Preserving Security and Privacy in Large-Scale VANETs

Author(s):  
Bo Qin ◽  
Qianhong Wu ◽  
Josep Domingo-Ferrer ◽  
Lei Zhang
Author(s):  
Matilda A. Haas ◽  
Harriet Teare ◽  
Megan Prictor ◽  
Gabi Ceregra ◽  
Miranda E. Vidgen ◽  
...  

AbstractThe complexities of the informed consent process for participating in research in genomic medicine are well-documented. Inspired by the potential for Dynamic Consent to increase participant choice and autonomy in decision-making, as well as the opportunities for ongoing participant engagement it affords, we wanted to trial Dynamic Consent and to do so developed our own web-based application (web app) called CTRL (control). This paper documents the design and development of CTRL, for use in the Australian Genomics study: a health services research project building evidence to inform the integration of genomic medicine into mainstream healthcare. Australian Genomics brought together a multi-disciplinary team to develop CTRL. The design and development process considered user experience; security and privacy; the application of international standards in data sharing; IT, operational and ethical issues. The CTRL tool is now being offered to participants in the study, who can use CTRL to keep personal and contact details up to date; make consent choices (including indicate preferences for return of results and future research use of biological samples, genomic and health data); follow their progress through the study; complete surveys, contact the researchers and access study news and information. While there are remaining challenges to implementing Dynamic Consent in genomic research, this study demonstrates the feasibility of building such a tool, and its ongoing use will provide evidence about the value of Dynamic Consent in large-scale genomic research programs.


Author(s):  
John McGaha

The United States congress and the past several administrations have dedicated considerable funding for incentives focused on accelerating the adoption by the healthcare industry of Health Information Technology (HIT) solutions. The most recent effort towards these objectives includes a focus on the creation of a National Health Information Network that will support large scale exchange of health information. This chapter explores the technical, security and privacy implications of the advent of such an integrated network and the steps towards its successful completion.


Author(s):  
Wei Zhang ◽  
Jie Wu ◽  
Yaping Lin

Cloud computing has attracted a lot of interests from both the academics and the industries, since it provides efficient resource management, economical cost, and fast deployment. However, concerns on security and privacy become the main obstacle for the large scale application of cloud computing. Encryption would be an alternative way to relief the concern. However, data encryption makes efficient data utilization a challenging problem. To address this problem, secure and privacy preserving keyword search over large scale cloud data is proposed and widely developed. In this paper, we make a thorough survey on the secure and privacy preserving keyword search over large scale cloud data. We investigate existing research arts category by category, where the category is classified according to the search functionality. In each category, we first elaborate on the key idea of existing research works, then we conclude some open and interesting problems.


Symmetry ◽  
2020 ◽  
Vol 12 (10) ◽  
pp. 1687 ◽  
Author(s):  
Mahmood A. Al-shareeda ◽  
Mohammed Anbar ◽  
Selvakumar Manickam ◽  
Iznan H. Hasbullah

The security and privacy issues in vehicular ad hoc networks (VANETs) are often addressed with schemes based on either public key infrastructure, group signature, or identity. However, none of these schemes appropriately address the efficient verification of multiple VANET messages in high-density traffic areas. Attackers could obtain sensitive information kept in a tamper-proof device (TPD) by using a side-channel attack. In this paper, we propose an identity-based conditional privacy-preserving authentication scheme that supports a batch verification process for the simultaneous verification of multiple messages by each node. Furthermore, to thwart side-channel attacks, vehicle information in the TPD is periodically and frequently updated. Finally, since the proposed scheme does not utilize the bilinear pairing operation or the Map-To-Point hash function, its performance outperforms other schemes, making it viable for large-scale VANETs deployment.


2006 ◽  
pp. 215-241
Author(s):  
James B.D. Joshi ◽  
Mei-Ling Shyu ◽  
Walid Aref ◽  
Arif Ghafoor

This chapter focuses on the key challenges in the design of multimedia-based scalable techniques for threat management and security of information infrastructures. It brings together several multimedia technologies and presents a conceptual architectural framework for an open, secure distributed multimedia application that is composed of multiple domains employing different security and privacy policies and various data analysis and mining tools for extracting sensitive information. The challenge is to integrate such disparate components to enable large-scale multimedia applications and provide a mechanism for threat management. The proposed framework provides a holistic solution for large-scale distributed multi-domain multimedia application environments.


Author(s):  
Ignacio Blanquer ◽  
Vicente Hernandez

Epidemiology constitutes one relevant use case for the adoption of grids for health. It combines challenges that have been traditionally addressed by grid technologies, such as managing large amounts of distributed and heterogeneous data, large scale computing and the need for integration and collaboration tools, but introduces new challenges traditionally addressed from the e-health area. The application of grid technologies to epidemiology has been concentrated in the federation of distributed repositories of data, the evaluation of computationally intensive statistical epidemiological models and the management of authorisation mechanism in virtual organisations. However, epidemiology presents important additional constraints that are not solved and harness the take-off of grid technologies. The most important problems are on the semantic integration of data, the effective management of security and privacy, the lack of exploitation models for the use of infrastructures, the instability of Quality of Service and the seamless integration of the technology on the epidemiology environment. This chapter presents an analysis of how these issues are being considered in state-of-the-art research.


2017 ◽  
Vol 2017 ◽  
pp. 1-12 ◽  
Author(s):  
Fang Lyu ◽  
Yaping Lin ◽  
Junfeng Yang

The huge benefit of mobile application industry has attracted a large number of developers and attendant attackers. Application repackaging provides help for the distribution of most Android malware. It is a serious threat to the entire Android ecosystem, as it not only compromises the security and privacy of the app users but also plunders app developers’ income. Although massive approaches have been proposed to address this issue, plagiarists try to fight back through packing their malicious code with the help of commercial packers. Previous works either do not consider the packing issue or rely on time-consuming computations, which are not scalable for large-scale real-world scenario. In this paper, we propose FUIDroid, a novel two-phase app clones detection system that can detect the packed cloned app. FUIDroid includes a function-based fast selection phase to quickly select suspicious apps by analyzing apps’ description and a further UI-based accurate detection phase to refine the detection result. We evaluate our system on two sets of apps. The result from experiment on 320 packed samples demonstrates that FUIDroid is resilient to packed apps. The evaluation on more than 150,000 real-world apps shows the efficiency of FUIDroid in large-scale scenario.


2021 ◽  
Vol 11 (22) ◽  
pp. 10793
Author(s):  
Azin Moradbeikie ◽  
Ahmad Keshavarz ◽  
Habib Rostami ◽  
Sara Paiva ◽  
Sérgio Ivan Lopes

Large-scale deployments of the Internet of Things (IoT) are adopted for performance improvement and cost reduction in several application domains. The four main IoT application domains covered throughout this article are smart cities, smart transportation, smart healthcare, and smart manufacturing. To increase IoT applicability, data generated by the IoT devices need to be time-stamped and spatially contextualized. LPWANs have become an attractive solution for outdoor localization and received significant attention from the research community due to low-power, low-cost, and long-range communication. In addition, its signals can be used for communication and localization simultaneously. There are different proposed localization methods to obtain the IoT relative location. Each category of these proposed methods has pros and cons that make them useful for specific IoT systems. Nevertheless, there are some limitations in proposed localization methods that need to be eliminated to meet the IoT ecosystem needs completely. This has motivated this work and provided the following contributions: (1) definition of the main requirements and limitations of outdoor localization techniques for the IoT ecosystem, (2) description of the most relevant GNSS-free outdoor localization methods with a focus on LPWAN technologies, (3) survey the most relevant methods used within the IoT ecosystem for improving GNSS-free localization accuracy, and (4) discussion covering the open challenges and future directions within the field. Some of the important open issues that have different requirements in different IoT systems include energy consumption, security and privacy, accuracy, and scalability. This paper provides an overview of research works that have been published between 2018 to July 2021 and made available through the Google Scholar database.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Alakananda Chakraborty ◽  
Muskan Jindal ◽  
Mohammad R. Khosravi ◽  
Prabhishek Singh ◽  
Achyut Shankar ◽  
...  

With the growing emergence of the Internet connectivity in this era of Gen Z, several IoT solutions have come into existence for exchanging large scale of data securely, backed up by their own unique cloud service providers (CSPs). It has, therefore, generated the need for customers to decide the IoT cloud platform to suit their vivid and volatile demands in terms of attributes like security and privacy of data, performance efficiency, cost optimization, and other individualistic properties as per unique user. In spite of the existence of many software solutions for this decision-making problem, they have been proved to be inadequate considering the distinct attributes unique to individual user. This paper proposes a framework to represent the selection of IoT cloud platform as a MCDM problem, thereby providing a solution of optimal efficacy with a particular focus in user-specific priorities to create a unique solution for volatile user demands and agile market trends and needs using optimized distance-based approach (DBA) aided by Fuzzy Set Theory.


2021 ◽  
Vol 1 (3) ◽  
pp. 70-88
Author(s):  
Muhammad Waseem ◽  
Khawaja Arslan Ahmed ◽  
Muhammad Talha Azeem

Blockchain technology is widely studied in these days and has vital role in the ITS and Vehicular network. Intelligent Transport System (ITS) have resolved several issues of transportation like congestion, electronic toll collection, traffic light cameras, traffic updates, and environment forecasting. The vehicular network is the ever-increasing network it is not only facilitates us but also brings new challenges with it. The mobile nature of vehicular networks it is very important to collect and broadcast information of traffic events in real-time. A little delay to broadcast important information or deciding on this information can cause a serious situation in the mobile vehicular network. Moreover, malicious vehicles in the network broadcasting false information about these traffic events cause a disturbance in the network. In large-scale scenarios, the transmission of malicious messages offers a lot of danger to the system. They can wrongly claim the roads and provide false information about the incident. These traffic events can be life-threatening and cause unwanted situations like accidents, wastage of time and other resources. Therefore, it is very much important to provide real-time information on recent traffic events and real-time authentication of vehicles that broadcast information in the network. Traditional studies are unable to solve these security issues and contain a single point of failure issue. These studies are centralized and dependent on a single higher authority. Moreover, they have serious security concerns that are harmful for vehicular network. Moreover, any vehicles are unwilling to share their private information while broadcasting information about traffic events because they are strangers to each other. And if a vehicle does not want to share its private information like name, id, etc. It is not possible to authenticate this vehicle and manage trust in the network. It means that it is very crucial to prevent vehicles to broadcast wrong information in the network while preserving their privacy at the same time. Therefore, there is a need to authenticate vehicles and manage trust in the network while preserving their privacy simultaneously. Blockchain can offer better solution to solve these issues due to its secure distributed environment and features that ensure immutability about actions. The purpose of this report is to provide real-time security and privacy in the network. It is also ensured that vehicles get real-time authenticated information about traffic incidents from legitimate vehicles while simultaneously preserving their privacy. It means that only authenticated and legitimate entities (vehicles) can participate in vehicular network and privacy of both sender and receiver is secured in the network. Details of conducted experiments are given, and shreds of evidence are provided to evaluate the performance of architectures for authentication and trust management. The shreds of evidence show that these blockchain-based systems can solve security and trust issues more effectively.


Sign in / Sign up

Export Citation Format

Share Document