1,946 research outputs found

    A Marketplace for Efficient and Secure Caching for IoT Applications in 5G Networks

    Get PDF
    As the communication industry is progressing towards fifth generation (5G) of cellular networks, the traffic it carries is also shifting from high data rate traffic from cellular users to a mixture of high data rate and low data rate traffic from Internet of Things (IoT) applications. Moreover, the need to efficiently access Internet data is also increasing across 5G networks. Caching contents at the network edge is considered as a promising approach to reduce the delivery time. In this paper, we propose a marketplace for providing a number of caching options for a broad range of applications. In addition, we propose a security scheme to secure the caching contents with a simultaneous potential of reducing the duplicate contents from the caching server by dividing a file into smaller chunks. We model different caching scenarios in NS-3 and present the performance evaluation of our proposal in terms of latency and throughput gains for various chunk sizes

    Hacking the social life of Big Data

    Get PDF
    This paper builds on the Our Data Ourselves research project, which examined ways of understanding and reclaiming the data that young people produce on smartphone devices. Here we explore the growing usage and centrality of mobiles in the lives of young people, questioning what data-making possibilities exist if users can either uncover and/or capture what data controllers such as Facebook monetize and share about themselves with third-parties. We outline the MobileMiner, an app we created to consider how gaining access to one’s own data not only augments the agency of the individual but of the collective user. Finally, we discuss the data making that transpired during our hackathon. Such interventions in the enclosed processes of datafication are meant as a preliminary investigation into the possibilities that arise when young people are given back the data which they are normally structurally precluded from accessing

    Privacy implications of smartphone-based connected vehicle communications

    Get PDF
    Considerable work has been carried out into making the vision of connected vehicles a reality, with inter-operable communications to take place between vehicles for the purpose of improving road safety and alerting road users to accidents or sudden braking. The cost of deploying such a solution to large numbers of vehicles is significant, and vehicles have a much longer lifespan than other consumer equipment, leading to other work considering the use of smartphones as possible devices for such connected vehicle networks. In this paper, we consider the security and privacy implications of using smartphone based platforms for connected vehicle applications, both in vehicles, and those carried by pedestrians. We also consider the general risks of relying on consumer smartphones, particularly with regard to the lack of long-term security updates being available. We finally explore the need for privacy to be considered in the design of solutions, in addition to the well-recognised need for security, and explore the trade-off between anonymity and prevention of abuse, in the context of designing future connected vehicle technologies

    Putting Fair Use on Display: Ending the Permissions Culture in the Museum Community

    Get PDF
    Digital technologies present museums with tremendous opportunities to increase public access to the arts. But the longstanding “permissions culture” entrenched in the museum community—in which licenses are obtained for the use of copyrighted materials regardless of whether such uses are “fair,” such that licenses are not legally required—likely will make the cost of many potential digital projects prohibitively expensive. Ending the permissions culture is therefore critically important to museums as they seek to connect with diverse audiences in the Digital Age. In this issue brief, I argue that such a development will require clear and context-specific information about fair use that enables museum professionals to better understand the appropriate boundaries of fair use, and that a community-based code of best practices—like the College Art Association’s recently released Code of Best Practices for Fair Use in the Visual Arts—is likely the best means to achieve this

    Knowing Your Population: Privacy-Sensitive Mining of Massive Data

    Full text link
    Location and mobility patterns of individuals are important to environmental planning, societal resilience, public health, and a host of commercial applications. Mining telecommunication traffic and transactions data for such purposes is controversial, in particular raising issues of privacy. However, our hypothesis is that privacy-sensitive uses are possible and often beneficial enough to warrant considerable research and development efforts. Our work contends that peoples behavior can yield patterns of both significant commercial, and research, value. For such purposes, methods and algorithms for mining telecommunication data to extract commonly used routes and locations, articulated through time-geographical constructs, are described in a case study within the area of transportation planning and analysis. From the outset, these were designed to balance the privacy of subscribers and the added value of mobility patterns derived from their mobile communication traffic and transactions data. Our work directly contrasts the current, commonly held notion that value can only be added to services by directly monitoring the behavior of individuals, such as in current attempts at location-based services. We position our work within relevant legal frameworks for privacy and data protection, and show that our methods comply with such requirements and also follow best-practice

    Review Paper on Privacy Preservation Techniques in Cloud

    Get PDF
    In this information world, large amounts of data are collected and analyzed every day. Cloud computing is the most known model for supporting large and complex data. Organizations are moving toward cloud computing for getting benefit of its cost reduction and elasticity features but cloud computing has potential risk and vulnerabilities. One of major problem in moving to cloud computing is its security and privacy concerns.Encryption is standalone problem for the security of data stored on the cloud. So we proposed method which combines the concept of encryption along with data deduplication methodology to enhance the privacy of data over cloud. Data deduplication is a specialized data compression technique for eliminating duplicate copies of repeating data in storage. In turns this technique saves the cost and time associated with redundant accessing and processing of data overhead involve as compared to normal operations.

    Katz and Covid-19 How a Pandemic Changed the Reasonable Expectation of Privacy

    Get PDF
    COVID-19 spread to 189 countries and infected tens of millions of people in the matter of months. Organizations, including governments and employers, turned to health surveillance technologies to slow the spread and combat the disease. Protected health information and personal information are required for the proper and effective functioning of the health surveillance technologies. The collection, use, and dissemination of protected health and personal information raised data privacy and security concerns. But under the current data privacy and security regime—based on the reasonable expectation of privacy standard—protected health and personal information is not protected to the extent that it needs to be. Unlike other scholarly work, this article presents deeper analysis into the technologies, the data that powers them, and the applicable legal standards. The objective is to provide a better understanding of (i) the data privacy and security risks, and (ii) whether the current data privacy and security regime in the United States provides sufficient protections for individuals. This article explores two health surveillance technologies (contact tracing applications and health monitoring platforms), presents three categories of data (user-inputted, queried, and autogenerated data), and describes the data supply chains that power technology and organizations. I discuss the benefits and risks of collecting the protected health and personal information in response to the pandemic. I explore the current legal standards and jurisprudence, and I propose the Privacy Continuum to explain how the pandemic shifted the reasonable expectation of privacy. I present a case study to synthesize the foregoing, and I conclude by proposing a new legal standard—the right to control—and other reforms to effectuate true data privacy and security protections. Only then can we reclaim our right to privacy

    Designing a VM-level vertical scalability service in current cloud platforms: A new hope for wearable computers

    Get PDF
    The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.Public clouds are becoming ripe for enterprise adoption. Many companies, including large enterprises, are increasingly relying on public clouds as a substitute for, or a supplement to, their own computing infrastructures. On the other hand, cloud storage service has attracted over 625 million users. However, apart from the storage service, other cloud services, such as the computing service, have not yet attracted the end users’ interest for economic and technical reasons. Cloud service providers offers horizontal scalability to make their services scalable and economical for enterprises while it is still not economical for the individual users to use their computing services due to the lack of vertical scalability. Moreover, current virtualization technologies and operating systems, specifically the guest operating systems installed on virtual machines, do not support the concept of vertical scalability. In addition, network remote access protocols are meant to administer remote machines but they are unable to run the non-administrative tasks such as playing heavy games and watching high quality videos remotely in a way that makes the users feel as if they are sitting locally on their personal machines. On the other hand, the industry is yet unable to make efficient wearable computers a reality due to the limited size of the wearable devices, where it is infeasible to place efficient processors and big enough hard disks. This paper aims to highlight the need for the vertical scalability service and design the appropriate cloud, virtualization layer, and operating system services to incorporate vertical scalability in current cloud platforms in a way that will make it economically and technically efficient for the end users to use cloud virtual machines as if they are using their personal laptops. Through these services, the cloud takes wearable computing to the next stage and makes wearable computers a reality

    Using augmented reality to enhance the shopping mall experience

    Get PDF
    The objective of the present study is to understand if consumers would use an Augmented Reality application on their smartphones while visiting a shopping mall. This application would have several features that would boost the shopping mall experience. In order to access the acceptance of this technological hypothesis an online survey was conducted to extract empirical data from a reliable sample. This empirical data is analysed and characterized with some descriptive statistics, as well as cross-tabulations between some variables. This analysis allows a better characterization of this sample, and the formation of preliminary conclusions fundamental to the final conclusion. The results shows that most of the individuals in this sample are willing to use the features of the proposed technological hypotheses and, thus, would use the Augmented Reality application on their smartphones when visiting a shopping mall.O objectivo do presente estudo é perceber se os consumidores usariam uma aplicação com Realidade Aumentada nos seus smartphones durante uma visita a um centro comercial. Esta aplicação teria várias funcionalidades que melhorariam a experiência que é uma visita a um centro comercial. De modo a avaliar a aceitação desta proposta tecnológica foi feito um questionário online a uma amostra fidedigna de onde se retiraram dados empíricos. Estes dados foram analisados e caracterizados com recurso a algumas estatísticas descritivas e também ao cruzamento de algumas variáveis. Esta análise permitiu uma melhor caracterização da amostra, e a formação de conclusões preliminares fundamentais para a conclusão final. Os resultados mostraram que a maioria dos indivíduos desta amostra estão dispostos a usar as funcionalidades desta proposta tecnológica e, deste modo, usariam a aplicação com Realidade Aumentada nos seus smartphones durante uma visita a um centro comercial
    • …
    corecore