scholarly journals Privacy-Preserving Vehicle Assignment in the Parking Space Sharing System

2020 ◽  
Vol 2020 ◽  
pp. 1-13
Author(s):  
Tingting Fu ◽  
Peng Liu ◽  
Kun Liu ◽  
Peng Li

Nowadays, the availability of parking spaces is far behind the quick rising number of cars. Rather than building more lots, a better way is to share private-owned parking spaces. However, this faces the challenge that users are not willing to expose their privacy to the public. To solve this problem, we propose a new architecture for parking space sharing, integrating homomorphic cryptography into the design of a secure protocol for parking space searching and booking. The proposed privacy-preserving matching scheme (PPMS) is constructed in an untrusted third-party service system including two independent entities, namely, a server and an intermediary platform. Via the participant comparison protocol (PCP), a driver can choose from the matching result and be navigated to the parking space near his destination, without knowing any information of the provider and vice versa. In the meanwhile, in order to further improve the efficiency of matching, we also propose a block algorithm based on the longitude and latitude (BABLL), which utilizes a novel partitioning scheme. The feasibility of the architecture is validated through the detailed theoretical analysis and extensive performance evaluations, including the assessment of the resilience to attacks.

2018 ◽  
Vol 4 (1) ◽  
Author(s):  
Putri Maulina

In this contemporary era, the forms of public service in Indonesia have become increasingly practical and instant. Conditions like this to illustrate how the phenomenon of McDonaldization began to plague into public service systems, one of which is with the public service system e-Filing DJP Online. E-Filing DJP Online is an application of public services based on information and communication technology implemented by the state tax execution agency to provide easy access to services for the Taxpayers in Indonesia. The purpose of this study is to see how the principles of McDonaldization are applied in the public service system of tax agencies through the DGT Online e-Filing system. The theory approach used is McDonaldization Theory by George Ritzer, and the concept of Public Service. The method used is qualitative descriptive, with literature review approach. The results show that the DGT Online e-Filing system applies the principles of McDonaldization in the form of its services, namely: efficiency, quantified and qualified services, predictability, control, and ultimately the rationale for irrationality of service.Keywords: McDonaldization, Public Service, Tax, e-Filing


Author(s):  
Pierre Pestieau ◽  
Mathieu Lefebvre

This chapter reviews the public health care systems as well as their challenges. It first shows how expenditure on health care has evolved in previous decades and deals with the reasons for the growth observed in almost every European country. It emphasizes the role of technological progress as a main explanatory factor of the increase in medical expenditure but also points to the challenges facing cost-containment policies. Especially, the main common features of health care systems in Europe, such as third-party payment, single provider approach and cost-based reimbursement are discussed. Finally the chapter shows that although inequalities in health exist in the population, health care systems are redistributive. Reforms are thus needed but the trade-off between budgetary efficiency and equity is difficult.


Sensors ◽  
2021 ◽  
Vol 21 (16) ◽  
pp. 5307
Author(s):  
Ricardo Borges dos Santos ◽  
Nunzio Marco Torrisi ◽  
Rodrigo Palucci Pantoni

Every consumer’s buying decision at the supermarket influences food brands to make first party claims of sustainability and socially responsible farming methods on their agro-product labels. Fine wines are often subject to counterfeit along the supply chain to the consumer. This paper presents a method for efficient unrestricted publicity to third party certification (TPC) of plant agricultural products, starting at harvest, using smart contracts and blockchain tokens. The method is capable of providing economic incentives to the actors along the supply chain. A proof-of-concept using a modified Ethereum IGR token set of smart contracts using the ERC-1155 standard NFTs was deployed on the Rinkeby test net and evaluated. The main findings include (a) allowing immediate access to TPC by the public for any desired authority by using token smart contracts. (b) Food safety can be enhanced through TPC visible to consumers through mobile application and blockchain technology, thus reducing counterfeiting and green washing. (c) The framework is structured and maintained because participants obtain economical incentives thus leveraging it´s practical usage. In summary, this implementation of TPC broadcasting through tokens can improve transparency and sustainable conscientious consumer behaviour, thus enabling a more trustworthy supply chain transparency.


Author(s):  
Sven Stollfuß

This article investigates how platformisation changes the practices of content production and distribution through the case of the web series, Druck (tr. Pressure (2018–), for the public service content network ‘funk’ (ARD and ZDF). An analysis of the German adaptation of the Norwegian television and web series Skam (tr. Shame) (NRK3, 2015–2017) shows how public service broadcasting (PSB) in Germany is changing due to the influence of social media. To reach a younger audience, PSB has to meet them on third-party platforms. Consequently, PSB must provide content that fits the mobile media environment of social media.


2013 ◽  
Vol 2013 ◽  
pp. 1-5 ◽  
Author(s):  
Yi Sun ◽  
Qiaoyan Wen ◽  
Yudong Zhang ◽  
Hua Zhang ◽  
Zhengping Jin

As a powerful tool in solving privacy preserving cooperative problems, secure multiparty computation is more and more popular in electronic bidding, anonymous voting, and online auction. Privacy preserving sequencing problem which is an essential link is regarded as the core issue in these applications. However, due to the difficulties of solving multiparty privacy preserving sequencing problem, related secure protocol is extremely rare. In order to break this deadlock, this paper first presents an efficient secure multiparty computation protocol for the general privacy-preserving sequencing problem based on symmetric homomorphic encryption. The result is of value not only in theory, but also in practice.


2021 ◽  
pp. 1-12
Author(s):  
Gokay Saldamli ◽  
Richard Chow ◽  
Hongxia Jin

Social networking services are increasingly accessed through mobile devices. This trend has prompted services such as Facebook and Google+to incorporate location as a de facto feature of user interaction. At the same time, services based on location such as Foursquare and Shopkick are also growing as smartphone market penetration increases. In fact, this growth is happening despite concerns (growing at a similar pace) about security and third-party use of private location information (e.g., for advertising). Nevertheless, service providers have been unwilling to build truly private systems in which they do not have access to location information. In this paper, we describe an architecture and a trial implementation of a privacy-preserving location sharing system called ILSSPP. The system protects location information from the service provider and yet enables fine grained location-sharing. One main feature of the system is to protect an individual’s social network structure. The pattern of location sharing preferences towards contacts can reveal this structure without any knowledge of the locations themselves. ILSSPP protects locations sharing preferences through protocol unification and masking. ILSSPP has been implemented as a standalone solution, but the technology can also be integrated into location-based services to enhance privacy.


Author(s):  
Jitendra Singh ◽  
Vikas Kumar

Regulatory compliance is equally binding on small and medium business groups. Owing to the small scale and limited budget, such SMBs are unable to seek expert advice. To adequately guard the SMBs in regulatory compliance, the present work proposed a third-party managed-end user-driven approach that renders the list of regulatory acts applicable in one's case according to the country of one's residence, services subscribed, and type of the operations to be carried out in subscribed cloud paradigm. The list of applicable regulatory acts are rendered at the subscriber's end only. In addition, the proposed method notifies the present state of compliance of under-considered cloud providers. Based on the recommendation received, the subscriber can proceed with his decision to subscribe or not to subscribe in the event if desired compliances do not exist. This technological assistance will eliminate the need to possess the required knowledge in regulatory acts or seeking advice from the regulatory expert.


2021 ◽  
pp. 096100062110373
Author(s):  
Ryo Shiozaki

Social media content includes an unprecedented number of personal documents reflecting our time. Few countries or regions have established legal grounds for securing long-term access to these documents, while paper-based publications have been exhaustively accumulated under legal deposit systems. However, archiving social media through national libraries, as a sort of state intervention, could bring about chilling effects on free speech in unexpected ways. The article aims to present empirical data of public concerns concerning social media content, focusing on Twitter’s public tweets archived by third parties, through two questionnaire surveys involving university students (Research I) and the public (Research II). The surveys were designed based on three settings: researchers, organisations to which the respondents belong and the National Diet Library in Japan. Consequently, approximately 30% and 47% of the respondents in Research I ( n = 197) and II ( n = 728), respectively, disagreed with any hypothetical scenario. An ordered logistic analysis to reveal the inter-relations of variables suggests the existence of other factors; thus, neither variables related to Twitter/Internet use nor demographic variables influenced people’s perceptions of the archival issue. While protecting privacy rights and copyrights was the primary reason for disagreements regarding third-party archival of tweets, many respondents intuitively displayed a negative reaction without any specific reason. Those who question its value and feel uncomfortable with an authoritative intervention were also identified. To nurture acceptant attitudes, advocating the archival of personal documents and adopting more restrictive archival procedures like taking down posts and anonymisation, public debates on the intervention of public bodies and demonstration of archival values should be considered.


2000 ◽  
Vol 14 (1) ◽  
pp. 9-26 ◽  
Author(s):  
Anthony C. Brooms

Customers arrive sequentially to a service system where the arrival times form a Poisson process of rate λ. The system offers a choice between a private channel and a public set of channels. The transmission rate at each of the public channels is faster than that of the private one; however, if all of the public channels are occupied, then a customer who commits itself to using one of them attempts to connect after exponential periods of time with mean μ−1. Once connection to a public channel has been made, service is completed after an exponential period of time, with mean ν−1. Each customer chooses one of the two service options, basing its decision on the number of busy channels and reapplying customers, with the aim of minimizing its own expected sojourn time. The best action for an individual customer depends on the actions taken by subsequent arriving customers. We establish the existence of a unique symmetric Nash equilibrium policy and show that its structure is characterized by a set of threshold-type strategies; we discuss the relevance of this concept in the context of a dynamic learning scenario.


Sign in / Sign up

Export Citation Format

Share Document