77,484 research outputs found

    Trust Estimation of Real-Time Social Harm Events

    Get PDF
    Indiana University-Purdue University Indianapolis (IUPUI)Social harm involves incidents resulting in physical, financial, and emotional hardships such as crime, drug overdoses and abuses, traffic accidents, and suicides. These incidents require various law-enforcement and emergency responding agencies to coordinate together for mitigating their impact on the society. With the advent of advanced networking and computing technologies together with data analytics, law-enforcement agencies and people in the community can work together to proactively reduce social harm. With the aim of effectively mitigating social harm events in communities, this thesis introduces a distributed web application, Community Data Analytic for Social Harm (CDASH). CDASH helps in collecting social harm data from heterogenous sources, analyzing the data for predicting social harm risks in the form of geographic hotspots and conveying the risks to law-enforcement agencies. Since various stakeholders including the police, community organizations and citizens can interact with CDASH, a need for a trust framework arises, to avoid fraudulent or mislabeled incidents from misleading CDASH. The enhanced system, called Trusted-CDASH (T-CDASH), superimposes a trust estimation framework on top of CDASH. This thesis discusses the importance and necessity of associating a degree of trust with each social harm incident reported to T-CDASH. It also describes the trust framework with different trust models that can be incorporated for assigning trust while examining their impact on prediction accuracy of future social harm events. The trust models are empirically validated by running simulations on historical social harm data of Indianapolis metro area

    Wireless Network Design and Optimization: From Social Awareness to Security

    Get PDF
    abstract: A principal goal of this dissertation is to study wireless network design and optimization with the focus on two perspectives: 1) socially-aware mobile networking and computing; 2) security and privacy in wireless networking. Under this common theme, this dissertation can be broadly organized into three parts. The first part studies socially-aware mobile networking and computing. First, it studies random access control and power control under a social group utility maximization (SGUM) framework. The socially-aware Nash equilibria (SNEs) are derived and analyzed. Then, it studies mobile crowdsensing under an incentive mechanism that exploits social trust assisted reciprocity (STAR). The efficacy of the STAR mechanism is thoroughly investigated. Next, it studies mobile users' data usage behaviors under the impact of social services and the wireless operator's pricing. Based on a two-stage Stackelberg game formulation, the user demand equilibrium (UDE) is analyzed in Stage II and the optimal pricing strategy is developed in Stage I. Last, it studies opportunistic cooperative networking under an optimal stopping framework with two-level decision-making. For both cases with or without dedicated relays, the optimal relaying strategies are derived and analyzed. The second part studies radar sensor network coverage for physical security. First, it studies placement of bistatic radar (BR) sensor networks for barrier coverage. The optimality of line-based placement is analyzed, and the optimal placement of BRs on a line segment is characterized. Then, it studies the coverage of radar sensor networks that exploits the Doppler effect. Based on a Doppler coverage model, an efficient method is devised to characterize Doppler-covered regions and an algorithm is developed to find the minimum radar density required for Doppler coverage. The third part studies cyber security and privacy in socially-aware networking and computing. First, it studies random access control, cooperative jamming, and spectrum access under an extended SGUM framework that incorporates negative social ties. The SNEs are derived and analyzed. Then, it studies pseudonym change for personalized location privacy under the SGUM framework. The SNEs are analyzed and an efficient algorithm is developed to find an SNE with desirable properties.Dissertation/ThesisDoctoral Dissertation Electrical Engineering 201

    Network governance for dealing with IT-enabled Interorganizational cooperation:when should network IT - such as social media - be used and how to govern it

    Get PDF
    IT-based networking trends such as the rise of social media, crowd sourcing, open innovation, and cloud computing enable a profoundly different way of working and collaborating that challenges significantly traditional approaches of companies towards governance, i.e. the mechanisms a company employs to achieving business results and safeguarding information. Standard practices developed with a hierarchical model of the company in mind, are inadequate for providing sufficient correlation between governance mechanisms deployed and results achieved. Popular literature on the subject states that dealing effectively with such new technologies in a business environment requires relinquishing control and subverting to trust. This paper makes the case that deploying successfully new IT-based networking tools rather involves shifting one’s trust from a well-established and well-known governance system based on hierarchy and control towards another governance system, termed in the literature as network governance. This paper assesses when network governance is the better suited governance system. The presented theoretical model helps to understand how companies should use arising new technologies and which tasks are suited for network-driven IT-applications. Furthermore, the model enables to understand how network governance works to achieve business results and to safeguard information exchanges

    When network governance is needed to control IT-applications used in coordination and innovation

    Get PDF
    IT-based networking trends such as the rise of social media, crowd sourcing, open innovation, and cloud computing enable a profoundly different way of working and collaborating that challenges significantly traditional approaches of companies towards governance, i.e. the mechanisms a company employs to achieving business results and safeguarding information. Standard practices developed with a hierarchical model of the company in mind, are inadequate for providing sufficient correlation between governance mechanisms deployed and results achieved. Popular literature on the subject states that dealing effectively with such new technologies in a business environment requires relinquishing control and subverting to trust. This paper makes the case that deploying successfully new IT-based networking tools rather involves shifting one’s trust from a well-established and well-known governance system based on hierarchy and control towards another governance system, termed in the literature as network governance. This paper assesses when network governance is the better suited governance system. The presented theoretical model helps to understand how companies should use arising new technologies and which tasks are suited for network-driven IT-applications. Furthermore, the model enables to understand how network governance works to achieve business results and to safeguard information exchanges

    User-Centric Security and Privacy Mechanisms in Untrusted Networking and Computing Environments

    Get PDF
    Our modern society is increasingly relying on the collection, processing, and sharing of digital information. There are two fundamental trends: (1) Enabled by the rapid developments in sensor, wireless, and networking technologies, communication and networking are becoming more and more pervasive and ad hoc. (2) Driven by the explosive growth of hardware and software capabilities, computation power is becoming a public utility and information is often stored in centralized servers which facilitate ubiquitous access and sharing. Many emerging platforms and systems hinge on both dimensions, such as E-healthcare and Smart Grid. However, the majority information handled by these critical systems is usually sensitive and of high value, while various security breaches could compromise the social welfare of these systems. Thus there is an urgent need to develop security and privacy mechanisms to protect the authenticity, integrity and confidentiality of the collected data, and to control the disclosure of private information. In achieving that, two unique challenges arise: (1) There lacks centralized trusted parties in pervasive networking; (2) The remote data servers tend not to be trusted by system users in handling their data. They make existing security solutions developed for traditional networked information systems unsuitable. To this end, in this dissertation we propose a series of user-centric security and privacy mechanisms that resolve these challenging issues in untrusted network and computing environments, spanning wireless body area networks (WBAN), mobile social networks (MSN), and cloud computing. The main contributions of this dissertation are fourfold. First, we propose a secure ad hoc trust initialization protocol for WBAN, without relying on any pre-established security context among nodes, while defending against a powerful wireless attacker that may or may not compromise sensor nodes. The protocol is highly usable for a human user. Second, we present novel schemes for sharing sensitive information among distributed mobile hosts in MSN which preserves user privacy, where the users neither need to fully trust each other nor rely on any central trusted party. Third, to realize owner-controlled sharing of sensitive data stored on untrusted servers, we put forward a data access control framework using Multi-Authority Attribute-Based Encryption (ABE), that supports scalable fine-grained access and on-demand user revocation, and is free of key-escrow. Finally, we propose mechanisms for authorized keyword search over encrypted data on untrusted servers, with efficient multi-dimensional range, subset and equality query capabilities, and with enhanced search privacy. The common characteristic of our contributions is they minimize the extent of trust that users must place in the corresponding network or computing environments, in a way that is user-centric, i.e., favoring individual owners/users

    The state-of-the-art in personalized recommender systems for social networking

    Get PDF
    With the explosion of Web 2.0 application such as blogs, social and professional networks, and various other types of social media, the rich online information and various new sources of knowledge flood users and hence pose a great challenge in terms of information overload. It is critical to use intelligent agent software systems to assist users in finding the right information from an abundance of Web data. Recommender systems can help users deal with information overload problem efficiently by suggesting items (e.g., information and products) that match users’ personal interests. The recommender technology has been successfully employed in many applications such as recommending films, music, books, etc. The purpose of this report is to give an overview of existing technologies for building personalized recommender systems in social networking environment, to propose a research direction for addressing user profiling and cold start problems by exploiting user-generated content newly available in Web 2.0
    corecore