scispace - formally typeset
Journal ArticleDOI

PCCA: Position Confidentiality Conserving Algorithm for Content-Protection in e-Governance Services and Applications

Darshan Vishwasrao Medhane, +1 more
- Vol. 2, Iss: 3, pp 194-203
Reads0
Chats0
TLDR
PCCA, a novel position confidentiality conserving algorithm for content protection in e-Governance is proposed by means of rule-based approach from computational intelligence and users current position information and evaluation demonstrates that PCCA can efficiently conserve roaming users position confidentiality while accomplishing better performance, guaranteed position confidentiality, and better quality of service in e.Governance.
Abstract
E-Governance or electronic governance is a procedure of public sector regulation and is a significant step in the transformation of municipal administration, with the intention of confiding and smoothing collaboration among the population and civic establishments through Information and Communications Technology-based applications. Content Confidentiality has become a serious anxiety for modern Information Societies. The sensitive nature of much of the private personal data that are exchanged or released to untrusted parties necessitates that liable administrations should embark on suitable content confidentiality protection mechanisms. Nowadays, many of these data are texts (e.g., emails, messages posted in social media, healthcare outcomes, etc.) that, because of their unstructured and semantic nature, constitutes a challenge for automatic data protection methods. In this paper, we present a solution for position confidentiality conserving content protection in e-Governance services through computational intelligence. We propose PCCA, a novel position confidentiality conserving algorithm for content protection in e-Governance. The proposed algorithm applies computational intelligence in e-Governance for content protection by means of rule-based approach from computational intelligence and users current position information. A simulation model has been implemented on a desktop PC and evaluation using roaming users real-time position-based information demonstrates that PCCA can efficiently conserve roaming users position confidentiality while accomplishing better performance, guaranteed position confidentiality, and better quality of service in e-Governance.

read more

Citations
More filters
Journal ArticleDOI

Enforcing Position-Based Confidentiality With Machine Learning Paradigm Through Mobile Edge Computing in Real-Time Industrial Informatics

TL;DR: A method for conserving position confidentiality of roaming PBSs users using machine learning techniques is proposed and it is confirmed that the proposed method achieved above 90% of the position confidentiality in PBSs.
Journal ArticleDOI

Blockchain-Enabled Distributed Security Framework for Next-Generation IoT: An Edge Cloud and Software-Defined Network-Integrated Approach

TL;DR: The results obtained show that the proposed security framework can efficiently and effectively meet the data confidentiality challenges introduced by the integration of blockchain, edge cloud, and SDN paradigm.
Journal ArticleDOI

Energy-Aware Green Adversary Model for Cyberphysical Security in Industrial System

TL;DR: An energy-aware green adversary model that runs on real-time anticipatory position-based query scheduling in order to minimize the communication and computation cost for each query, thus, facilitating energy consumption minimization.
Journal ArticleDOI

A trajectory privacy-preserving scheme based on a dual-K mechanism for continuous location-based services

TL;DR: Security analyses demonstrates that the proposed dual-K mechanism can effectively enhance user trajectory privacy protection, and the simulation results prove that the DKM scheme can preserveuser trajectory privacy with low overhead on a single anonymizer.
Journal ArticleDOI

A Parallel Military-Dog-Based Algorithm for Clustering Big Data in Cognitive Industrial Internet of Things

TL;DR: A new metaheuristic-based clustering method to solve the big data problems by leveraging the strength of MapReduce and the searching potential of military dog squad to find the optimal centroids andMapReduce architecture to handle the big datasets.
References
More filters
Journal ArticleDOI

TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones

TL;DR: TaintDroid as mentioned in this paper is an efficient, system-wide dynamic taint tracking and analysis system capable of simultaneously tracking multiple sources of sensitive data by leveraging Android's virtualized execution environment.
Journal ArticleDOI

Unique in the Crowd: The privacy bounds of human mobility

TL;DR: It is found that in a dataset where the location of an individual is specified hourly, and with a spatial resolution equal to that given by the carrier's antennas, four spatio-temporal points are enough to uniquely identify 95% of the individuals.
Journal ArticleDOI

Is there a need for fuzzy logic

TL;DR: In this paper, fuzzy logic is viewed in a nonstandard perspective and the cornerstones of fuzzy logic-and its principal distinguishing features-are: graduation, granulation, precisiation and the concept of a generalized constraint.
Patent

Location-Based Advertising Message Serving For Mobile Communication Devices

TL;DR: In this paper, the authors describe an advertising platform manager that allows advertisers to create and transmit relevant ad messages to a user based on specific location, time, and profile data of the user.
Journal ArticleDOI

Towards secure mobile cloud computing: A survey

TL;DR: This literature review highlights the current state of the art work proposed to secure mobile cloud computing infrastructures, identifies the potential problems, and provides a taxonomy of the state-of-the- art.
Related Papers (5)