Privacy-preserving Data-aggregation for Internet-of-things in Smart Grid
|
|
|
- Francis McDaniel
- 10 years ago
- Views:
Transcription
1 Privacy-preserving Data-aggregation for Internet-of-things in Smart Grid Aakanksha Chowdhery Postdoctoral Researcher, Microsoft Research Collaborators: Victor Bahl, Ratul Mahajan, Frank Mcsherry, Abhradeep Thakurta
2 Smart meters/devices in home Utility/ Third Party Measure fine-grained energy use Collected data transmitted by smart meter & aggregated at Energy data center data consumer: utility/third party
3 Smart meter data enables Billing - with time-of-use pricing Fraud detection Demand response Load monitoring and forecasting Power outage notifications Energy Efficiency analysis & optimization etc 3
4 Privacy Concerns 4
5 Privacy Concerns What can your smart meter tell? - Did you leave late for work? - Did you leave your child home alone? - Were you home during your sick leave? - Did you watch the game last night? (Molina-Markham et al, Private Memoirs of Smart Meters, BuildSys 10) 5
6 Privacy Concerns Energy Industry maximize revenues Third-party companies - target marketing material eg building & insulation Hackers real-time mass surveillance, burglary Data Privacy compromised if leak personally identifiable information/attributes 6
7 Current Privacy Policies Under Fair Information Practice Principles at Federal Detailed readings - sensitive Requires consumer awareness & consent California Public Utilities protect smart meter data (rulings in 2011 & April 2014) Utilities can t sell customer s personal/consumption data Third parties can t use it for secondary commercial use 7
8 Pseudo-nymizing smart meter data Separate consumption trace & household identity 8
9 Naïve Pseudo-nymizing is fragile Correlate two data sources overlapping in time Attack: Linking by anomaly Jawurek et al, Smart Metering de-pseudonymization, ACSAC
10 Privacy-enhancing Technologies Prevent privacy violations before they occur Pseudo-nymizing Trusted third party Aggregates Adds noise (differential privacy) Cryptographic computation 10
11 System Model Smart Meter 1 Smart Meter 2 query Utility/ Third Party Smart Meter N Energy Data Center: Private/Public Cloud 11
12 Trusted third party aggregates Smart Meter 1 Smart Meter 2 Energy Data Center Smart Meter N Trusted link Gateway/ Aggregator query Utility/ Third Party Gateway aggregates the high-frequency readings No private data items sent, yet some individual identifiable 12
13 Trusted third party adds noise Smart Meter 1 Smart Meter 2 Energy Smart Meter N Trusted link Gateway/ Aggregator Add noise Data Center query Utility/ Third Party Differential privacy - add random noise to aggregate 13
14 Differential privacy (intuition) A mechanism is differentially private if every output is produced with similar probability whether any given input is included or not A B C Similar output distributions F(x) F(x) A B C D Bounded risk for D if she includes her data! Cynthia Dwork Differential Privacy ICALP
15 Achieving differential privacy A simple differentially private mechanism Smart Meter 1 Smart Meter 2 Smart Meter N Trusted link Gateway/ Aggregator Tell me f(x) f(x)+noise Utility/ Third Party How much noise should one add? 15
16 Achieving differential privacy Function sensitivity (intuition): Maximum effect of any single input on the output Aim: Need to conceal this effect to preserve privacy Example: Computing the aggregate mean of the readings has low sensitivity Any single user s reading does not affect the final mean by too much Calculating the maximum reading has high sensitivity 16
17 Achieving differential privacy Function sensitivity (intuition): Maximum effect of any single input on the output Aim: Need to conceal this effect to preserve privacy Example: SUM over input elements drawn from [0, M] X 1 X 2 X 3 X 4 SUM Sensitivity = M Max effect of any input element is M 17
18 Achieving differential privacy A simple differentially private mechanism Smart Meter 1 Smart Meter 2 Smart Meter N Trusted link Gateway/ Aggregator Tell me f(x) f(x)+noise Intuition: Noise needed to mask the effect of a single input Utility/ Third Party 18
19 Privacy-enhancing Technologies Prevent privacy violations before they occur Pseudo-nymizing Trusted third party Aggregates Adds noise (differential privacy) Cryptographic computation 19
20 Cryptographic Computation Strongest privacy/security guarantee Aggregate via homomorphic encryption The product of encryptions of two messages is an encryption of the sum of the two messages Paillier cryptosystem - additively homomorphic Enables spatial/temporal aggregation Erkin et al Private computation of spatial and temporal power consumption with smart meters, ACNS
21 Cryptographic Computation Smart Meter 1 Smart Meter 2 One Paillier public key Each smart meter encrypts Gateway/ Aggregator Smart Meter N Aggregator combines the encrypted readings Can decrypt the sum of readings Can t decrypt the individual (modified Paillier scheme) Erkin et al Private computation of spatial and temporal power consumption with smart meters, ACNS
22 Cryptographic Computation Time-of-use pricing & billing require individual meter readings? Integrity certify meter readings and bill calculations? 22
23 Cryptographic Computation Rial et al Privacy- Preserving Smart Metering; WPES
24 Cryptographic Computation Time-of-use pricing & billing require individual meter readings? No use homomorphic encryption Integrity certify meter readings and billing calculations Use zero-knowledge proof Smart meter proves to the utility (the verifier) that the reading and calculation is true, Doesn t reveal individual readings Rial et al Privacy-Preserving Smart Metering; WPES
25 Recap: Privacy-enhancing Technologies Smart Meter 1 Smart Meter 2 Gateway/ Aggregator Energy Data Center Smart Meter N query Utility/ Third Party Pseudo-nymizing Trusted third party aggregates & adds noise Cryptographic computation 25
26 Implementation Overheads Smart meter: low computation power & memory No overhead with Pseudo-nymizing & trusted third party Additional computation/hardware for cryptographic Communication bandwidth Pseudo-nymizing < Trusted third party <= Cryptographic Computation at the aggregator Increases with the complexity of the protocol Scalability 26
27 Conclusions Smart-meter data can be privacy intrusive Personally identifiable information Time granularity matters Anonymizing the readings is not sufficient Privacy-enhancing technologies can prevent privacy violations before they occur Trusted third party can aggregate the data & add noise using differential privacy Cryptographic computation enables verifiable spatiotemporal aggregations 27
28 THANK YOU! 28
Approaches for privacy-friendly Smart Metering: Architecture using homomorphic encryption and homomorphic MACs
Approaches for privacy-friendly Smart Metering: Architecture using homomorphic encryption and homomorphic MACs Seminar Trustworthy and Energy-Efficient Smart Grids Overview on Approach Introduced in: [B.
Privacy-Preserving Aggregation of Time-Series Data
Privacy-Preserving Aggregation of Time-Series Data Elaine Shi PARC/UC Berkeley [email protected] Richard Chow PARC [email protected] T-H. Hubert Chan The University of Hong Kong [email protected] Dawn
Top Ten Security and Privacy Challenges for Big Data and Smartgrids. Arnab Roy Fujitsu Laboratories of America
1 Top Ten Security and Privacy Challenges for Big Data and Smartgrids Arnab Roy Fujitsu Laboratories of America 2 User Roles and Security Concerns [SKCP11] Users and Security Concerns [SKCP10] Utilities:
Big Data - Security and Privacy
Big Data - Security and Privacy Elisa Bertino CS Department, Cyber Center, and CERIAS Purdue University Cyber Center! Big Data EveryWhere! Lots of data is being collected, warehoused, and mined Web data,
Aircloak Analytics: Anonymized User Data without Data Loss
Aircloak Analytics: Anonymized User Data without Data Loss An Aircloak White Paper Companies need to protect the user data they store for business analytics. Traditional data protection, however, is costly
NSF Workshop on Big Data Security and Privacy
NSF Workshop on Big Data Security and Privacy Report Summary Bhavani Thuraisingham The University of Texas at Dallas (UTD) February 19, 2015 Acknowledgement NSF SaTC Program for support Chris Clifton and
Secure Computation Martin Beck
Institute of Systems Architecture, Chair of Privacy and Data Security Secure Computation Martin Beck Dresden, 05.02.2015 Index Homomorphic Encryption The Cloud problem (overview & example) System properties
preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.
Privacy-Preserving Public Auditing For Secure Cloud Storage ABSTRACT: Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared
Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG
Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG 1 The Big Data Working Group (BDWG) will be identifying scalable techniques for data-centric security and privacy problems. BDWG s investigation
DATA MINING - 1DL360
DATA MINING - 1DL360 Fall 2013" An introductory class in data mining http://www.it.uu.se/edu/course/homepage/infoutv/per1ht13 Kjell Orsborn Uppsala Database Laboratory Department of Information Technology,
Survey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds
Survey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds Ms. Jyotsna T. Kumbhar 1 ME Student, Department of Computer Engineering, TSSM S, P.V.P.I.T., Bavdhan, Pune University,
YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE
YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467a: Cryptography and Computer Security Notes 1 (rev. 1) Professor M. J. Fischer September 3, 2008 1 Course Overview Lecture Notes 1 This course is
Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG
Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG 1 Security Analytics Crypto and Privacy Technologies Infrastructure Security 60+ members Framework and Taxonomy Chair - Sree Rajan, Fujitsu
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department
ZQL. a cryptographic compiler for processing private data. George Danezis. Joint work with Cédric Fournet, Markulf Kohlweiss, Zhengqin Luo
ZQL Work in progress a cryptographic compiler for processing private data George Danezis Joint work with Cédric Fournet, Markulf Kohlweiss, Zhengqin Luo Microsoft Research and Joint INRIA-MSR Centre Data
Privacy & Security of Mobile Cloud Computing (MCC)
Privacy & Security of Mobile Cloud Computing (MCC) Manmohan Chaturvedi Principal Advisor Research & Technology Development Beyond Evolution Tech Solutions Pvt. Ltd. MOBILE COMPUTING CHALLENGES Mobile devices
Challenges of Data Privacy in the Era of Big Data. Rebecca C. Steorts, Vishesh Karwa Carnegie Mellon University November 18, 2014
Challenges of Data Privacy in the Era of Big Data Rebecca C. Steorts, Vishesh Karwa Carnegie Mellon University November 18, 2014 1 Outline Why should we care? What is privacy? How do achieve privacy? Big
A COMPARATIVE STUDY OF SECURE SEARCH PROTOCOLS IN PAY- AS-YOU-GO CLOUDS
A COMPARATIVE STUDY OF SECURE SEARCH PROTOCOLS IN PAY- AS-YOU-GO CLOUDS V. Anand 1, Ahmed Abdul Moiz Qyser 2 1 Muffakham Jah College of Engineering and Technology, Hyderabad, India 2 Muffakham Jah College
DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES
DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES Saiprasad Dhumal * Prof. K.K. Joshi Prof Sowmiya Raksha VJTI, Mumbai. VJTI, Mumbai VJTI, Mumbai. Abstract piracy of digital content is a one of the
Big Data Big Security Problems? Ivan Damgård, Aarhus University
Big Data Big Security Problems? Ivan Damgård, Aarhus University Content A survey of some security and privacy issues related to big data. Will organize according to who is collecting/storing data! Intelligence
A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA
A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA U.Pandi Priya 1, R.Padma Priya 2 1 Research Scholar, Department of Computer Science and Information Technology,
Associate Prof. Dr. Victor Onomza Waziri
BIG DATA ANALYTICS AND DATA SECURITY IN THE CLOUD VIA FULLY HOMOMORPHIC ENCRYPTION Associate Prof. Dr. Victor Onomza Waziri Department of Cyber Security Science, School of ICT, Federal University of Technology,
CS346: Advanced Databases
CS346: Advanced Databases Alexandra I. Cristea [email protected] Data Security and Privacy Outline Chapter: Database Security in Elmasri and Navathe (chapter 24, 6 th Edition) Brief overview of
Big data coming soon... to an NSI near you. John Dunne. Central Statistics Office (CSO), Ireland [email protected]
Big data coming soon... to an NSI near you John Dunne Central Statistics Office (CSO), Ireland [email protected] Big data is beginning to be explored and exploited to inform policy making. However these
(Big) Data Anonymization Claude Castelluccia Inria, Privatics
(Big) Data Anonymization Claude Castelluccia Inria, Privatics BIG DATA: The Risks Singling-out/ Re-Identification: ADV is able to identify the target s record in the published dataset from some know information
METER DATA MANAGEMENT FOR THE SMARTER GRID AND FUTURE ELECTRONIC ENERGY MARKETPLACES
METER DATA MANAGEMENT FOR THE SMARTER GRID AND FUTURE ELECTRONIC ENERGY MARKETPLACES Sebnem RUSITSCHKA 1(1), Stephan MERK (1), Dr. Heinrich KIRCHAUER (2), Dr. Monika STURM (2) (1) Siemens AG Germany Corporate
Lecture 10: CPA Encryption, MACs, Hash Functions. 2 Recap of last lecture - PRGs for one time pads
CS 7880 Graduate Cryptography October 15, 2015 Lecture 10: CPA Encryption, MACs, Hash Functions Lecturer: Daniel Wichs Scribe: Matthew Dippel 1 Topic Covered Chosen plaintext attack model of security MACs
Aircloak Anonymized Analytics: Better Data, Better Intelligence
Aircloak Anonymized Analytics: Better Data, Better Intelligence An Aircloak White Paper Data is the new gold. The amount of valuable data produced by users today through smartphones, wearable devices,
Wireless Sensor Networks Chapter 14: Security in WSNs
Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks
ARRIS WHOLE HOME SOLUTION PRIVACY POLICY AND CALIFORNIA PRIVACY RIGHTS STATEMENT
ARRIS WHOLE HOME SOLUTION PRIVACY POLICY AND CALIFORNIA PRIVACY RIGHTS STATEMENT INTRODUCTION ARRIS may collect and receive information from you through its websites 1 as well as through the Moxi User
Information Technology Policy
Information Technology Policy Security Information and Event Management Policy ITP Number Effective Date ITP-SEC021 October 10, 2006 Category Supersedes Recommended Policy Contact Scheduled Review [email protected]
Data Integrity Check using Hash Functions in Cloud environment
Data Integrity Check using Hash Functions in Cloud environment Selman Haxhijaha 1, Gazmend Bajrami 1, Fisnik Prekazi 1 1 Faculty of Computer Science and Engineering, University for Business and Tecnology
Cryptography: Authentication, Blind Signatures, and Digital Cash
Cryptography: Authentication, Blind Signatures, and Digital Cash Rebecca Bellovin 1 Introduction One of the most exciting ideas in cryptography in the past few decades, with the widest array of applications,
Computer Security (EDA263 / DIT 641)
Computer Security (EDA263 / DIT 641) Lecture 12: Database Security Erland Jonsson Department of Computer Science and Engineering Chalmers University of Technology Sweden Outline Introduction to databases
CPSC 467b: Cryptography and Computer Security
CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 1 January 9, 2012 CPSC 467b, Lecture 1 1/22 Course Overview Symmetric Cryptography CPSC 467b, Lecture 1 2/22 Course Overview CPSC
Cloud Data Storage Services Considering Public Audit for Security
Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 1 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Cloud and Mobile Computing
Cloud and Mobile Computing Protect Privacy in Offloading Yung-Hsiang Lu Electrical and Computer Engineering Purdue University Technological Trends Mobile systems become primary computing platforms for
Journal of Electronic Banking Systems
Journal of Electronic Banking Systems Vol. 2015 (2015), Article ID 614386, 44 minipages. DOI:10.5171/2015.614386 www.ibimapublishing.com Copyright 2015. Khaled Ahmed Nagaty. Distributed under Creative
Secure Large-Scale Bingo
Secure Large-Scale Bingo Antoni Martínez-Ballesté, Francesc Sebé and Josep Domingo-Ferrer Universitat Rovira i Virgili, Dept. of Computer Engineering and Maths, Av. Països Catalans 26, E-43007 Tarragona,
An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud
An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud T.Vijayalakshmi 1, Balika J Chelliah 2,S.Alagumani 3 and Dr.J.Jagadeesan 4 1 PG
RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES
RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES 1 MD ISMAIL Z, 2 ASHFAQUE AHAMED K. 1 PG Scholar,Department of Computer Science, C.Abdul Hakeem College Of Arts and Science,Melvisharam.
PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE
PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE R.REVATHI # PG Scholar #, Bharathiyar Institute Of Engineering for Women, Deviyakurichi, Salem(DT) India
10 Secure Electronic Transactions: Overview, Capabilities, and Current Status
10 Secure Electronic Transactions: Overview, Capabilities, and Current Status Gordon Agnew A&F Consulting, and University of Waterloo, Ontario, Canada 10.1 Introduction Until recently, there were two primary
Paillier Threshold Encryption Toolbox
Paillier Threshold Encryption Toolbox October 23, 2010 1 Introduction Following a desire for secure (encrypted) multiparty computation, the University of Texas at Dallas Data Security and Privacy Lab created
Security and Privacy in Big Data, Blessing or Curse?
Security and Privacy in Big Data, Blessing or Curse? 2 nd National Cryptography Days 9-11 April 2015 Dr. Zeki Erkin Cyber Security Section Department of Intelligent Systems Delft University of Technology
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS Abstract: The Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a single credential
Global Soft Solutions JAVA IEEE PROJECT TITLES - 2015
Global Soft Solutions No : 6, III Floor Chitra Complex Chatram Bus Stand Trichy 620 002 www.globalsoftsolutions.in Email : [email protected] Ph : 0431 4544308 / Cell : 94431 22110 JAVA IEEE PROJECT TITLES
End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich
End-to-End Security in Wireless Sensor (WSNs) Talk by Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich Content 1. Motivation 2. Security Issues and Principles 3. Internet-of-Things and Wireless
VoteID 2011 Internet Voting System with Cast as Intended Verification
VoteID 2011 Internet Voting System with Cast as Intended Verification September 2011 VP R&D Jordi [email protected] Index Introduction Proposal Security Conclusions 2. Introduction Client computers could
A SECURE DECISION SUPPORT ESTIMATION USING GAUSSIAN BAYES CLASSIFICATION IN HEALTH CARE SERVICES
A SECURE DECISION SUPPORT ESTIMATION USING GAUSSIAN BAYES CLASSIFICATION IN HEALTH CARE SERVICES K.M.Ruba Malini #1 and R.Lakshmi *2 # P.G.Scholar, Computer Science and Engineering, K. L. N College Of
PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE
PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE Abstract: Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared
SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD
SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD S.REVATHI B.HASEENA M.NOORUL IZZATH PG Student PG Student PG Student II- ME CSE II- ME CSE II- ME CSE Al-Ameen Engineering
How do we define cloud computing?
How do we define cloud computing? On Demand Self Service customer can provision computing resources without requiring interaction with the service provider. Broad Network Access computing resources are
Victor Shoup Avi Rubin. fshoup,[email protected]. Abstract
Session Key Distribution Using Smart Cards Victor Shoup Avi Rubin Bellcore, 445 South St., Morristown, NJ 07960 fshoup,[email protected] Abstract In this paper, we investigate a method by which smart
Teradata and Protegrity High-Value Protection for High-Value Data
Teradata and Protegrity High-Value Protection for High-Value Data 03.16 EB7178 DATA SECURITY Table of Contents 2 Data-Centric Security: Providing High-Value Protection for High-Value Data 3 Visibility:
Computing on Encrypted Data
Computing on Encrypted Data Secure Internet of Things Seminar David Wu January, 2015 Smart Homes New Applications in the Internet of Things aggregation + analytics usage statistics and reports report energy
IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT
IJRRECS/November 2014/Volume-2/Issue-11/3699-3703 ISSN 2321-5461 INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD
Integrating the customer experience through unifying software - The Microsoft Vision
VAASAETT - RESPOND 2010 Integrating the customer experience through unifying software - The Microsoft Vision Principal Author Andreas Berthold- van der Molen, Microsoft EMEA Contents The New Energy Ecosystem
Lecture 9 - Message Authentication Codes
Lecture 9 - Message Authentication Codes Boaz Barak March 1, 2010 Reading: Boneh-Shoup chapter 6, Sections 9.1 9.3. Data integrity Until now we ve only been interested in protecting secrecy of data. However,
AN EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA IN TEGRITY IN CLOUDS
AN EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA IN TEGRITY IN CLOUDS Mrs.K.Saranya, M.E.,(CSE), Jay Shriram Group of Institutions, Tirupur. [email protected] Dr.S.Rajalakshmi, Associate Professor/CSE,
Lecture 7: Privacy and Security in Mobile Computing. Cristian Borcea Department of Computer Science NJIT
Lecture 7: Privacy and Security in Mobile Computing Cristian Borcea Department of Computer Science NJIT Location Privacy Location Authentication Trusted Ad Hoc Networks 2 Privacy Violated Request: Retrieve
White Paper. The Definition of Persona Data: Seeing the Complete Spectrum
White Paper The Definition of Persona Data: Seeing the Complete Spectrum Omer Tene, Senior Fellow Christopher Wolf, Founder and Co- Chair The Future of Privacy Forum January 2013 The Future of Privacy
Ausgrid Privacy Policy
Ausgrid Privacy Policy Ausgrid is responsible for the safe and reliable supply of electricity to homes and businesses throughout Sydney, the Hunter and the Central Coast. Its network is made up of more
V1.4. Spambrella Email Continuity SaaS. August 2
V1.4 August 2 Spambrella Email Continuity SaaS Easy to implement, manage and use, Message Continuity is a scalable, reliable and secure service with no set-up fees. Built on a highly reliable and scalable
IoT Security Platform
IoT Security Platform 2 Introduction Wars begin when the costs of attack are low, the benefits for a victor are high, and there is an inability to enforce law. The same is true in cyberwars. Today there
Enabling Public Auditing for Secured Data Storage in Cloud Computing
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 5 (May. 2013), V3 PP 01-05 Enabling Public Auditing for Secured Data Storage in Cloud Computing 1 Er.Amandeep Kaur,
Privacy in e-ticketing & e-identity
Privacy in e-ticketing & e-identity Attribute-proving for Smart Cards ir. Pim Vullers [email protected] Institute for Computing and Information Sciences Digital Security 17th May 2011 Pim Vullers Collis
Digital Identity Management
Digital Identity Management Techniques and Policies E. Bertino CS Department and ECE School CERIAS Purdue University [email protected] Digital Identity Management What is DI? Digital identity (DI)
Secure cloud access system using JAR ABSTRACT:
Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that
3-6 Toward Realizing Privacy-Preserving IP-Traceback
3-6 Toward Realizing Privacy-Preserving IP-Traceback The IP-traceback technology enables us to trace widely spread illegal users on Internet. However, to deploy this attractive technology, some problems
IJCSIET-ISSUE5-VOLUME1-SERIES1 Page 1
ENHANCED DATA SECURITY IN CLOUD COMPUTING TO PRESERVING DATA IN CLOUD STOREHOUSE USING THIRD PARTY AUDITOR Dr.M.V. BRAHMANANDA REDDY, PRINCIPAL, MEKAPATI RAJA REDDY INSTITUTE OF TECHNOLOGY & SCIENCE UDAYAGIRI,SPS
Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage
Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage Priyanga.R 1, Maheswari.B 2, Karthik.S 3 PG Scholar, Department of CSE, SNS College of technology, Coimbatore-35,
E-Democracy and e-voting
E-Democracy and e-voting How to make them secure and transparent August 2013 Jordi Puiggali CSO and SVP R&D [email protected] Index Introduction e-democracy Security and Transparency in e-voting
Application Design and Development
C H A P T E R9 Application Design and Development Practice Exercises 9.1 What is the main reason why servlets give better performance than programs that use the common gateway interface (CGI), even though
Elevating Data Center Performance Management
Elevating Data Center Performance Management Data Center innovation reduces operating expense, maximizes employee productivity, and generates new sources of revenue. However, many I&O teams lack proper
Enabling the SmartGrid through Cloud Computing
Enabling the SmartGrid through Cloud Computing April 2012 Creating Value, Delivering Results 2012 eglobaltech Incorporated. Tech, Inc. All rights reserved. 1 Overall Objective To deliver electricity from
DATA MINING - 1DL105, 1DL025
DATA MINING - 1DL105, 1DL025 Fall 2009 An introductory class in data mining http://www.it.uu.se/edu/course/homepage/infoutv/ht09 Kjell Orsborn Uppsala Database Laboratory Department of Information Technology,
