ANONYMOUS SERVICES - Enhancing End-user Privacy Exploiting Anonymous Networks

2007 ◽  
Vol 1 (1) ◽  
pp. 1-137 ◽  
Author(s):  
Giovanni Iachello ◽  
Jason Hong

2016 ◽  
Vol 78 (6-3) ◽  
Author(s):  
Samsul Huda ◽  
Nurul Fahmi ◽  
Amang Sudarsono ◽  
M. Udin Harun Al Rasyid

In Internet of Things (IoT) era, The limitation storage on Wireless Sensor Network (WSN) can be solved by synchronized data sensors from the gateway node to the data center server. Data in the data center can be remotely accessed by the user at any time and anywhere from end user devices such as PCs, laptop PCs, and smart phones., and data should be accessed securely. The Only legitimated user can access the data sensor from an environmental health data center. CP-ABE (Ciphertext-Policy Attribute-Based Encryption) is becoming a robust cryptographic scheme solution to this issue. To enable a secure data sensor sharing and access on an environmental health data center, we propose a secure system model using CP-ABE which ensures confidentiality, integrity, and user privacy features. Experimental results prove that the implementation of CP-ABE does not overload the system.


2021 ◽  
Vol 19 (5) ◽  
pp. 66-70
Author(s):  
Sauvik Das ◽  
W. Keith Edwards ◽  
DeBrae Kennedy-Mayo ◽  
Peter Swire ◽  
Yuxi Wu

2011 ◽  
Vol 16 (2) ◽  
pp. 5-20 ◽  
Author(s):  
Junqing Xie ◽  
Shuai Wang

Author(s):  
Inah Omoronyia ◽  
Ubong Etuk ◽  
Peter Inglis

There have been concerting policy and legal initiatives to mitigate the privacy harm resulting from badly designed software technology. But one main challenge to realizing these initiatives is the difficulty in translating proposed principles and regulations into concrete and verifiable evidence in technology. This is partly due to the lack of systematic techniques and tools to address privacy in the software design, hence making it difficult for the designer to measure disclosure risk in a more intuitive way, taking into account the privacy objective that matters to each end user. To bridge this gap, we propose a framework for verifying the satisfaction of user privacy objectives in software design. Our approach is based on the (un)awareness that users acquire when information is disclosed, as it relates to the communication properties of objects in a design. This property is used to determine the expected privacy utility that users will derive from the design for a specified privacy objective. We demonstrate through case studies how this approach can help designers determine which design decision undermines users’ privacy expectations and better design alternatives.


Author(s):  
Alpendra Kumar Diwakar ◽  
Nikhil Kumar Singh ◽  
Deepak Singh Tomar

Author(s):  
Nitin Kulkarni ◽  
Sanjay Tanwani ◽  
N.S. Chaudhari

Sign in / Sign up

Export Citation Format

Share Document