Privacy Preserving Profiling for Mobile Services
Reads0
Chats0
TLDR
This work provides protocols that allow users to store their sensor data on third party (untrusted) cloud servers in encrypted form with access only to service providers explicitly pre-approved by the users.About:
This article is published in Procedia Computer Science.The article was published on 2012-01-01 and is currently open access. It has received 9 citations till now. The article focuses on the topics: Client-side encryption & Service provider.read more
Citations
More filters
Journal ArticleDOI
Privacy in mobile participatory sensing
TL;DR: Both sources and targets of threats to privacy are highlighted and how they are addressed in recent privacy-preserving mechanisms tailored to the characteristics of participatory sensing are analyzed.
Patent
Methods and apparatus for sharing real-time user context information
TL;DR: In this paper, one or more data providers deliver encrypted data to a storage entity and the recipient is able to use its own key to decrypt data that has been encrypted with the data provider's key and re-encrypted with the re-encryption key of the recipient.
BookDOI
Handbook of Mobile Data Privacy
TL;DR: This chapter provides an introduction to the field of mobility data privacy, discusses the emerging research directions, along with the real-world systems and applications that have been proposed.
Journal ArticleDOI
Privacy preserving and transactional advertising for mobile services
TL;DR: This work provides protocols that allow users to store their sensor data on third party (untrusted) cloud servers, stored in encrypted form, hence protected from the cloud provider, and ensures that the data and advertisements are ‘fresh and consistent’.
Book ChapterDOI
Opportunities and Risks of Delegating Sensing Tasks to the Crowd
Delphine Reinhardt,Frank Dürr +1 more
TL;DR: An overview of existing applications is provided and both the opportunities and risks raised by the contributions of volunteers to the sensing process are detailed.
References
More filters
Book ChapterDOI
Public-key cryptosystems based on composite degree residuosity classes
TL;DR: A new trapdoor mechanism is proposed and three encryption schemes are derived : a trapdoor permutation and two homomorphic probabilistic encryption schemes computationally comparable to RSA, which are provably secure under appropriate assumptions in the standard model.
Journal ArticleDOI
A survey on Shari'ah governance practices in Malaysia, GCC countries and the UK
TL;DR: In this article, the state of Shari'ah governance practices in Malaysia, GCC countries (Kuwait, Bahrain, United Arab Emirates, Qatar and Saudi Arabia) and the UK by highlighting five main elements of good corporate governance that consist of independence, competency, transparency, disclosure and consistency.
Book
Transactional Information Systems: Theory, Algorithms, and the Practice of Concurrency Control and Recovery
TL;DR: The authors begin with a broad look at the role of transactional technology in today's economic and scientific endeavors, then delve into critical issues faced by all practitioners, presenting today's most effective techniques for controlling concurrent access by multiple clients, recovering from system failures, and coordinating distributed transactions.
Posted Content
A Survey on Shari’Ah Governance Practices in Malaysia, GCC Countries and the UK
TL;DR: In this article, a detailed survey questionnaire is generated for sourcing primary data from Islamic Financial Institutions (IFIs) in Malaysia, GCC countries (Kuwait, Bahrain, United Arab Emirates, Qatar and Saudi Arabia) and the UK by highlighting five main elements of good corporate governance that consist of independence, competency, transparency, disclosure and consistency.
Journal ArticleDOI
A survey on privacy in mobile participatory sensing applications
TL;DR: This survey identifies the sensing modalities used in current participatory sensing applications, and assess the threats to user privacy when personal information is sensed and disclosed, and identifies open issues and possible solutions to guarantee user privacy in Participatory sensing.