15,352 research outputs found
Constructing elastic distinguishability metrics for location privacy
With the increasing popularity of hand-held devices, location-based
applications and services have access to accurate and real-time location
information, raising serious privacy concerns for their users. The recently
introduced notion of geo-indistinguishability tries to address this problem by
adapting the well-known concept of differential privacy to the area of
location-based systems. Although geo-indistinguishability presents various
appealing aspects, it has the problem of treating space in a uniform way,
imposing the addition of the same amount of noise everywhere on the map. In
this paper we propose a novel elastic distinguishability metric that warps the
geometrical distance, capturing the different degrees of density of each area.
As a consequence, the obtained mechanism adapts the level of noise while
achieving the same degree of privacy everywhere. We also show how such an
elastic metric can easily incorporate the concept of a "geographic fence" that
is commonly employed to protect the highly recurrent locations of a user, such
as his home or work. We perform an extensive evaluation of our technique by
building an elastic metric for Paris' wide metropolitan area, using semantic
information from the OpenStreetMap database. We compare the resulting mechanism
against the Planar Laplace mechanism satisfying standard
geo-indistinguishability, using two real-world datasets from the Gowalla and
Brightkite location-based social networks. The results show that the elastic
mechanism adapts well to the semantics of each area, adjusting the noise as we
move outside the city center, hence offering better overall privacy
ABAKA : a novel attribute-based k-anonymous collaborative solution for LBSs
The increasing use of mobile devices, along with advances in telecommunication systems, increased the popularity of Location-Based Services (LBSs). In LBSs, users share their exact location with a potentially untrusted Location-Based Service Provider (LBSP). In such a scenario, user privacy becomes a major con- cern: the knowledge about user location may lead to her identification as well as a continuous tracing of her position. Researchers proposed several approaches to preserve users’ location privacy. They also showed that hiding the location of an LBS user is not enough to guarantee her privacy, i.e., user’s pro- file attributes or background knowledge of an attacker may reveal the user’s identity. In this paper we propose ABAKA, a novel collaborative approach that provides identity privacy for LBS users considering users’ profile attributes. In particular, our solution guarantees p -sensitive k -anonymity for the user that sends an LBS request to the LBSP. ABAKA computes a cloaked area by collaborative multi-hop forwarding of the LBS query, and using Ciphertext-Policy Attribute-Based Encryption (CP-ABE). We ran a thorough set of experiments to evaluate our solution: the results confirm the feasibility and efficiency of our proposal
The Meeting of Acquaintances: A Cost-efficient Authentication Scheme for Light-weight Objects with Transient Trust Level and Plurality Approach
Wireless sensor networks consist of a large number of distributed sensor
nodes so that potential risks are becoming more and more unpredictable. The new
entrants pose the potential risks when they move into the secure zone. To build
a door wall that provides safe and secured for the system, many recent research
works applied the initial authentication process. However, the majority of the
previous articles only focused on the Central Authority (CA) since this leads
to an increase in the computation cost and energy consumption for the specific
cases on the Internet of Things (IoT). Hence, in this article, we will lessen
the importance of these third parties through proposing an enhanced
authentication mechanism that includes key management and evaluation based on
the past interactions to assist the objects joining a secured area without any
nearby CA. We refer to a mobility dataset from CRAWDAD collected at the
University Politehnica of Bucharest and rebuild into a new random dataset
larger than the old one. The new one is an input for a simulated authenticating
algorithm to observe the communication cost and resource usage of devices. Our
proposal helps the authenticating flexible, being strict with unknown devices
into the secured zone. The threshold of maximum friends can modify based on the
optimization of the symmetric-key algorithm to diminish communication costs
(our experimental results compare to previous schemes less than 2000 bits) and
raise flexibility in resource-constrained environments.Comment: 27 page
Post conflict housing reconstruction: housing needs and expectations of conflict affected communities
Post conflict housing reconstruction plays an important role in establishing the country’s
development and prospect of peace. Despite this importance, it was identified that there are
inconsistencies between the provision of built housing and the needs of the users. Therefore
many post conflict housing reconstruction projects lead to dissatisfaction on the part of residents
and remodelling by themselves or rejection and abandonment. Hence it is important and
necessary to address conflict affected communities’ housing reconstruction needs in post
conflict housing reconstruction. With regard to this, it is worthwhile to examine the concept of
housing needs in general and to explore the housing needs of conflict affected communities.
Therefore this paper aims to present a synthesis of housing needs literature relevant to usual and
post conflict contexts. In relevance to housing needs in general, housing preferences in a market
context and adequate housing measures were identified. Following this, housing needs of
conflict affected communities were identified. In a market context, housing needs were
exhibited in terms of the subjective preferences of households. Adequate housing was
recognized as part of the right to an adequate standard of living in the 1948 Universal
Declaration of Human Rights and in the 1966 International Covenant on Economic, Social and
Cultural Rights. Hence adequate housing measures identified certain aspects of housing that
must be taken into account for this purpose in any particular context. Whilst most housing
considerations of conflict affected communities were similar to adequate housing measures,
conflict affected communities gave greater importance to their social, cultural and religious
values in post conflict housing reconstruction. In addition they considered the aspects of safety
and security as being vital, and various perceptions of these communities in relation to housing
reconstruction and post occupancy evaluation were important in post conflict housing
reconstruction. Nevertheless, no relevant data on special housing needs of disadvantaged groups
in post conflict environments were found
- …