The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Crowdsensing applications require individuals to share local and personal sensing data with others to produce valuable knowledge and services. Meanwhile, it has raised concerns especially for location privacy. Users may wish to prevent privacy leak and publish as many non-sensitive contexts as possible. Simply suppressing sensitive contexts is vulnerable to the adversaries exploiting spatio-temporal...
This paper focuses on designing an online feedback management system that collects data in the form of suggestions, ratings and comments, and applies machine learning capabilities to automatically extract relevant summaries of the suggestions posted in this automated suggestion system. We have analyzed two key requirements, anonymous feedback and credible feedback, to gain insight on the submitted...
Participatory sensing is a revolutionary paradigm in which volunteers collect and share information from their local environment using mobile phones. The design of a successful participatory sensing application is met with two challenges - (1) user privacy and (2) data trustworthiness. Addressing these challenges concurrently is a non-trivial task since they result in conflicting system requirements...
Recent years have seen a confluence of two major trends -- the increase of mobile devices such as smart phones as the primary access point to networked information and the rise of social media platforms that connect people. Their convergence supports the emergence of a new class of context-aware geosocial networking applications. While existing systems focus mostly on location, our work centers on...
With the abundance and ubiquity of mobile devices, a new class of applications is emerging, called participatory sensing (PS), where people can contribute data (e.g., images, video) collected by their mobile devices to central data servers. However, privacy concerns are becoming a major impediment in the success of many participatory sensing systems. While several privacy preserving techniques exist...
Context awareness is just beginning to revolutionize the ways we interact with networked devices. In order for context awareness to flourish, especially in a pervasive environment, users must be certain that their privacy is respected. Privacy in pervasive online community depends on the level of granularity of the provided information, user's relation to possible recipients, and the possible usage...
Privacy is considered to be a critical issue for providing high quality ubiquitous network services to users over the Internet. User's privacy should be protected and access to privacy information must be controlled in accordance with user's privacy preferences. Existing privacy-aware access control strategies often store all the privacy access control policies on the server side and thus fail to...
In this paper we describe extensions to the access control industry standards XACML and SAML to enable privacy-preserving and credential-based access control. Rather than assuming that an enforcement point knows all the requester's attributes, our extensions allow the requester to learn which attributes have to be revealed and which conditions must be satisfied, thereby enabling to leverage the advantages...
Location obfuscation using cloaking regions preserves location anonymity by hiding the true user among a set of other equally likely users. Furthermore, a cloaking region should also guarantee that the type of queries issued by users within the region are mutually diverse enough. The first requirement is fulfilled by satisfying location k-anonymity while the second one is ensured by satisfying query...
Sharing personal context information using mobile phone is receiving considerable attentions in ubiquitous computing applications. The most common architecture for sharing personal context information via mobile phone uses centralized server. Such server-based architecture, however, cannot avoid waste of mobile phone's limited resources for sharing personal context information. Additionally, dynamic...
The electronic identity (eID) is being positioned to be a basic tool for identification, authentication and authorization in application domains ranging from eCommerce in private sector to eGovernance in public sector. A practical and flexible eID should be usable in both a network-connected online setting as well as in conventional offline situations. While improving security of communication and...
We address issues related to privacy protection in location-based services (LBS). Most existing research in this field either requires a trusted third-party (anonymizer) or uses oblivious protocols that are computationally and communicationally expensive. Our design of privacy-preserving techniques is principled on not requiring a trusted third-party while being highly efficient in terms of time and...
Recent research on remote health monitoring solutions has focused largely on developing context-dependent, streamprocessing capabilities on a personal mobile hub (typically, a cellphone) for energy-efficient transmission of data collected from a set of body-worn medical sensors. In this paper, we argue that commercial deployment of such pervasive wellness monitoring will require the extension of such...
To provide consumers with the right information at the time of need, we developed a SmartSearch application that is able to extract a user's situational interests from usage data. It automatically constructs search queries based on situational interests. We extract the situational interests automatically without prior training and user involvement. In addition, SmartSearch is a client-side solution...
The emergence of new technologies and the proliferation of mobile and handheld devices have facilitated development of context-based services. Common examples include the location based services. However, the revelation of the context and static information gives rise to new and very complex privacy concerns in such services. In this paper, we propose a formal model to regulate the privacy level of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.