12 research outputs found

    A Collaborative Protocol for Private Retrieval of Location-Based Information

    Get PDF
    Privacy and security are paramount for the proper deployment of location-based services (LBSs). We present a novel protocol based on user collaboration to privately retrieve location-based information from an LBS provider. Our approach neither assumes that users or the LBS can be completely trusted with regard to privacy, nor relies on a trusted third party. In addition, user queries, containing accurate locations, remain unchanged, and the collaborative protocol does not impose any special requirements on the query-response function of the LBS. The protocol is analyzed in terms of privacy, network traffic, and LBS processing overhead. We show that our proposal provides exponential scalability in the probability of guaranteed privacy breach, at the expense of a linear relative network cost.Preprin

    External monitoring changes in vehicle hardware profiles: enhancing automotive cyber-security

    Get PDF
    As the vehicles are gradually transformed into the connected-vehicles, standard features of the past (i.e., immobilizer, keyless entry, self-diagnostics) were neglected to be software updated and hardware upgraded so they do not 'align” with the cyber-security demands of the new ICT era (IoT, Industry 4.0, IPv6, sensor technology) we have stepped into, therefore introducing critical legacy IT security issues. Stepping beyond the era of common auto-theft and 'chop-shops,” the new wave of attackers have cyber-skills to exploit these vulnerabilities and steal the vehicle or manipulate it. Recent evolution in ICT offered automotive industry vital tools for vehicle safety, functionality and up to 2010, theft prevention. However, the same technologies are the ones that make vehicles prone to cyber-attacks. To counter such attacks, this work proposes a unified solution that logs all hardware profile changes of a vehicle in a blockchain, to manage control and allow only authenticated changes, subject to user, time, geospatial, and contextual constraints exploiting several blockchain features. Testing of the proposed solution omens the prevention of numerous commons attacks, while additionally providing forensics capabilities and significantly enhancing the security architecture of the vehicle (respecting the original IT architectural design of automotive manufacturers)

    El projecte SIMPATIC: Tecnologia per a la qualitat de vida de la gent gran

    No full text
    En el projecte simpatic s’ha estudiat com els dispositius mòbils d’ús quotidià poden ajudar-nos a millorar la qualitat de vida de les persones amb deteriorament cognitiu lleu i la de les persones del seu entorn: cuidadors, familiars, amics, professionals de l’àmbit mèdic i de les ciències socials. En la primera part d’aquest llibre es fa referència als aspectes de funcionalitat del sistema desenvolupat en el projecte i la seva implementació. En la segona es tracten els valors recollits durant els mesos en què es va dur a terme la prova pilot del sistema

    Attribute-based credentials for privacy-aware smart health services in IoT- based smart cities

    Get PDF
    Smart city-based IoT devices enable collection of vast amounts of data, which can be used to provide more efficient public and private services. Among these, healthcare is especially relevant, and smart health (s-health) models are already being deployed. The authors propose attribute-based credentials (ABCs) to cope with s-health privacy issues and to set the stage for the further adoption in other privacy-aware IoT-based smart cities' services.This work has been supported by the CRYPTACUS COST action (IC1403), MINECO grant TIN2016-79095-C2-2-R, and CAM grant S2013/ICE-3095, and by the Government of Catalonia with the project 2017-SGR-89

    A Collaborative Protocol for Private Retrieval of Location-Based Information

    No full text
    Privacy and security are paramount for the proper deployment of location-based services (LBSs). We present a novel protocol based on user collaboration to privately retrieve location-based information from an LBS provider. Our approach neither assumes that users or the LBS can be completely trusted with regard to privacy, nor relies on a trusted third party. In addition, user queries, containing accurate locations, remain unchanged, and the collaborative protocol does not impose any special requirements on the query-response function of the LBS. The protocol is analyzed in terms of privacy, network traffic, and LBS processing overhead. We show that our proposal provides exponential scalability in the probability of guaranteed privacy breach, at the expense of a linear relative network cost

    A Collaborative Protocol for Private Retrieval of Location-Based Information

    No full text
    Privacy and security are paramount for the proper deployment of location-based services (LBSs). We present a novel protocol based on user collaboration to privately retrieve location-based information from an LBS provider. Our approach neither assumes that users or the LBS can be completely trusted with regard to privacy, nor relies on a trusted third party. In addition, user queries, containing accurate locations, remain unchanged, and the collaborative protocol does not impose any special requirements on the query-response function of the LBS. The protocol is analyzed in terms of privacy, network traffic, and LBS processing overhead. We show that our proposal provides exponential scalability in the probability of guaranteed privacy breach, at the expense of a linear relative network cost

    Identitat digital, setembre 2011

    No full text
    Material docent de la Universitat Oberta de Catalunya.Material docente de la "Universitat Oberta de Catalunya".Learning material of the "Universitat Oberta de Catalunya"

    Identidad digital, septiembre 2013

    No full text
    Recurs d'aprenentatge de la Universitat Oberta de Catalunya.Recurso de aprendizaje de la "Universitat Oberta de Catalunya".Learning material of the "Universitat Oberta de Catalunya"

    Identitat digital, setembre 2013

    No full text
    Recurs d'aprenentatge de la Universitat Oberta de Catalunya.Recurso de aprendizaje de la "Universitat Oberta de Catalunya".Learning material of the "Universitat Oberta de Catalunya"

    Identitat digital, setembre 2013

    No full text
    Recurs d'aprenentatge de la Universitat Oberta de Catalunya.Recurso de aprendizaje de la "Universitat Oberta de Catalunya".Learning material of the "Universitat Oberta de Catalunya"
    corecore