21 |
The Study of Privacy Protection in Vehicular Ad Hoc NetworksTseng, Chun-Hao 14 August 2008 (has links)
Abstract
Vehicular Ad Hoc Networks (VANET) can provide strong safety for vehicles by taking the advantages of the information which are interchanged among themselves and some infrastructures. Due to this significant application of VANET, message authentication and privacy in VANET is quite critical. Pseudonym PKI technology is a practical solution to ensure the above two properties. However, the performance of the previous works cannot satisfy the requirement for the applications in VANET, such as efficiency and management cost. Most of all pseudonym PKI technologies are comprehensive schemes, like group key and ID-based public key cryptosystem. This also increases the implementation complexity of VANET security. Therefore, we will propose an efficient pseudonym PKI mechanism based on bilinear mapping to improve the performance of the message authentication protocol, certificate tracing and certificate revocation, implementation cost, and management cost.
|
22 |
EVALUATION OF INTELLIGIBILITY AND SPEAKER SIMILARITY OF VOICE TRANSFORMATIONRaghunathan, Anusha 01 January 2011 (has links)
Voice transformation refers to a class of techniques that modify the voice characteristics either to conceal the identity or to mimic the voice characteristics of another speaker. Its applications include automatic dialogue replacement and voice generation for people with voice disorders. The diversity in applications makes evaluation of voice transformation a challenging task. The objective of this research is to propose a framework to evaluate intentional voice transformation techniques. Our proposed framework is based on two fundamental qualities: intelligibility and speaker similarity. Intelligibility refers to the clarity of the speech content after voice transformation and speaker similarity measures how well the modified output disguises the source speaker. We measure intelligibility with word error rates and speaker similarity with likelihood of identifying the correct speaker. The novelty of our approach is, we consider whether similarly transformed training data are available to the recognizer. We have demonstrated that this factor plays a significant role in intelligibility and speaker similarity for both human testers and automated recognizers. We thoroughly test two classes of voice transformation techniques: pitch distortion and voice conversion, using our proposed framework. We apply our results for patients with voice hypertension using video self-modeling and preliminary results are presented.
|
23 |
Privacy Protection for Life-log SystemChaudhari, Jayashri S. 01 January 2007 (has links)
Tremendous advances in wearable computing and storage technologies enable us to record not just snapshots of an event but the whole human experience for a long period of time. Such a \life-logandamp;quot; system captures important events as they happen, rather than an after-thought. Such a system has applications in many areas such as law enforcement, personal archives, police questioning, and medicine. Much of the existing eandamp;reg;orts focus on the pattern recognition and information retrieval aspects of the system. On the other hand, the privacy issues raised by such an intrusive system have not received much attention from the research community. The objectives of this research project are two-fold: andamp;macr;rst, to construct a wearable life-log video system, and second, to provide a solution for protecting the identity of the subjects in the video while keeping the video useful. In this thesis work, we designed a portable wearable life-log system that implements audio distortion and face blocking in a real time to protect the privacy of the subjects who are being recorded in life-log video. For audio, our system automatically isolates the subject's speech and distorts it using a pitch- shifting algorithm to conceal the identity. For video, our system uses a real-time face detection, tracking and blocking algorithm to obfuscate the faces of the subjects. Extensive experiments have been conducted on interview videos to demonstrate the ability of our system in protecting the identity of the subject while maintaining the usability of the life-log video.
|
24 |
AMMP-EXTN: A User Privacy and Collaboration Control Framework for a Multi-User Collaboratory Virtual Reality SystemMa, Wenjun 01 October 2007 (has links)
In this thesis, we propose a new design of privacy and session control for improving a collaborative molecular modeling CVR system AMMP-VIS [1]. The design mainly addresses the issue of competing user interests and privacy protection coordination. Based on our investigation of AMMP-VIS, we propose a four-level access control structure for collaborative sessions and dynamic action priority specification for manipulations on shared molecular models. Our design allows a single user to participate in multiple simultaneous sessions. Moreover, a messaging system with text chatting and system broadcasting functionality is included. A 2D user interface [2] for easy command invocation is developed in Python. Two other key aspects of system implementation, the collaboration Central deployment and the 2D GUI for control are also discussed. Finally, we describe our system evaluation plan which is based on an improved cognitive walkthrough and heuristic evaluation as well as statistical usage data.
|
25 |
Examining the Impact of E-privacy Risk Concerns on Citizens' Intentions to use E-government Services: An Oman Perspectived.alabri@murdoch.edu.au, Dhiyab Al Abri January 2009 (has links)
E-privacy concerns are among the online transactions risks that influence the use of e-services and e-government services. Whilst there have been studies that have analysed the impact of e-privacy on the willingness of people to utilize the Internet, especially in e-commerce, there has been limited research in relation to e-government services for a specific demographic group. This study has examined the impact of e-privacy risk concerns on the acceptance of e-government services in Oman using an integrated model. The model is based on Liu et al.‟s (2005) privacy-trust-behavioral intention model, the broader technology acceptance literature, and recent work on e-privacy awareness and protection. The research used both quantitative and qualitative approaches: data collection by questionnaire and a series of semi-structured interviews. The sampling frame for the study was civil services government employees in Oman. The model was tested using partial least squares and the results were compared to those obtained from the interview data.
The study found that e-privacy awareness significantly impacts the level of e-privacy risk concerns. Social norms and perceived usefulness were found to play a significant role in influencing the intention to use e-government services. The study also found that e-privacy concerns and perceptions of the protection available against risks influence citizens‟ intentions to use e-government services via their influence on the perceived trustworthiness of these services. Thus trustworthiness is a factor that could be an obstacle to successful e-government services project implementation. Therefore the thesis recommends that governments pay greater attention to the role of e-privacy concerns and put in place security and e-privacy controls. Citizens should then be made aware of these in order to build the required level of trust and confidence in these services.
|
26 |
Privacy issues in health care and security of statistical databasesKing, Tatiana January 2008 (has links)
Research Doctorate - Doctor of Philosophy (PhD) / Privacy of personal information is becoming a major problem in health care, in the light of coming implementation of electronic health record (EHR)systems. There is evidence of increasing public concern over privacy of personal health information that is to be stored in EHRs and widely used within the interconnected systems. The issues for the health care system include inadequate legislation for privacy in health care, as well as deficiency of effective technical and security measures. The work in the thesis is part of a larger project which aims to offer a comprehensive set of new techniques for protection of confidential individual's health data used for statistical purposes. The research strategy is to explore concerns about privacy in relation to legislation, attitudes to health care and technical protections in statistical databases. It comprised two different approaches: * content analysis of legal frameworks addressing protection of privacy in Australian health care, and * social research to explore privacy concerns in health care by Australians 18 years and over. This thesis presents a new multi-stage research to explore privacy concerns in health care raised by the development of EHR systems. Stage one involved 23 participants within four focus groups. Stage two was a national sample survey conducted with 700 respondents 18 years and over. The results of analysis are presented. They are compared with the results of other studies. The main findings of this thesis are: * revealing the main inadequacies in the Australian legal system for protecting privacy of health information in electronic health records; * determining characteristics of people who have concerns about the privacy of their health information; * identifying items of a health record which have to be protected and some reasons for that. The findings of the study will assist with the decision and solution for appropriate technical measures in statistical databases as well as issues of inadequacy in the existing privacy legislation. Furthermore, the work in this thesis confirmed a low awareness of public in relation to statistical use of personal health information and a low level of trust to automated systems of electronic health records which are initiated by the government. In conclusion, attitude towards privacy depends on individual's characteristics but also on existing legislation, public's awareness of this legislation,the means of resolving complaints, and awareness of technical means for privacy protection. Therefore, it is important to educate public in order for EHR system function to the full of its potential and the future innovations of information technology to strengthen health care and medical research.
|
27 |
Distributed Electronic Health Record System based on MiddlewareXin, Zhang January 2013 (has links)
With the fast development of information technology, traditional healthcare is evolving to a more digital and electronic stage. Electronic HealthRecord (EHR) is residents’ basic information and health care relatedinformation conforming to standard. It can not only provide usefulinformation to medical workers, but also exchange resources with otherinformation systems. But with the growing complexity of electronichealth record data sources, it becomes a big challenge to set up a structurewhich allows different types of data sharing and exchanging inmulti-platform applications. It’s even more important to find out amethod to support great amount of users from different applicationplatform to sharing and exchanging data at the same time.In this paper, we proposed a distributed electronic health record systembased on middleware to address the problem. Both permanent and realtimedata should pass through the middleware provided by the system,and will be transformed into standard format for storage. Multi-threadand distributed server group design will let the system be more flexibleand scalable, and will be able to provide service to users concurrently.The system creates a standard data format for data transferring andstorage. All raw data collected from different kinds of sensor system willbe formatted with application programming interface (API) or softwaredevelopment kit (SDK) system provided before upload to the system.Encryption methods are also implemented to ensure data security andprivacy protection.
|
28 |
Darknet sítě jako způsob ochrany soukromí uživatelů internetu / Darknet networks as a way of protecting internet users' privacyPlevný, Marek January 2017 (has links)
In this age when information technologies became inseparable parts of our lives we can hardly imagine for example living without internet. There is a phenomenon connected with internet and that is large scale collection of data about internet users and their activities. Because of this fact, it is important to protect our internet privacy as a very important aspect of our lives. This work examines large scale collection of data about users internet activities. During this work, different methods and reasons for this largescale data collection are examined. Later, different ways how internet users are protected by law or how they can protect themselves are examined. One of the ways how internet users can protect their internet privacy is by using so-called anonymizing networks connected with a phenomenon called Darknet. This work examines if it is possible by ordinary internet users to adapt this method of internet privacy protection.
|
29 |
Protecting User Privacy with Social Media Data and MiningJanuary 2020 (has links)
abstract: The pervasive use of the Web has connected billions of people all around the globe and enabled them to obtain information at their fingertips. This results in tremendous amounts of user-generated data which makes users traceable and vulnerable to privacy leakage attacks. In general, there are two types of privacy leakage attacks for user-generated data, i.e., identity disclosure and private-attribute disclosure attacks. These attacks put users at potential risks ranging from persecution by governments to targeted frauds. Therefore, it is necessary for users to be able to safeguard their privacy without leaving their unnecessary traces of online activities. However, privacy protection comes at the cost of utility loss defined as the loss in quality of personalized services users receive. The reason is that this information of traces is crucial for online vendors to provide personalized services and a lack of it would result in deteriorating utility. This leads to a dilemma of privacy and utility.
Protecting users' privacy while preserving utility for user-generated data is a challenging task. The reason is that users generate different types of data such as Web browsing histories, user-item interactions, and textual information. This data is heterogeneous, unstructured, noisy, and inherently different from relational and tabular data and thus requires quantifying users' privacy and utility in each context separately. In this dissertation, I investigate four aspects of protecting user privacy for user-generated data. First, a novel adversarial technique is introduced to assay privacy risks in heterogeneous user-generated data. Second, a novel framework is proposed to boost users' privacy while retaining high utility for Web browsing histories. Third, a privacy-aware recommendation system is developed to protect privacy w.r.t. the rich user-item interaction data by recommending relevant and privacy-preserving items. Fourth, a privacy-preserving framework for text representation learning is presented to safeguard user-generated textual data as it can reveal private information. / Dissertation/Thesis / Doctoral Dissertation Computer Science 2020
|
30 |
Tunelovací a kryptografické protokoly jako ochrana soukromí na regulovaném internetu / Tunneling and Cryptographic protocols as a privacy protection on regulated internetČížek, Michal January 2011 (has links)
This thesis is about internet regulations and usage of tunneling protocols as a privacy protection on regulated internet. The thesis includes detailed description of most widely used tunneling protocols focused on their usage in regulated networks. The produce the teoretical part of the thesis is synoptical comparative table including benefits and disadvantages of each protocol and examples of suitable usage. The practical part presents the tunneling protocols in three different scenarios which are very frequent in practice. Each scenario has been realized, the communication has been captured using Wireshark network protocol analyzer and also the analysis of potential risks has been done for the event that the communication would be captured by a third party - the regulator.
|
Page generated in 0.1098 seconds