8 research outputs found

    What Does The Crowd Say About You? Evaluating Aggregation-based Location Privacy

    Get PDF
    Information about people’s movements and the locations they visit enables an increasing number of mobility analytics applications, e.g., in the context of urban and transportation planning, In this setting, rather than collecting or sharing raw data, entities often use aggregation as a privacy protection mechanism, aiming to hide individual users’ location traces. Furthermore, to bound information leakage from the aggregates, they can perturb the input of the aggregation or its output to ensure that these are differentially private. In this paper, we set to evaluate the impact of releasing aggregate location time-series on the privacy of individuals contributing to the aggregation. We introduce a framework allowing us to reason about privacy against an adversary attempting to predict users’ locations or recover their mobility patterns. We formalize these attacks as inference problems, and discuss a few strategies to model the adversary’s prior knowledge based on the information she may have access to. We then use the framework to quantify the privacy loss stemming from aggregate location data, with and without the protection of differential privacy, using two real-world mobility datasets. We find that aggregates do leak information about individuals’ punctual locations and mobility profiles. The density of the observations, as well as timing, play important roles, e.g., regular patterns during peak hours are better protected than sporadic movements. Finally, our evaluation shows that both output and input perturbation offer little additional protection, unless they introduce large amounts of noise ultimately destroying the utility of the data

    Challenges on setting-up the research and development tools and capacities in a transitional country (Kosovo)

    Get PDF
    Presented at the CRIS2012 Conference in Prague.-- 8 pages.-- Full conference programme available at: http://www.cris2012.org/findByFilter.do?categoryId=1158This paper presents progress and challenges made on setting-up the research and development (R&D) tools and capacities in a transitional country, Kosovo. Thus, the largest public higher education institution of Kosovo, the University of Prishtina (UP) is taken as a case study. It examines the establishment process of R&D structure at the UP from scratch; status quo analysis of R&D situation within the institution; setting up an R&D strategy, structures and procedures; as well as the development of R&D services and instruments for the UP.The paper reflects the major problems that the UP encountered on establishment of research information technology (IT)-based information system, development of impact point system and implementation of an e-Science magazine

    Elliptic curve based zero knowledge proofs and their applicability on resource constrained devices

    No full text
    As the Internet of Things (IOT) arises, the use of low-end devices on a daily basis increases. The wireless nature of communication that these devices provide raises security and privacy issues. For protecting a user's privacy, cryptography offers the tool of zero knowledge proofs (ZKP). In this paper, we study well-established ZKP protocols based on the discrete logarithm problem and we adapt them to the Elliptic Curve Cryptography (ECC) setting, which consists an ideal candidate for embedded implementations. Then, we implement the proposed protocols on Wiselib, a generic and open source algorithmic library. For the first time, we present a thorough evaluation of the protocols on two popular hardware platforms equipped with low end microcontrollers (Jennic JN5139, TI MSP430) and 802.15.4 RF transceivers, in terms of code size, execution time, message size and energy requirements. This work's results can be used from developers who wish to achieve certain levels of privacy in their applications. © 2011 IEEE
    corecore