Ensuring Privacy in Opportunistic Network
نویسندگان
چکیده
منابع مشابه
Opportunistic privacy preserving monitoring∗
In this paper we present an approach to support privacy in opportunistic sensing. In particular, we use compact and privacy preserving representations of data (or sketches), that allow us to compute relevant statistics over data without disclosing users’ sensitive information (e.g. locations). We exemplify our approach by referring to the important application of noise pollution monitoring. We ...
متن کاملPractical privacy-aware opportunistic networking
Opportunistic networks have been the study of much research — in particular on making end-to-end routing efficient. Users’ privacy concerns, however, have not been the subject of much research. What privacy concerns might opportunistic network users have? Is it possible to build opportunistic networks that can mitigate users’ privacy concerns while maintaining routing performance? Our work-to-d...
متن کاملRobust Human Face Hiding Ensuring Privacy
Nowadays, video surveillance of people must ensure privacy. In this paper, we propose a seamless solution to that problem by masking faces in video sequences, which keeps people anonymous. The system consists of two modules. First, an analysis module identifies and follows regions of interest (ROI's) where faces are detected. Second, the JPEG 2000 encoding module compresses the frames keeping t...
متن کاملEnsuring Privacy of Biometric Factors in Multi-Factor Authentication Systems
One of the inherent properties of biometrics is the ability to use unique features for identification and verification of users. The usable biometric features in humans are limited in number and they must be kept secret; if a biometric factor is compromised it presents a challenge that may defy solution. In this paper we present a novel method to preserve privacy of users’ biometrics. Using an ...
متن کاملAnonySense: Opportunistic and Privacy-Preserving Context Collection
Opportunistic sensing allows applications to “task” mobile devices to measure context in a target region. For example, one could leverage sensorequipped vehicles to measure traffic or pollution levels on a particular street, or users’ mobile phones to locate (Bluetooth-enabled) objects in their neighborhood. In most proposed applications, context reports include the time and location of the eve...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2013
ISSN: 0975-8887
DOI: 10.5120/13234-0666