A Privacy Preservation Model for RFID Data-Collections is Highly Secure and More Efficient than LKC-Privacy

Surapon Riyana, Noppamas Riyana
{"title":"A Privacy Preservation Model for RFID Data-Collections is Highly Secure and More Efficient than LKC-Privacy","authors":"Surapon Riyana, Noppamas Riyana","doi":"10.1145/3468784.3469853","DOIUrl":null,"url":null,"abstract":"RFID is a smart label technology that is used in several real-life applications such as inventory management, asset tracking, personnel tracking, controlling access to restricted areas, ID badging, supply chain management, counterfeit prevention (e.g., in the pharmaceutical industry), and smart farming. Generally, the data collection of RFIDs consists of the users’ visited locations and their visiting time, so called as trajectory datasets. Aside from applications, trajectory datasets can also be released for public use. For this reason, they could lead to being privacy violation issues. To address these issues in trajectory datasets, LKC-Privacy is proposed. Unfortunately, in this work, we demonstrate that LKC-Privacy still has a serious vulnerability that must be improved. To rid the demonstrated vulnerability of LKC-Privacy, a privacy preservation model is proposed in this work. Furthermore, the proposed mode is evaluated by extensive experiments. From the experimental results, they indicate that the proposed model is highly secure and more efficient than LKC-Privacy.","PeriodicalId":341589,"journal":{"name":"The 12th International Conference on Advances in Information Technology","volume":"33 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"The 12th International Conference on Advances in Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3468784.3469853","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

RFID is a smart label technology that is used in several real-life applications such as inventory management, asset tracking, personnel tracking, controlling access to restricted areas, ID badging, supply chain management, counterfeit prevention (e.g., in the pharmaceutical industry), and smart farming. Generally, the data collection of RFIDs consists of the users’ visited locations and their visiting time, so called as trajectory datasets. Aside from applications, trajectory datasets can also be released for public use. For this reason, they could lead to being privacy violation issues. To address these issues in trajectory datasets, LKC-Privacy is proposed. Unfortunately, in this work, we demonstrate that LKC-Privacy still has a serious vulnerability that must be improved. To rid the demonstrated vulnerability of LKC-Privacy, a privacy preservation model is proposed in this work. Furthermore, the proposed mode is evaluated by extensive experiments. From the experimental results, they indicate that the proposed model is highly secure and more efficient than LKC-Privacy.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
一种比LKC-Privacy更安全高效的RFID数据集隐私保护模型
RFID是一种智能标签技术,用于多种实际应用,如库存管理、资产跟踪、人员跟踪、控制进入限制区域、ID徽章、供应链管理、防伪(例如,在制药行业)和智能农业。一般来说,rfid的数据收集包括用户的访问位置和访问时间,称为轨迹数据集。除了应用之外,轨迹数据集也可以发布给公众使用。出于这个原因,它们可能会导致隐私侵犯问题。为了解决这些问题,提出了LKC-Privacy算法。不幸的是,在这项工作中,我们证明了LKC-Privacy仍然存在一个必须改进的严重漏洞。为了消除LKC-Privacy的脆弱性,本文提出了一种隐私保护模型。并通过大量的实验对该模型进行了验证。实验结果表明,该模型比LKC-Privacy具有更高的安全性和效率。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Privacy Preservation Techniques for Sequential Data Releasing OutViz: Visualizing the Outliers of Multivariate Time Series An Application of Evaluation of Human Sketches using Deep Learning Technique Investigation of SIFT and ORB descriptors for Indoor Maps Fusion for the Multi-agent mobile robots Computing Resource Estimation by using Machine Learning Techniques for ALICE O2 Logging System
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1