scispace - formally typeset
Open AccessJournal ArticleDOI

Privacy Preserving Profiling for Mobile Services

Reads0
Chats0
TLDR
This work provides protocols that allow users to store their sensor data on third party (untrusted) cloud servers in encrypted form with access only to service providers explicitly pre-approved by the users.
About
This article is published in Procedia Computer Science.The article was published on 2012-01-01 and is currently open access. It has received 9 citations till now. The article focuses on the topics: Client-side encryption & Service provider.

read more

Citations
More filters
Journal ArticleDOI

Privacy in mobile participatory sensing

TL;DR: Both sources and targets of threats to privacy are highlighted and how they are addressed in recent privacy-preserving mechanisms tailored to the characteristics of participatory sensing are analyzed.
Patent

Methods and apparatus for sharing real-time user context information

TL;DR: In this paper, one or more data providers deliver encrypted data to a storage entity and the recipient is able to use its own key to decrypt data that has been encrypted with the data provider's key and re-encrypted with the re-encryption key of the recipient.
BookDOI

Handbook of Mobile Data Privacy

TL;DR: This chapter provides an introduction to the field of mobility data privacy, discusses the emerging research directions, along with the real-world systems and applications that have been proposed.
Journal ArticleDOI

Privacy preserving and transactional advertising for mobile services

TL;DR: This work provides protocols that allow users to store their sensor data on third party (untrusted) cloud servers, stored in encrypted form, hence protected from the cloud provider, and ensures that the data and advertisements are ‘fresh and consistent’.
Book ChapterDOI

Opportunities and Risks of Delegating Sensing Tasks to the Crowd

TL;DR: An overview of existing applications is provided and both the opportunities and risks raised by the contributions of volunteers to the sensing process are detailed.
References
More filters
Book ChapterDOI

Public-key cryptosystems based on composite degree residuosity classes

TL;DR: A new trapdoor mechanism is proposed and three encryption schemes are derived : a trapdoor permutation and two homomorphic probabilistic encryption schemes computationally comparable to RSA, which are provably secure under appropriate assumptions in the standard model.
Journal ArticleDOI

A survey on Shari'ah governance practices in Malaysia, GCC countries and the UK

TL;DR: In this article, the state of Shari'ah governance practices in Malaysia, GCC countries (Kuwait, Bahrain, United Arab Emirates, Qatar and Saudi Arabia) and the UK by highlighting five main elements of good corporate governance that consist of independence, competency, transparency, disclosure and consistency.
Book

Transactional Information Systems: Theory, Algorithms, and the Practice of Concurrency Control and Recovery

TL;DR: The authors begin with a broad look at the role of transactional technology in today's economic and scientific endeavors, then delve into critical issues faced by all practitioners, presenting today's most effective techniques for controlling concurrent access by multiple clients, recovering from system failures, and coordinating distributed transactions.
Posted Content

A Survey on Shari’Ah Governance Practices in Malaysia, GCC Countries and the UK

TL;DR: In this article, a detailed survey questionnaire is generated for sourcing primary data from Islamic Financial Institutions (IFIs) in Malaysia, GCC countries (Kuwait, Bahrain, United Arab Emirates, Qatar and Saudi Arabia) and the UK by highlighting five main elements of good corporate governance that consist of independence, competency, transparency, disclosure and consistency.
Journal ArticleDOI

A survey on privacy in mobile participatory sensing applications

TL;DR: This survey identifies the sensing modalities used in current participatory sensing applications, and assess the threats to user privacy when personal information is sensed and disclosed, and identifies open issues and possible solutions to guarantee user privacy in Participatory sensing.
Related Papers (5)