scholarly journals Towards Region Queries with Strong Location Privacy in Mobile Network

2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Songtao Yang ◽  
Qingfeng Jiang

With the interaction of geographic data and social data, the inference attack has been mounting up, calling for new technologies for privacy protection. Although there are many tangible contributions of spatial-temporal cloaking technologies, traditional technologies are not enough to resist privacy intrusion. Malicious attackers still steal user-sensitive information by analyzing the relationship between location and query semantics. Reacting to many interesting issues, oblivious transfer (OT) protocols are introduced to guarantee location privacy. To our knowledge, OT is a cryptographic primitive between two parties and can be used as a building block for any arbitrary multiparty computation protocol. Armed with previous privacy-preserving technologies, for example, OT, in this work, we first develop a novel region queries framework that can provide robust privacy for location-dependent queries. We then design an OT-assist privacy-aware protocol (or OTPA) for location-based service with rigorous security analysis. In short, the common query of the client in our solution can be divided into two parts, the region query R q and the content query C q , to achieve location k -anonymity, location m -diversity, and query r -diversity, which ensure the privacy of two parties (i.e., client and server). Lastly, we instantiate our OTPA protocol, and experiments show that the proposed OTPA protocol is reasonable and effective.

2010 ◽  
Vol 34-35 ◽  
pp. 571-575 ◽  
Author(s):  
Yan Hua Guo ◽  
Yi Min Guo ◽  
Ya Jun Guo ◽  
Cai Mei Wang

The wide application of Location-Based Service (LBS) makes location privacy and trajectory privacy receive much attention in recent years. The basic idea of current privacy preserving methods in LBS is cutting the relationship of user’s consecutive locations. This paper propose LOCMIX, a trajectory privacy protecting method which is based on neighbor node’s forwarding query in a P2P LBS system. Choose the user who have sufficient power to forward queries to LBS as the forwarding node of user u. The forwarding node must be as close to user u as possible. Then the k-Anonymity Spatial Region (k-ASR) was constructed with the forwarding node and the k-1 users whose Hilbert value is less than (or more than) the forwarding node. The experiments show that LOCMIX has good load balancing property and protect trajectory privacy effectively against the “center-of-k-ASR” attack and the correlation attack.


The main aim of location-sharing is to provide current location information to their designated users. Nowadays, Location Based Service (LBS) has become one of the popular services which are provided by social networks. As LBS activity makes use of the user's identity and current location information, an appropriate path has to be utilized to protect the location privacy. However, as per our knowledge, there is no access to protecting the location sharing with the complete privacy of the location. To consider this issue, we put forward a new cryptographic primitive functional pseudonym for location sharing that make sure privacy of the data. Also, the proposed approach notably reduces the computational overhead of users by delegating part of the computation for location sharing to a server, therefore it is endurable. The primitive can be widely used in many MOSNs to authorize LBS with enhanced privacy and sustainability. As a result, it will contribute to proliferate LBS by eliminating user's privacy concerns.


2020 ◽  
Vol 63 (12) ◽  
pp. 1886-1903
Author(s):  
Zhidan Li ◽  
Wenmin Li ◽  
Fei Gao ◽  
Ping Yu ◽  
Hua Zhang ◽  
...  

Abstract Location-based services have attracted much attention in both academia and industry. However, protecting user’s privacy while providing accurate service for users remains challenging. In most of the existing research works, a semi-trusted proxy is employed to act on behalf of a user to minimize the computation and communication costs of the user. However, user privacy, e.g. location privacy, cannot be protected against the proxy. In this paper, we design a new blind filter protocol where a user can employ a semi-trusted proxy to determine whether a point of interest is within a circular area centered at the user’s location. During the protocol, neither the proxy nor the location-based service provider can obtain the location of the user and the query results. Moreover, each type of query is controlled by an access tree and only the users whose attributes satisfy this access tree can complete the specific type of query. Security analysis and efficiency experiments validate that the proposed protocol is secure and efficient in terms of the computation and communication overhead.


EMPIRISMA ◽  
2017 ◽  
Vol 26 (1) ◽  
Author(s):  
Limas Dodi

According to Abdulaziz Sachedina, the main argument of religious pluralism in the Qur’an based on the relationship between private belief (personal) and public projection of Islam in society. By regarding to private faith, the Qur’an being noninterventionist (for example, all forms of human authority should not be disturb the inner beliefs of individuals). While the public projection of faith, the Qur’an attitude based on the principle of coexistence. There is the willingness of the dominant race provide the freedom for people of other faiths with their own rules. Rules could shape how to run their affairs and to live side by side with the Muslims. Thus, based on the principle that the people of Indonesia are Muslim majority, it should be a mirror of a societie’s recognizion, respects and execution of religious pluralism. Abdul Aziz Sachedina called for Muslims to rediscover the moral concerns of public Islam in peace. The call for peace seemed to indicate that the existence of increasingly weakened in the religious sense of the Muslims and hence need to be reaffi rmed. Sachedina also like to emphasize that the position of peace in Islam is parallel with a variety of other doctrines, such as: prayer, fasting, pilgrimage and so on. Sachedina also tried to show the argument that the common view among religious groups is only one religion and traditions of other false and worthless. “Antipluralist” argument comes amid the reality of human religious differences. Keywords: Theology, Pluralism, Abdulaziz Sachedina


2019 ◽  
Vol 26 (34) ◽  
pp. 6207-6221 ◽  
Author(s):  
Innocenzo Rainero ◽  
Alessandro Vacca ◽  
Flora Govone ◽  
Annalisa Gai ◽  
Lorenzo Pinessi ◽  
...  

Migraine is a common, chronic neurovascular disorder caused by a complex interaction between genetic and environmental risk factors. In the last two decades, molecular genetics of migraine have been intensively investigated. In a few cases, migraine is transmitted as a monogenic disorder, and the disease phenotype cosegregates with mutations in different genes like CACNA1A, ATP1A2, SCN1A, KCNK18, and NOTCH3. In the common forms of migraine, candidate genes as well as genome-wide association studies have shown that a large number of genetic variants may increase the risk of developing migraine. At present, few studies investigated the genotype-phenotype correlation in patients with migraine. The purpose of this review was to discuss recent studies investigating the relationship between different genetic variants and the clinical characteristics of migraine. Analysis of genotype-phenotype correlations in migraineurs is complicated by several confounding factors and, to date, only polymorphisms of the MTHFR gene have been shown to have an effect on migraine phenotype. Additional genomic studies and network analyses are needed to clarify the complex pathways underlying migraine and its clinical phenotypes.


Author(s):  
Philip James

The focus of this chapter is an examination of the diversity of living organisms found within urban environments, both inside and outside buildings. The discussion commences with prions and viruses before moving on to consider micro-organisms, plants, and animals. Prions and viruses cause disease in plants and animals, including humans. Micro-organisms are ubiquitous and are found in great numbers throughout urban environments. New technologies are providing new insights into their diversity. Plants may be found inside buildings as well as in gardens and other green spaces. The final sections of the chapter offer a discussion of the diversity of animals that live in urban areas for part or all of their life cycle. Examples of the diversity of life in urban environments are presented throughout, including native and non-native species, those that are benign and deadly, and the common and the rare.


This book is the first to examine the history of imaginative thinking about intelligent machines. As real artificial intelligence (AI) begins to touch on all aspects of our lives, this long narrative history shapes how the technology is developed, deployed, and regulated. It is therefore a crucial social and ethical issue. Part I of this book provides a historical overview from ancient Greece to the start of modernity. These chapters explore the revealing prehistory of key concerns of contemporary AI discourse, from the nature of mind and creativity to issues of power and rights, from the tension between fascination and ambivalence to investigations into artificial voices and technophobia. Part II focuses on the twentieth and twenty-first centuries in which a greater density of narratives emerged alongside rapid developments in AI technology. These chapters reveal not only how AI narratives have consistently been entangled with the emergence of real robotics and AI, but also how they offer a rich source of insight into how we might live with these revolutionary machines. Through their close textual engagements, these chapters explore the relationship between imaginative narratives and contemporary debates about AI’s social, ethical, and philosophical consequences, including questions of dehumanization, automation, anthropomorphization, cybernetics, cyberpunk, immortality, slavery, and governance. The contributions, from leading humanities and social science scholars, show that narratives about AI offer a crucial epistemic site for exploring contemporary debates about these powerful new technologies.


Author(s):  
Justine Pila

This chapter considers the meaning of the terms that appropriately denote the subject matter protectable by registered trade mark and allied rights, including the common law action of passing off. Drawing on the earlier analyses of the objects protectable by patent and copyright, it defines the trade mark, designation of origin, and geographical indication in their current European and UK conception as hybrid inventions/works in the form of purpose-limited expressive objects. It also considers the relationship between the different requirements for trade mark and allied rights protection, and related principles of entitlement. In its conclusion, the legal understandings of trade mark and allied rights subject matter are presented as answers to the questions identified in Chapter 3 concerning the categories and essential properties of the subject matter in question, their method of individuation, and the relationship between and method of establishing their and their tokens’ existence.


Proceedings ◽  
2019 ◽  
Vol 30 (1) ◽  
pp. 9
Author(s):  
Sebastiano Trevisani

Modern Earth Scientists need also to interact with other disciplines, apparently far from the Earth Sciences and Engineering. Disciplines related to history and philosophy of science are emblematic from this perspective. From one side, the quantitative analysis of information extracted from historical records (documents, maps, paintings, etc.) represents an exciting research topic, requiring a truly holistic approach. On the other side, epistemological and philosophy of science considerations on the relationship between geoscience and society in history are of fundamental importance for understanding past, present and future geosphere-anthroposphere interlinked dynamics.


2021 ◽  
Vol 5 (1) ◽  
pp. 43-51
Author(s):  
Jeong-A Jo

This study aims to examine the common features and differences in how the Chinese-character classifier ‘ ben 本’ is used in Chinese, Korean, and Japanese, and will explore the factors that have affected the categorization processes and patterns of the classifier ‘ ben 本.’ Consideration of the differences in the patterns of usage and categorization of the same Chinese classifier in different languages enables us to look into the perception of the world and the socio cultural differences inherent in each language, the differences in the perception of Chinese characters, and the relationship between classifiers.


Sign in / Sign up

Export Citation Format

Share Document