4,359 research outputs found

    The future of social is personal: the potential of the personal data store

    No full text
    This chapter argues that technical architectures that facilitate the longitudinal, decentralised and individual-centric personal collection and curation of data will be an important, but partial, response to the pressing problem of the autonomy of the data subject, and the asymmetry of power between the subject and large scale service providers/data consumers. Towards framing the scope and role of such Personal Data Stores (PDSes), the legalistic notion of personal data is examined, and it is argued that a more inclusive, intuitive notion expresses more accurately what individuals require in order to preserve their autonomy in a data-driven world of large aggregators. Six challenges towards realising the PDS vision are set out: the requirement to store data for long periods; the difficulties of managing data for individuals; the need to reconsider the regulatory basis for third-party access to data; the need to comply with international data handling standards; the need to integrate privacy-enhancing technologies; and the need to future-proof data gathering against the evolution of social norms. The open experimental PDS platform INDX is introduced and described, as a means of beginning to address at least some of these six challenges

    HiTrust: building cross-organizational trust relationship based on a hybrid negotiation tree

    Get PDF
    Small-world phenomena have been observed in existing peer-to-peer (P2P) networks which has proved useful in the design of P2P file-sharing systems. Most studies of constructing small world behaviours on P2P are based on the concept of clustering peer nodes into groups, communities, or clusters. However, managing additional multilayer topology increases maintenance overhead, especially in highly dynamic environments. In this paper, we present Social-like P2P systems (Social-P2Ps) for object discovery by self-managing P2P topology with human tactics in social networks. In Social-P2Ps, queries are routed intelligently even with limited cached knowledge and node connections. Unlike community-based P2P file-sharing systems, we do not intend to create and maintain peer groups or communities consciously. In contrast, each node connects to other peer nodes with the same interests spontaneously by the result of daily searches

    Single Secret Key Crptosystem for Secure and Efficient Exchange of Data in Cloud

    Get PDF
    Nowadays users are storing their personal data on a cloud storage because of its numerous advantages. One of the important advantage in cloud storage is sharing of data between users or between organizations. In this paper we propose a simple, flexible, efficient and secure data sharing method for the cloud users. Here we are describing a special type of public key encryption scheme where public key, master-secret key, single secret key and cipher text sizes are constant. Single secret key can be obtained by combining number of secret keys. The sender can securely share multiple files with receiver by encrypting each file using a separate public key. Then the sender will combine all the public keys to form a single secret key which is exchanged with receiver by using Diffie-Hellman algorithm. Advantage of small single secret key is user can store this decryption key on a resource constraint devices like smart cards, smart cell phones or sensor nodes. Receiver can download the number of files by using single secret key

    Towards Smart Cloud Gate Middleware : An approach based on Profiling Technique

    Get PDF
    International audienceMobile Cloud Computing (MCC) is a new paradigm whose mobile technology aims to exploit the advantages offered by the Cloud in order to provide ubiquitous PC-like functionality to mobile users. Cloud services provisioning is a continuously operating activity, unfortunately, services that has recently been deployed in the Cloud infrastructure remain unused or unknown by mobile devices. It is noteworthy that despite the benefits associated with the adoption of the Cloud by mobile technology the gate to the Cloud remains frozen. This means that mobile applications often use the same services without having an update of the novelty in Cloud. Thus, applications lack awareness of new services which are more advantageous in terms of features and qualities than the currently used ones. This is due to the fact that the interest of researchers in the field of MCC has been focused on how to enhance the performance of the computing counterpart of mobile technology. Actually, Cloud Computing is largely unexplored and considered only as a resource for provisioning on demand services. To enable mobile applications to exploit the Cloud intelligently, we propose Smart Mobile Cloud Architecture (SMCA). We consider this new architecture as referential allowing MCC users to have a full awareness of both contexts (Cloud and Mobile) at the same time. We introduce a new concept called Smart Cloud Gate (SCG), which aims to profile both mobile applications and the Cloud to extract knowledge that will be used as a criterion to select the appropriate services, which will be suggested to mobile applications and give each different application the appropriate view of the Cloud
    corecore