Journal ArticleDOI
PCCA: Position Confidentiality Conserving Algorithm for Content-Protection in e-Governance Services and Applications
Darshan Vishwasrao Medhane,Arun Kumar Sangaiah +1 more
- Vol. 2, Iss: 3, pp 194-203
Reads0
Chats0
TLDR
PCCA, a novel position confidentiality conserving algorithm for content protection in e-Governance is proposed by means of rule-based approach from computational intelligence and users current position information and evaluation demonstrates that PCCA can efficiently conserve roaming users position confidentiality while accomplishing better performance, guaranteed position confidentiality, and better quality of service in e.Governance.Abstract:
E-Governance or electronic governance is a procedure of public sector regulation and is a significant step in the transformation of municipal administration, with the intention of confiding and smoothing collaboration among the population and civic establishments through Information and Communications Technology-based applications. Content Confidentiality has become a serious anxiety for modern Information Societies. The sensitive nature of much of the private personal data that are exchanged or released to untrusted parties necessitates that liable administrations should embark on suitable content confidentiality protection mechanisms. Nowadays, many of these data are texts (e.g., emails, messages posted in social media, healthcare outcomes, etc.) that, because of their unstructured and semantic nature, constitutes a challenge for automatic data protection methods. In this paper, we present a solution for position confidentiality conserving content protection in e-Governance services through computational intelligence. We propose PCCA, a novel position confidentiality conserving algorithm for content protection in e-Governance. The proposed algorithm applies computational intelligence in e-Governance for content protection by means of rule-based approach from computational intelligence and users current position information. A simulation model has been implemented on a desktop PC and evaluation using roaming users real-time position-based information demonstrates that PCCA can efficiently conserve roaming users position confidentiality while accomplishing better performance, guaranteed position confidentiality, and better quality of service in e-Governance.read more
Citations
More filters
Journal ArticleDOI
Enforcing Position-Based Confidentiality With Machine Learning Paradigm Through Mobile Edge Computing in Real-Time Industrial Informatics
TL;DR: A method for conserving position confidentiality of roaming PBSs users using machine learning techniques is proposed and it is confirmed that the proposed method achieved above 90% of the position confidentiality in PBSs.
Journal ArticleDOI
Blockchain-Enabled Distributed Security Framework for Next-Generation IoT: An Edge Cloud and Software-Defined Network-Integrated Approach
TL;DR: The results obtained show that the proposed security framework can efficiently and effectively meet the data confidentiality challenges introduced by the integration of blockchain, edge cloud, and SDN paradigm.
Journal ArticleDOI
Energy-Aware Green Adversary Model for Cyberphysical Security in Industrial System
Arun Kumar Sangaiah,Darshan Vishwasrao Medhane,Gui-Bin Bian,Ahmed Ghoneim,Mubarak Alrashoud,M. Shamim Hossain +5 more
TL;DR: An energy-aware green adversary model that runs on real-time anticipatory position-based query scheduling in order to minimize the communication and computation cost for each query, thus, facilitating energy consumption minimization.
Journal ArticleDOI
A trajectory privacy-preserving scheme based on a dual-K mechanism for continuous location-based services
TL;DR: Security analyses demonstrates that the proposed dual-K mechanism can effectively enhance user trajectory privacy protection, and the simulation results prove that the DKM scheme can preserveuser trajectory privacy with low overhead on a single anonymizer.
Journal ArticleDOI
A Parallel Military-Dog-Based Algorithm for Clustering Big Data in Cognitive Industrial Internet of Things
TL;DR: A new metaheuristic-based clustering method to solve the big data problems by leveraging the strength of MapReduce and the searching potential of military dog squad to find the optimal centroids andMapReduce architecture to handle the big datasets.
References
More filters
Journal ArticleDOI
TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones
William Enck,Peter Gilbert,Seungyeop Han,Vasant Tendulkar,Byung-Gon Chun,Landon P. Cox,Jaeyeon Jung,Patrick McDaniel,Anmol Sheth +8 more
TL;DR: TaintDroid as mentioned in this paper is an efficient, system-wide dynamic taint tracking and analysis system capable of simultaneously tracking multiple sources of sensitive data by leveraging Android's virtualized execution environment.
Journal ArticleDOI
Unique in the Crowd: The privacy bounds of human mobility
Yves-Alexandre de Montjoye,Yves-Alexandre de Montjoye,César A. Hidalgo,César A. Hidalgo,César A. Hidalgo,Michel Verleysen,Vincent D. Blondel,Vincent D. Blondel +7 more
TL;DR: It is found that in a dataset where the location of an individual is specified hourly, and with a spatial resolution equal to that given by the carrier's antennas, four spatio-temporal points are enough to uniquely identify 95% of the individuals.
Journal ArticleDOI
Is there a need for fuzzy logic
TL;DR: In this paper, fuzzy logic is viewed in a nonstandard perspective and the cornerstones of fuzzy logic-and its principal distinguishing features-are: graduation, granulation, precisiation and the concept of a generalized constraint.
Patent
Location-Based Advertising Message Serving For Mobile Communication Devices
TL;DR: In this paper, the authors describe an advertising platform manager that allows advertisers to create and transmit relevant ad messages to a user based on specific location, time, and profile data of the user.
Journal ArticleDOI
Towards secure mobile cloud computing: A survey
TL;DR: This literature review highlights the current state of the art work proposed to secure mobile cloud computing infrastructures, identifies the potential problems, and provides a taxonomy of the state-of-the- art.