2018 IEEE Symposium on Privacy-Aware Computing (PAC)最新文献

筛选
英文 中文
A Cloud-Based Secure and Privacy-Preserving Clustering Analysis of Infectious Disease 基于云的传染病安全和隐私保护聚类分析
2018 IEEE Symposium on Privacy-Aware Computing (PAC) Pub Date : 2018-09-01 DOI: 10.1109/PAC.2018.00017
Jianqing Liu, Yaodan Hu, Hao Yue, Yanmin Gong, Yuguang Fang
{"title":"A Cloud-Based Secure and Privacy-Preserving Clustering Analysis of Infectious Disease","authors":"Jianqing Liu, Yaodan Hu, Hao Yue, Yanmin Gong, Yuguang Fang","doi":"10.1109/PAC.2018.00017","DOIUrl":"https://doi.org/10.1109/PAC.2018.00017","url":null,"abstract":"The early detection of where and when fatal infectious diseases outbreak is of critical importance to the public health. To effectively detect, analyze and then intervene the spread of diseases, people's health status along with their location information should be timely collected. However, the conventional practices are via surveys or field health workers, which are highly costly and pose serious privacy threats to participants. In this paper, we for the first time propose to exploit the ubiquitous cloud services to collect users' multi-dimensional data in a secure and privacy-preserving manner and to enable the analysis of infectious disease. Specifically, we target at the spatial clustering analysis using Kulldorf scan statistic and propose a key-oblivious inner product encryption (KOIPE) mechanism to ensure that the untrusted entity only obtains the statistic instead of individual's data. Furthermore, we design an anonymous and sybil-resilient approach to protect the data collection process from double registration attacks and meanwhile preserve participant's privacy against untrusted cloud servers. A rigorous and comprehensive security analysis is given to validate our design, and we also conduct extensive simulations based on real-life datasets to demonstrate the performance of our scheme in terms of communication and computing overhead.","PeriodicalId":208309,"journal":{"name":"2018 IEEE Symposium on Privacy-Aware Computing (PAC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129825820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
[Publisher's information] (发布者的信息)
2018 IEEE Symposium on Privacy-Aware Computing (PAC) Pub Date : 2018-09-01 DOI: 10.1109/pac.2018.00024
{"title":"[Publisher's information]","authors":"","doi":"10.1109/pac.2018.00024","DOIUrl":"https://doi.org/10.1109/pac.2018.00024","url":null,"abstract":"","PeriodicalId":208309,"journal":{"name":"2018 IEEE Symposium on Privacy-Aware Computing (PAC)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130126652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deriving Privacy Settings for Location Sharing: Are Context Factors Always the Best Choice? 导出位置共享的隐私设置:上下文因素总是最好的选择吗?
2018 IEEE Symposium on Privacy-Aware Computing (PAC) Pub Date : 2018-09-01 DOI: 10.1109/PAC.2018.00015
Frederic Raber, A. Krüger
{"title":"Deriving Privacy Settings for Location Sharing: Are Context Factors Always the Best Choice?","authors":"Frederic Raber, A. Krüger","doi":"10.1109/PAC.2018.00015","DOIUrl":"https://doi.org/10.1109/PAC.2018.00015","url":null,"abstract":"Research has observed context factors like occasion and time as influential factors for predicting whether or not to share a location with online friends. In other domains like social networks, personality was also found to play an important role. Furthermore, users are seeking a fine-grained disclosement policy that also allows them to display an obfuscated location, like the center of the current city, to some of their friends. In this paper, we observe which context factors and personality measures can be used to predict the correct privacy level out of seven privacy levels, which include obfuscation levels like center of the street or current city. Our results show that a prediction is possible with a precision 20% better than a constant value. We will give design indications to determine which context factors should be recorded, and how much the precision can be increased if personality and privacy measures are recorded using either a questionnaire or automated text analysis.","PeriodicalId":208309,"journal":{"name":"2018 IEEE Symposium on Privacy-Aware Computing (PAC)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133021146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Privacy Preserving Scheme for Location Based Services Using Cryptographic Approach 基于位置服务的加密隐私保护方案
2018 IEEE Symposium on Privacy-Aware Computing (PAC) Pub Date : 2018-09-01 DOI: 10.1109/PAC.2018.00022
Yuwen Pu, Jinbiao Luo, Ying Wang, Chun-qiang Hu, Yan Huo, Jiong Zhang
{"title":"Privacy Preserving Scheme for Location Based Services Using Cryptographic Approach","authors":"Yuwen Pu, Jinbiao Luo, Ying Wang, Chun-qiang Hu, Yan Huo, Jiong Zhang","doi":"10.1109/PAC.2018.00022","DOIUrl":"https://doi.org/10.1109/PAC.2018.00022","url":null,"abstract":"Location based services pose strong security and privacy requirements but achieving privacy protection at the client side is a non-trial problem. In this paper, we propose an efficient and reliable location privacy preserving scheme using cryptographic approach. It can preserve users' privacy data by making their identity be anonymity for LBS provider and fog server. For communication, both AES with One-Time-Pad keys and IBE are employed to guarantee confidentiality and integrity of request and response data. Besides, we also provide security analysis to demonstrate that our scheme can resist internal attack, external attack and colluding attack.","PeriodicalId":208309,"journal":{"name":"2018 IEEE Symposium on Privacy-Aware Computing (PAC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122566385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Informational Privacy, A Right to Explanation, and Interpretable AI 信息隐私、解释权和可解释的人工智能
2018 IEEE Symposium on Privacy-Aware Computing (PAC) Pub Date : 2018-09-01 DOI: 10.1109/PAC.2018.00013
Tae Wan Kim, Bryan R. Routledge
{"title":"Informational Privacy, A Right to Explanation, and Interpretable AI","authors":"Tae Wan Kim, Bryan R. Routledge","doi":"10.1109/PAC.2018.00013","DOIUrl":"https://doi.org/10.1109/PAC.2018.00013","url":null,"abstract":"Businesses increasingly utilize secret algorithms and infringe users' informational privacy. We argue that to best protect users' online privacy, the use of an algorithm that assists with decisions or autonomously makes decisions that impact people requires a right to explanation.","PeriodicalId":208309,"journal":{"name":"2018 IEEE Symposium on Privacy-Aware Computing (PAC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125637504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Malware Variants Detection Using Behavior Destructive Features 使用行为破坏性功能的恶意软件变体检测
2018 IEEE Symposium on Privacy-Aware Computing (PAC) Pub Date : 2018-09-01 DOI: 10.1109/PAC.2018.00020
Yongle Chen, Bingchu Jin, Dan Yu, Junjie Chen
{"title":"Malware Variants Detection Using Behavior Destructive Features","authors":"Yongle Chen, Bingchu Jin, Dan Yu, Junjie Chen","doi":"10.1109/PAC.2018.00020","DOIUrl":"https://doi.org/10.1109/PAC.2018.00020","url":null,"abstract":"The variants of malware are a major threat to the security of computer systems. Millions of hosts on the Internet have been infected by malwares variants. Accurate detection of malware variants has become a key challenge for malware detection. The existing static detection is susceptible to file shelling and code obfuscation, while the dynamic detection is subject to anti-debugging and anti-virtual machine technology. Therefore, by combining the static and dynamic detection, we designed a malicious variants detection method based on behavior destructive features to analyze malicious samples.","PeriodicalId":208309,"journal":{"name":"2018 IEEE Symposium on Privacy-Aware Computing (PAC)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122288575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Message from the PAC 2018 Chairs 2018年PAC主席的致辞
2018 IEEE Symposium on Privacy-Aware Computing (PAC) Pub Date : 2018-09-01 DOI: 10.1109/PAC.2018.00005
Xiuzhen Cheng, J. Valacich, N. Zhang
{"title":"Message from the PAC 2018 Chairs","authors":"Xiuzhen Cheng, J. Valacich, N. Zhang","doi":"10.1109/PAC.2018.00005","DOIUrl":"https://doi.org/10.1109/PAC.2018.00005","url":null,"abstract":"","PeriodicalId":208309,"journal":{"name":"2018 IEEE Symposium on Privacy-Aware Computing (PAC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125121228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
[Title page i] [标题页i]
2018 IEEE Symposium on Privacy-Aware Computing (PAC) Pub Date : 2018-09-01 DOI: 10.1109/pac.2018.00001
{"title":"[Title page i]","authors":"","doi":"10.1109/pac.2018.00001","DOIUrl":"https://doi.org/10.1109/pac.2018.00001","url":null,"abstract":"","PeriodicalId":208309,"journal":{"name":"2018 IEEE Symposium on Privacy-Aware Computing (PAC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116651065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PhotoSafer: Content-Based and Context-Aware Private Photo Protection for Smartphones PhotoSafer:基于内容和上下文感知的智能手机私人照片保护
2018 IEEE Symposium on Privacy-Aware Computing (PAC) Pub Date : 2018-09-01 DOI: 10.1109/PAC.2018.00008
Ang Li, David Darling, Qinghua Li
{"title":"PhotoSafer: Content-Based and Context-Aware Private Photo Protection for Smartphones","authors":"Ang Li, David Darling, Qinghua Li","doi":"10.1109/PAC.2018.00008","DOIUrl":"https://doi.org/10.1109/PAC.2018.00008","url":null,"abstract":"Nowadays many people store photos in smartphones. Many of the photos contain sensitive, private information, such as a photocopy of driver's license and credit card. An arising privacy concern is with the unauthorized accesses to such private photos by installed apps. The Android permission system offers all-or-nothing access to photos stored on smartphones, which is still coarse-grained control and makes users unaware of the exact behavior of installed apps. Our analysis found that 82% of the top 200 free apps have complete access to stored photos and network on a user's smartphone. In addition, our user survey revealed that 87.5% of 112 respondents are not aware that certain apps can access their photos without informing users, and all the respondents believe that the stored photos on their smartphones contain different types of private information. Hence, we propose PhotoSafer, a content-based, context-aware private photo protection system for Android phones. PhotoSafer can detect private photos based on photo content with a well-trained deep convolutional neural network, and control access to photos based on system status (e.g., screen is locked) and app running status (e.g., background). Evaluations demonstrate that PhotoSafer can accurately identify private photos in real time. The effectiveness and efficiency of the implemented prototype system show the potential for practical use.","PeriodicalId":208309,"journal":{"name":"2018 IEEE Symposium on Privacy-Aware Computing (PAC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124934382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Efficient Privacy-Preserving Outsourcing of Large-Scale Geometric Programming 大规模几何规划的高效隐私保护外包
2018 IEEE Symposium on Privacy-Aware Computing (PAC) Pub Date : 2018-09-01 DOI: 10.1109/PAC.2018.00012
Wei Bao, Qinghua Li
{"title":"Efficient Privacy-Preserving Outsourcing of Large-Scale Geometric Programming","authors":"Wei Bao, Qinghua Li","doi":"10.1109/PAC.2018.00012","DOIUrl":"https://doi.org/10.1109/PAC.2018.00012","url":null,"abstract":"Nowadays industries are collecting a massive and exponentially growing amount of data that can potentially promote business innovations. However, it is challenging for resourcelimited clients to analyze their data in a cost-effective and timely way as the data volume keeps growing. With cloud computing, one feasible solution is to analyze the massive data by outsourcing them to the cloud. Nonetheless, clients’ data may contain private information that needs to be kept secret. In this paper, we design a secure, efficient, and verifiable outsourcing protocol specifically for geometric programming, which is one of the most fundamental problems in data analysis with many applications. In particular, a secure and efficient transformation scheme is used to encrypt the original geometric programming problem at the client side and protect its privacy before offloading it, and the gradient projection method is employed to solve the encrypted geometric programming problem in the cloud side. Experiments are conducted on both Amazon Elastic Compute Cloud (EC2) and a laptop to evaluate performance of the designed outsourcing protocol, and the results show the feasibility and efficiency of the protocol.","PeriodicalId":208309,"journal":{"name":"2018 IEEE Symposium on Privacy-Aware Computing (PAC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124802333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信