5,243 research outputs found

    Empirical Analysis of Privacy Preservation Models for Cyber Physical Deployments from a Pragmatic Perspective

    Get PDF
    The difficulty of privacy protection in cyber-physical installations encompasses several sectors and calls for methods like encryption, hashing, secure routing, obfuscation, and data exchange, among others. To create a privacy preservation model for cyber physical deployments, it is advised that data privacy, location privacy, temporal privacy, node privacy, route privacy, and other types of privacy be taken into account. Consideration must also be given to other types of privacy, such as temporal privacy. The computationally challenging process of incorporating these models into any wireless network also affects quality of service (QoS) variables including end-to-end latency, throughput, energy use, and packet delivery ratio. The best privacy models must be used by network designers and should have the least negative influence on these quality-of-service characteristics. The designers used common privacy models for the goal of protecting cyber-physical infrastructure in order to achieve this. The limitations of these installations' interconnection and interface-ability are not taken into account in this. As a result, even while network security has increased, the network's overall quality of service has dropped. The many state-of-the-art methods for preserving privacy in cyber-physical deployments without compromising their performance in terms of quality of service are examined and analyzed in this research. Lowering the likelihood that such circumstances might arise is the aim of this investigation and review. These models are rated according to how much privacy they provide, how long it takes from start to finish to transfer data, how much energy they use, and how fast their networks are. In order to maximize privacy while maintaining a high degree of service performance, the comparison will assist network designers and researchers in selecting the optimal models for their particular deployments. Additionally, the author of this book offers a variety of tactics that, when used together, might improve each reader's performance. This study also provides a range of tried-and-true machine learning approaches that networks may take into account and examine in order to enhance their privacy performance

    Constructing elastic distinguishability metrics for location privacy

    Full text link
    With the increasing popularity of hand-held devices, location-based applications and services have access to accurate and real-time location information, raising serious privacy concerns for their users. The recently introduced notion of geo-indistinguishability tries to address this problem by adapting the well-known concept of differential privacy to the area of location-based systems. Although geo-indistinguishability presents various appealing aspects, it has the problem of treating space in a uniform way, imposing the addition of the same amount of noise everywhere on the map. In this paper we propose a novel elastic distinguishability metric that warps the geometrical distance, capturing the different degrees of density of each area. As a consequence, the obtained mechanism adapts the level of noise while achieving the same degree of privacy everywhere. We also show how such an elastic metric can easily incorporate the concept of a "geographic fence" that is commonly employed to protect the highly recurrent locations of a user, such as his home or work. We perform an extensive evaluation of our technique by building an elastic metric for Paris' wide metropolitan area, using semantic information from the OpenStreetMap database. We compare the resulting mechanism against the Planar Laplace mechanism satisfying standard geo-indistinguishability, using two real-world datasets from the Gowalla and Brightkite location-based social networks. The results show that the elastic mechanism adapts well to the semantics of each area, adjusting the noise as we move outside the city center, hence offering better overall privacy

    IoTRec: The IoT Recommender for Smart Parking System

    Get PDF
    This paper proposes a General Data Protection Regulation (GDPR)-compliant Internet of Things (IoT) Recommender (IoTRec) system, developed in the framework of H2020 EU-KR WISE-IoT (Worldwide Interoperability for Semantic IoT) project, which provides the recommendations of parking spots and routes while protecting users’ privacy. It provides recommendations by exploiting the IoT technology (parking and traffic sensors). The IoTRec provides four-fold functions. Firstly, it helps the user to find a free parking spot based on different metrics (such as the nearest or nearest trusted parking spot). Secondly, it recommends a route (the least crowded or the shortest route) leading to the recommended parking spot from the user’s current location. Thirdly, it provides the real-time provision of expected availability of parking areas (comprised of parking spots organized into groups) in a user-friendly manner. Finally, it provides a GDPR-compliant implementation for operating in a privacy-aware environment. The IoTRec is integrated into the smart parking use case of the WISE-IoT project and is evaluated by the citizens of Santander, Spain through a prototype, but it can be applied to any IoT-enabled locality. The evaluation results show the citizen’s satisfaction with the quality, functionalities, ease of use and reliability of the recommendations/services offered by the IoTRec
    • …
    corecore