Subsequently\ud they designed a future product concept within these scenario contexts. It showed that the structure of\ud this course was particularly suitable for designing products for the not so near future, i.e. 15-20 years\ud ahead. Especially scenario development proved to be a good instrument for the students to be able to\ud create a tangible context for designing future products and services

    Flexible Macroblock Ordering for Context-Aware Ultrasound Video Transmission over Mobile WiMAX

    Get PDF
    The most recent network technologies are enabling a variety of new applications, thanks to the provision of increased bandwidth and better management of Quality of Service. Nevertheless, telemedical services involving multimedia data are still lagging behind, due to the concern of the end users, that is, clinicians and also patients, about the low quality provided. Indeed, emerging network technologies should be appropriately exploited by designing the transmission strategy focusing on quality provision for end users. Stemming from this principle, we propose here a context-aware transmission strategy for medical video transmission over WiMAX systems. Context, in terms of regions of interest (ROI) in a specific session, is taken into account for the identification of multiple regions of interest, and compression/transmission strategies are tailored to such context information. We present a methodology based on H.264 medical video compression and Flexible Macroblock Ordering (FMO) for ROI identification. Two different unequal error protection methodologies, providing higher protection to the most diagnostically relevant data, are presented

    Privacy In Multi-Agent And Dynamical Systems

    Get PDF
    The use of private data is pivotal for numerous services including location--based ones, collaborative recommender systems, and social networks. Despite the utility these services provide, the usage of private data raises privacy concerns to their owners. Noise--injecting techniques, such as differential privacy, address these concerns by adding artificial noise such that an adversary with access to the published response cannot confidently infer the private data. Particularly, in multi--agent and dynamical environments, privacy--preserving techniques need to be expressive enough to capture time--varying privacy needs, multiple data owners, and multiple data users. Current work in differential privacy assumes that a single response gets published and a single predefined privacy guarantee is provided. This work relaxes these assumptions by providing several problem formulations and their approaches. In the setting of a social network, a data owner has different privacy needs against different users. We design a coalition--free privacy--preserving mechanism that allows a data owner to diffuse their private data over a network. We also formulate the problem of multiple data owners that provide their data to multiple data users. Also, for time--varying privacy needs, we prove that, for a class of existing privacy--preserving mechanism, it is possible to effectively relax privacy constraints gradually. Additionally, we provide a privacy--aware mechanism for time--varying private data, where we wish to protect only the current value of it. Finally, in the context of location--based services, we provide a mechanism where the strength of the privacy guarantees varies with the local population density. These contributions increase the applicability of differential privacy and set future directions for more flexible and expressive privacy guarantees

    Quality-of-Service-Aware Service Selection in Mobile Environments

    Get PDF
    The last decade is characterized by the rise of mobile technologies (UMTS, LTE, WLAN, Bluetooth, SMS, etc.) and devices (notebooks, tablets, mobile phones, smart watches, etc.). In this rise, mobiles phones have played a crucial role because they paved the way for mobile pervasion among the public. In addition, this development has also led to a rapid growth of the mobile service/application market (Statista 2017b). As a consequence, users of mobile devices nowadays find themselves in a mobile environment, with (almost) unlimited access to information and services from anywhere through the Internet, and can connect to other people at any time (cf. Deng et al. 2016; Newman 2015). Additionally, modern mobile devices offer the opportunity to select the services or information that best fit to a user’s current context. In this regard, mobile information services support users in retrieving context and non-context information, such as about the current traffic situation, public transport options, and flight connections, as well as about real-world entities, such as sights, museums, and restaurants (cf. Deng et al. 2016; Heinrich and Lewerenz 2015; Ventola 2014). An example of the application of mobile information services is several users planning a joint city day trip. Here, the users could utilize information retrieved about real-world entities for their planning. Such a trip constitutes a process with multiple participating users and may encompass actions such as visiting a museum and having lunch. For each action, mobile information services (e.g., Yelp, TripAdvisor, Google Places) can help locate available alternatives that differ only in attributes such as price, average length of stay (i.e., duration), or recommendations published by previous visitors. In addition, context information (e.g., business hours, distance) can be used to more effectively support the users in their decisions. Moreover, because multiple users are participating in the same trip, some users want to or must conduct certain actions together. However, decision-makers (e.g., mobile users) attempting to determine the optimal solution for such processes – meaning the best alternative for each action and each participating user – are confronted with several challenges, as shown by means of the city trip example: First, each user most likely has his or her own preferences and requirements regarding attributes such as price and duration, which all must be considered. Furthermore, for each action of the day trip, a huge number of alternatives probably exist. Thus, users might face difficulties selecting the optimal alternatives because of an information overload problem (Zhang et al. 2009). Second, taking multiple users into account may require the coordination of their actions because of potential dependencies among different users’ tours, which, for example, is the case when users prefer to conduct certain actions together. This turns the almost sophisticated decision problem at hand into a problem of high complexity. The problem complexity is increased further when considering context information, because this causes dependencies among different actions of a user that must be taken into account. For instance, the distance to cover by a user to reach a certain restaurant depends on the location of the previously visited museum. In conclusion, it might be impossible for a user to determine an optimal city trip tour for all users, making decision support by an information system necessary. Because the available alternatives for each action of the process can be denoted as (information) service objects (cf. Dannewitz et al. 2008; Heinrich and Lewerenz 2015; Hinkelmann et al. 2013), the decision problem at hand is a Quality-of-Service (QoS)-aware service selection problem. This thesis proposes novel concepts and optimization approaches for QoS-aware service selection regarding processes with multiple users and context information, focusing on scenarios in mobile environments. In this respect, the developed multi user context-aware service selection approaches are able to deal with dependencies among different users’ service compositions, which result from the consideration of multiple users, as well as dependencies within a user’s service composition, which result from the consideration of context information. Consequently, these approaches provide suitable support for decision-makers, such as mobile users

    Secure, privacy assured mechanisms for heterogeneous contextual environments

    Get PDF
    Location information is used to provide a diverse range of services to users such as emergency, navigation, billing, security, information and advertising services. This information is derived from a broad range of indoor and outdoor technologies. The location information thus derived is of different granularity, different co-ordination system and is controlled by numerous service providers. In addition to this, broad selections of devices are used for providing these services. Having a diverse range of applications requiring location information at different levels of granularity, the need to export location information across multiple devices and the existence of different location determination technologies necessitates the need for heterogeneous location network. These networks derive location information from multiple sources and provides various location-based services to users irrespective of the medium, device or technology used. Security, user privacy and management of location information are some of the important issues that need to be addressed. The main contribution of this thesis is the design of a secure and privacy assured heterogeneous location architecture. A formal methodology was chosen to design the heterogeneous location architecture. The design of the architecture resulted in a novel key distribution protocol and a model for information flow that can be easily encapsulated into applications or architectures having similar requirements. The research also resulted in the enhancement of a proposed location framework for securing critical infrastructures using context-aware self-defending objects. The proposed enhanced framework helps to negate the security vulnerabilities introduced through the use of general-purpose computer systems in critical infrastructures
    corecore