Security and Privacy Issues

نویسندگان

  • Yan Li
  • Young-Sik Jeong
  • Byeong-Seok Shin
  • Jong Hyuk Park
چکیده

C rowdsensing—the crowdsourcing of sensor data—allows for real-time data gathering with greater reach and accessibility than traditional crowdsourcing, because it leverages personal mobile devices as its sensor nodes (see Figure 1). This makes large-scale participatory sensing viable with little or no infrastructure cost, and because mobile device users can freely move around, coverage of sensor nodes is easily scalable. Some crowdsensing applications also exploit the spatial properties of a problem space. In these spatial crowdsensing applications, a requester can ask for resources—which always include multimedia data—related to a specific location, and mobile users who accept the task travel to that location to obtain the multimedia data. With the ubiquity of smartphones equipped with various sensors and powerful networking capacities, such spatial multimedia crowdsensing has become increasingly prominent, but understanding the related safety and privacy concerns is extremely important when promoting participation and ensuring safe use of the data collected. Multimedia crowdsensing activities often take place on participants’ personal devices, so sensitive information can be inadvertently revealed (such as home and work locations and the routes used when commuting). Furthermore, the crowdsourcers—that is, the companies or institutions initiating the crowdsensing—cannot entirely trust data provided by the volunteers, because personal devices can be exposed to unsafe third-party access points (such as Wi-Fi) or contaminated with malicious code (viruses and malware), which could pose challenges to the veracity of the transmitted information.1,2 Here, we identify security and privacy issues in multimedia crowdsensing and look into existing works that aim to overcome these issues.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Privacy and Security of Big Data in THE Cloud

Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...

متن کامل

Privacy and Security of Big Data in THE Cloud

Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...

متن کامل

Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags

The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...

متن کامل

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

تأثیر حریم خصوصی، امنیت و اعتماد ادراک شده بر رفتار به اشتراک‌گذاری اطلاعات در شبکه‌های اجتماعی موبایل: نقش تعدیل‌کننده متغیر جنسیت

The appearance of social networks has been one of the most important events in recent decades. One of the issues raised in these networks, is how to trust. The purpose of this paper is to examine the impact of security, trust and privacy about information sharing on mobile social networks. The study also describes how users' gender moderates the privacy and security impact on trust. The current...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017