Privacy-Preserving in Mobile Crowdsensing

Privacy-Preserving in Mobile Crowdsensing PDF Author: Chuan Zhang
Publisher: Springer Nature
ISBN: 9811983151
Category : Computers
Languages : en
Pages : 205

Get Book Here

Book Description
Mobile crowdsensing is a new sensing paradigm that utilizes the intelligence of a crowd of individuals to collect data for mobile purposes by using their portable devices, such as smartphones and wearable devices. Commonly, individuals are incentivized to collect data to fulfill a crowdsensing task released by a data requester. This “sensing as a service” elaborates our knowledge of the physical world by opening up a new door of data collection and analysis. However, with the expansion of mobile crowdsensing, privacy issues urgently need to be solved. In this book, we discuss the research background and current research process of privacy protection in mobile crowdsensing. In the first chapter, the background, system model, and threat model of mobile crowdsensing are introduced. The second chapter discusses the current techniques to protect user privacy in mobile crowdsensing. Chapter three introduces the privacy-preserving content-based task allocation scheme. Chapter four further introduces the privacy-preserving location-based task scheme. Chapter five presents the scheme of privacy-preserving truth discovery with truth transparency. Chapter six proposes the scheme of privacy-preserving truth discovery with truth hiding. Chapter seven summarizes this monograph and proposes future research directions. In summary, this book introduces the following techniques in mobile crowdsensing: 1) describe a randomizable matrix-based task-matching method to protect task privacy and enable secure content-based task allocation; 2) describe a multi-clouds randomizable matrix-based task-matching method to protect location privacy and enable secure arbitrary range queries; and 3) describe privacy-preserving truth discovery methods to support efficient and secure truth discovery. These techniques are vital to the rapid development of privacy-preserving in mobile crowdsensing.

Privacy-Preserving in Mobile Crowdsensing

Privacy-Preserving in Mobile Crowdsensing PDF Author: Chuan Zhang
Publisher: Springer Nature
ISBN: 9811983151
Category : Computers
Languages : en
Pages : 205

Get Book Here

Book Description
Mobile crowdsensing is a new sensing paradigm that utilizes the intelligence of a crowd of individuals to collect data for mobile purposes by using their portable devices, such as smartphones and wearable devices. Commonly, individuals are incentivized to collect data to fulfill a crowdsensing task released by a data requester. This “sensing as a service” elaborates our knowledge of the physical world by opening up a new door of data collection and analysis. However, with the expansion of mobile crowdsensing, privacy issues urgently need to be solved. In this book, we discuss the research background and current research process of privacy protection in mobile crowdsensing. In the first chapter, the background, system model, and threat model of mobile crowdsensing are introduced. The second chapter discusses the current techniques to protect user privacy in mobile crowdsensing. Chapter three introduces the privacy-preserving content-based task allocation scheme. Chapter four further introduces the privacy-preserving location-based task scheme. Chapter five presents the scheme of privacy-preserving truth discovery with truth transparency. Chapter six proposes the scheme of privacy-preserving truth discovery with truth hiding. Chapter seven summarizes this monograph and proposes future research directions. In summary, this book introduces the following techniques in mobile crowdsensing: 1) describe a randomizable matrix-based task-matching method to protect task privacy and enable secure content-based task allocation; 2) describe a multi-clouds randomizable matrix-based task-matching method to protect location privacy and enable secure arbitrary range queries; and 3) describe privacy-preserving truth discovery methods to support efficient and secure truth discovery. These techniques are vital to the rapid development of privacy-preserving in mobile crowdsensing.

When Compressive Sensing Meets Mobile Crowdsensing

When Compressive Sensing Meets Mobile Crowdsensing PDF Author: Linghe Kong
Publisher: Springer
ISBN: 9811377766
Category : Computers
Languages : en
Pages : 134

Get Book Here

Book Description
This book provides a comprehensive introduction to applying compressive sensing to improve data quality in the context of mobile crowdsensing. It addresses the following main topics: recovering missing data, efficiently collecting data, preserving user privacy, and detecting false data. Mobile crowdsensing, as an emerging sensing paradigm, enables the masses to take part in data collection tasks with the aid of powerful mobile devices. However, mobile crowdsensing platforms have yet to be widely adopted in practice, the major concern being the quality of the data collected. There are numerous causes: some locations may generate redundant data, while others may not be covered at all, since the participants are rarely systematically coordinated; privacy is a concern for some people, who don’t wish to share their real-time locations, and therefore some key information may be missing; further, some participants may upload fake data in order to fraudulently gain rewards. To address these problematic aspects, compressive sensing, which works by accurately recovering a sparse signal using very few samples, has proven to offer an effective solution.

Algorithms and Architectures for Parallel Processing

Algorithms and Architectures for Parallel Processing PDF Author: Jaideep Vaidya
Publisher: Springer
ISBN: 3030050637
Category : Computers
Languages : en
Pages : 675

Get Book Here

Book Description
The four-volume set LNCS 11334-11337 constitutes the proceedings of the 18th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2018, held in Guangzhou, China, in November 2018. The 141 full and 50 short papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on Distributed and Parallel Computing; High Performance Computing; Big Data and Information Processing; Internet of Things and Cloud Computing; and Security and Privacy in Computing.

Security and Privacy in Communication Networks

Security and Privacy in Communication Networks PDF Author: Songqing Chen
Publisher: Springer Nature
ISBN: 3030372286
Category : Computers
Languages : en
Pages : 592

Get Book Here

Book Description
This two-volume set LNICST 304-305 constitutes the post-conference proceedings of the 15thInternational Conference on Security and Privacy in Communication Networks, SecureComm 2019, held in Orlando, FL, USA, in October 2019. The 38 full and 18 short papers were carefully reviewed and selected from 149 submissions. The papers are organized in topical sections on blockchains, internet of things, machine learning, everything traffic security communicating covertly, let’s talk privacy, deep analysis, systematic theory, bulletproof defenses, blockchains and IoT, security and analytics, machine learning, private, better clouds, ATCS workshop.

2021 International Wireless Communications and Mobile Computing (IWCMC)

2021 International Wireless Communications and Mobile Computing (IWCMC) PDF Author: IEEE Staff
Publisher:
ISBN: 9781728186177
Category :
Languages : en
Pages :

Get Book Here

Book Description
IWCMC 2021 will target a wide spectrum of the state of the art as well as emerging topics pertaining to wireless networks, wireless sensors, vehicular communications, and mobile computing

Mobile Multimedia Communications

Mobile Multimedia Communications PDF Author: Jinbo Xiong
Publisher: Springer Nature
ISBN: 3030898148
Category : Computers
Languages : en
Pages : 899

Get Book Here

Book Description
This book constitutes the thoroughly refereed post-conference proceedings of the 14th International Conference on Mobile Multimedia Communications, Mobimedia 2021, held in July 2021. Due to COVID-19 pandemic the conference was held virtually. The 66 revised full papers presented were carefully selected from 166 submissions. The papers are organized in topical sections as follows: Internet of Things and Wireless Communications Communication; Strategy Optimization and Task Scheduling Oral Presentations; Privacy Computing Technology; Cyberspace Security and Access control; Neural Networks and Feature Learning Task Classification and Prediction; Object Recognition and Detection.

Vehicular Social Networks

Vehicular Social Networks PDF Author: Anna Maria Vegni
Publisher: CRC Press
ISBN: 1498749208
Category : Computers
Languages : en
Pages : 192

Get Book Here

Book Description
The book provides a comprehensive guide to vehicular social networks. The book focuses on a new class of mobile ad hoc networks that exploits social aspects applied to vehicular environments. Selected topics are related to social networking techniques, social-based routing techniques applied to vehicular networks, data dissemination in VSNs, architectures for VSNs, and novel trends and challenges in VSNs. It provides significant technical and practical insights in different aspects from a basic background on social networking, the inter-related technologies and applications to vehicular ad-hoc networks, the technical challenges, implementation and future trends.

Algorithms for Data and Computation Privacy

Algorithms for Data and Computation Privacy PDF Author: Alex X. Liu
Publisher: Springer
ISBN: 9783030588984
Category : Computers
Languages : en
Pages : 404

Get Book Here

Book Description
This book introduces the state-of-the-art algorithms for data and computation privacy. It mainly focuses on searchable symmetric encryption algorithms and privacy preserving multi-party computation algorithms. This book also introduces algorithms for breaking privacy, and gives intuition on how to design algorithm to counter privacy attacks. Some well-designed differential privacy algorithms are also included in this book. Driven by lower cost, higher reliability, better performance, and faster deployment, data and computing services are increasingly outsourced to clouds. In this computing paradigm, one often has to store privacy sensitive data at parties, that cannot fully trust and perform privacy sensitive computation with parties that again cannot fully trust. For both scenarios, preserving data privacy and computation privacy is extremely important. After the Facebook–Cambridge Analytical data scandal and the implementation of the General Data Protection Regulation by European Union, users are becoming more privacy aware and more concerned with their privacy in this digital world. This book targets database engineers, cloud computing engineers and researchers working in this field. Advanced-level students studying computer science and electrical engineering will also find this book useful as a reference or secondary text.

2020 IEEE 6th International Conference on Computer and Communications (ICCC)

2020 IEEE 6th International Conference on Computer and Communications (ICCC) PDF Author: iccc
Publisher:
ISBN: 9781728186351
Category :
Languages : en
Pages :

Get Book Here

Book Description


Fog and Fogonomics

Fog and Fogonomics PDF Author: Yang Yang
Publisher: John Wiley & Sons
ISBN: 1119501113
Category : Technology & Engineering
Languages : en
Pages : 400

Get Book Here

Book Description
THE ONE-STOP RESOURCE FOR ANY INDIVIDUAL OR ORGANIZATION CONSIDERING FOG COMPUTING Fog and Fogonomics is a comprehensive and technology-centric resource that highlights the system model, architectures, building blocks, and IEEE standards for fog computing platforms and solutions. The "fog" is defined as the multiple interconnected layers of computing along the continuum from cloud to endpoints such as user devices and things including racks or microcells in server closets, residential gateways, factory control systems, and more. The authors noted experts on the topic review business models and metrics that allow for the economic assessment of fog-based information communication technology (ICT) resources, especially mobile resources. The book contains a wide range of templates and formulas for calculating quality-of-service values. Comprehensive in scope, it covers topics including fog computing technologies and reference architecture, fog-related standards and markets, fog-enabled applications and services, fog economics (fogonomics), and strategy. This important resource: Offers a comprehensive text on fog computing Discusses pricing, service level agreements, service delivery, and consumption of fog computing Examines how fog has the potential to change the information and communication technology industry in the next decade Describes how fog enables new business models, strategies, and competitive differentiation, as with ecosystems of connected and smart digital products and services Includes case studies featuring integration of fog computing, communication, and networking systems Written for product and systems engineers and designers, as well as for faculty and students, Fog and Fogonomics is an essential book that explores the technological and economic issues associated with fog computing.