首页 > 最新文献

Proceedings of the 2015 Workshop on Privacy-Aware Mobile Computing最新文献

英文 中文
Secure Auctions without an Auctioneer via Verifiable Secret Sharing 安全拍卖没有拍卖商通过可验证的秘密共享
Pub Date : 2015-06-22 DOI: 10.1145/2757302.2757305
Maya Larson, Chun-qiang Hu, Ruinian Li, Wei Li, Xiuzhen Cheng
Combinatorial auctions are a research hot spot. They impact people's daily lives in many applications such as spectrum auctions held by the FCC. In such auctions, bidders may want to submit bids for combinations of goods. The challenge is how to protect the privacy of bidding prices and ensure data security in these auctions? To tackle this challenge, we present an approach based on verifiable secret sharing. The approach is to represent the price in the degree of a polynomial; thus the maximum/sum of the degree of two polynomials can be obtained by the degree of the sum/product of the two polynomials based on secret sharing. This protocol hides the information of bidders (bidding price) from the auction servers. The auctioneers can obtain their secret shares from bidders without a secure channel. Since it doesn't need a secure channel, this scheme is more practical and applicable to more scenarios. This scheme provides resistance to collusion attacks, conspiracy attacks, passive attacks and so on. Compared to [11, 12], our proposed scheme provides authentication without increasing the communication cost.
组合拍卖是一个研究热点。它们在许多应用中影响着人们的日常生活,例如FCC举行的频谱拍卖。在这种拍卖中,竞标者可能想要对商品的组合出价。面临的挑战是如何保护竞标价格的隐私,并确保这些拍卖中的数据安全?为了解决这一挑战,我们提出了一种基于可验证秘密共享的方法。该方法是用多项式的次数来表示价格;因此,基于秘密共享的两个多项式的和/积的次数可以得到两个多项式的次数的最大值/和。该协议对拍卖服务器隐藏了投标人的信息(投标价格)。拍卖人可以在没有安全渠道的情况下从竞买人那里获得秘密股份。由于不需要安全通道,因此该方案更加实用,适用于更多的场景。该方案可以抵抗共谋攻击、阴谋攻击、被动攻击等。与[11,12]相比,我们提出的方案在不增加通信成本的情况下提供认证。
{"title":"Secure Auctions without an Auctioneer via Verifiable Secret Sharing","authors":"Maya Larson, Chun-qiang Hu, Ruinian Li, Wei Li, Xiuzhen Cheng","doi":"10.1145/2757302.2757305","DOIUrl":"https://doi.org/10.1145/2757302.2757305","url":null,"abstract":"Combinatorial auctions are a research hot spot. They impact people's daily lives in many applications such as spectrum auctions held by the FCC. In such auctions, bidders may want to submit bids for combinations of goods. The challenge is how to protect the privacy of bidding prices and ensure data security in these auctions? To tackle this challenge, we present an approach based on verifiable secret sharing. The approach is to represent the price in the degree of a polynomial; thus the maximum/sum of the degree of two polynomials can be obtained by the degree of the sum/product of the two polynomials based on secret sharing. This protocol hides the information of bidders (bidding price) from the auction servers. The auctioneers can obtain their secret shares from bidders without a secure channel. Since it doesn't need a secure channel, this scheme is more practical and applicable to more scenarios. This scheme provides resistance to collusion attacks, conspiracy attacks, passive attacks and so on. Compared to [11, 12], our proposed scheme provides authentication without increasing the communication cost.","PeriodicalId":120179,"journal":{"name":"Proceedings of the 2015 Workshop on Privacy-Aware Mobile Computing","volume":"176 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120972798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Rise of Mini-Drones: Applications and Issues 微型无人机的兴起:应用和问题
Pub Date : 2015-06-22 DOI: 10.1145/2757302.2757303
Zhongli Liu, Zupei Li, Benyuan Liu, Xinwen Fu, I. Raptis, K. Ren
Miniature (mini) drones are enjoying increasing attention. They have a broad market and applications. However, a powerful technology often has two ethical sides. Miniature drones can be abused, rendering security and privacy concerns. The contribution of this paper is two-fold. First, we will perform a survey of mini-drones on market and compare their specifications such as flight time, maximum payload weight, and price, and regulations and issues of operating mini-drones. Second, we propose novel aerial localization strategies and compare six different localization strategies for a thorough study of aerial localization by a single drone.
微型无人机正受到越来越多的关注。它们有着广阔的市场和应用。然而,一项强大的技术往往有两个道德方面。微型无人机可能会被滥用,引发安全和隐私问题。本文的贡献是双重的。首先,我们将对市场上的微型无人机进行调查,并比较它们的规格,如飞行时间,最大有效载荷重量和价格,以及操作微型无人机的法规和问题。其次,我们提出了新的空中定位策略,并比较了六种不同的定位策略,以深入研究单架无人机的空中定位。
{"title":"Rise of Mini-Drones: Applications and Issues","authors":"Zhongli Liu, Zupei Li, Benyuan Liu, Xinwen Fu, I. Raptis, K. Ren","doi":"10.1145/2757302.2757303","DOIUrl":"https://doi.org/10.1145/2757302.2757303","url":null,"abstract":"Miniature (mini) drones are enjoying increasing attention. They have a broad market and applications. However, a powerful technology often has two ethical sides. Miniature drones can be abused, rendering security and privacy concerns. The contribution of this paper is two-fold. First, we will perform a survey of mini-drones on market and compare their specifications such as flight time, maximum payload weight, and price, and regulations and issues of operating mini-drones. Second, we propose novel aerial localization strategies and compare six different localization strategies for a thorough study of aerial localization by a single drone.","PeriodicalId":120179,"journal":{"name":"Proceedings of the 2015 Workshop on Privacy-Aware Mobile Computing","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123823564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
Privacy Disclosure from Wearable Devices 可穿戴设备的隐私泄露
Pub Date : 2015-06-22 DOI: 10.1145/2757302.2757306
Tong Yan, Yachao Lu, Nan Zhang
In recent years, wearable devices have seen an explosive growth of popularity and a rapid enhancement of functionalities. Current off-the-shelf wearable devices offer pack sensors such as pedometer, gyroscope, accelerometer, altimeter, compass, GPS, and heart rate monitor. These sensors work together to quietly monitor various aspects of a user's daily life, enabling a wide spectrum of health- and social-related applications. Nevertheless, the data collected by such sensors, even in their aggregated form, may cause significant privacy concerns if shared with third-party applications and/or a user's social connections (as many wearable platforms now support). This paper studies a novel problem of the potential inference of sensitive user behavior from seemingly insensitive sensor outputs. Specifically, we examine whether it is possible to infer the behavioral sequence of a user such as moving from one place to another, visiting a coffee shop, grocery shopping, etc., based on the outputs of pedometer sensors (aggregated over certain time intervals, e.g., 1 minute). We demonstrate through real-world experiments that it is often possible to infer such behavior with a high success probability, raising privacy concerns on the sharing of such information as currently supported by various wearable devices.
近年来,可穿戴设备的普及程度呈爆炸式增长,其功能也在迅速增强。目前现成的可穿戴设备提供包装传感器,如计步器、陀螺仪、加速度计、高度计、指南针、GPS和心率监测器。这些传感器协同工作,悄无声息地监控用户日常生活的各个方面,从而实现广泛的健康和社会相关应用。然而,这些传感器收集的数据,即使是以汇总的形式,如果与第三方应用程序和/或用户的社交关系(许多可穿戴平台现在都支持)共享,可能会引起严重的隐私问题。本文研究了从看似不敏感的传感器输出中推断敏感用户行为的新问题。具体来说,我们检查是否有可能推断用户的行为序列,例如从一个地方移动到另一个地方,访问咖啡店,杂货店购物等,基于计步器传感器的输出(在特定的时间间隔内聚合,例如1分钟)。我们通过现实世界的实验证明,通常可以推断出这种行为,并且成功率很高,这引起了人们对目前各种可穿戴设备支持的此类信息共享的隐私问题。
{"title":"Privacy Disclosure from Wearable Devices","authors":"Tong Yan, Yachao Lu, Nan Zhang","doi":"10.1145/2757302.2757306","DOIUrl":"https://doi.org/10.1145/2757302.2757306","url":null,"abstract":"In recent years, wearable devices have seen an explosive growth of popularity and a rapid enhancement of functionalities. Current off-the-shelf wearable devices offer pack sensors such as pedometer, gyroscope, accelerometer, altimeter, compass, GPS, and heart rate monitor. These sensors work together to quietly monitor various aspects of a user's daily life, enabling a wide spectrum of health- and social-related applications. Nevertheless, the data collected by such sensors, even in their aggregated form, may cause significant privacy concerns if shared with third-party applications and/or a user's social connections (as many wearable platforms now support). This paper studies a novel problem of the potential inference of sensitive user behavior from seemingly insensitive sensor outputs. Specifically, we examine whether it is possible to infer the behavioral sequence of a user such as moving from one place to another, visiting a coffee shop, grocery shopping, etc., based on the outputs of pedometer sensors (aggregated over certain time intervals, e.g., 1 minute). We demonstrate through real-world experiments that it is often possible to infer such behavior with a high success probability, raising privacy concerns on the sharing of such information as currently supported by various wearable devices.","PeriodicalId":120179,"journal":{"name":"Proceedings of the 2015 Workshop on Privacy-Aware Mobile Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125216856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Proceedings of the 2015 Workshop on Privacy-Aware Mobile Computing 2015年隐私意识移动计算研讨会论文集
Pub Date : 2015-06-22 DOI: 10.1145/2757302
Xinwen Fu, Nan Zhang
It is our great pleasure to welcome you to the 2015 ACM MobiHoc Workshop on Privacy-Aware Mobile Computing -- PAMCO'15. This is the first year of this workshop, which aims to bring together researchers from mobile computing and security/privacy communities to discuss topics related to the protection of privacy in mobile computing, including both theoretical studies and implementation/experimentations papers, especially analysis of privacy threats from emerging applications in mobile environments - e.g., location-based services, mobile apps, wearable computing, etc.
我们非常高兴地欢迎您参加2015年ACM移动隐私意识移动计算研讨会——PAMCO'15。今年是该研讨会的第一年,该研讨会旨在汇集来自移动计算和安全/隐私社区的研究人员,讨论与移动计算中隐私保护相关的主题,包括理论研究和实施/实验论文,特别是分析移动环境中新兴应用程序的隐私威胁-例如,基于位置的服务,移动应用程序,可穿戴计算等。
{"title":"Proceedings of the 2015 Workshop on Privacy-Aware Mobile Computing","authors":"Xinwen Fu, Nan Zhang","doi":"10.1145/2757302","DOIUrl":"https://doi.org/10.1145/2757302","url":null,"abstract":"It is our great pleasure to welcome you to the 2015 ACM MobiHoc Workshop on Privacy-Aware Mobile Computing -- PAMCO'15. This is the first year of this workshop, which aims to bring together researchers from mobile computing and security/privacy communities to discuss topics related to the protection of privacy in mobile computing, including both theoretical studies and implementation/experimentations papers, especially analysis of privacy threats from emerging applications in mobile environments - e.g., location-based services, mobile apps, wearable computing, etc.","PeriodicalId":120179,"journal":{"name":"Proceedings of the 2015 Workshop on Privacy-Aware Mobile Computing","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114545814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blind Recognition of Text Input on Mobile Devices via Natural Language Processing 基于自然语言处理的移动设备文本输入的盲识别
Pub Date : 2015-06-22 DOI: 10.1145/2757302.2757304
Qinggang Yue, Z. Ling, Wei Yu, Benyuan Liu, Xinwen Fu
In this paper, we investigate how to retrieve meaningful English text input on mobile devices from recorded videos while the text is illegible in the videos. In our previous work, we were able to retrieve random passwords with high success rate at a certain distance. When the distance increases, the success rate of recovering passwords decreases. However, if the input is meaningful text such as email messages, we can further increase the success rate via natural language processing techniques since the text follows spelling and grammar rules and is context sensitive. The process of retrieving the text from videos can be modeled as noisy channels. We first derive candidate words for each word of the input sentence, model the whole sentence with a Hidden Markov model and then apply the trigram language model to derive the original sentence. Our experiments validate our technique of retrieving meaningful English text input on mobile devices from recorded videos.
在本文中,我们研究了如何在视频文本难以辨认的情况下,在移动设备上检索有意义的英语文本输入。在我们之前的工作中,我们能够在一定距离内以很高的成功率检索随机密码。距离越大,密码恢复成功率越低。但是,如果输入是有意义的文本,如电子邮件消息,我们可以通过自然语言处理技术进一步提高成功率,因为文本遵循拼写和语法规则,并且对上下文敏感。从视频中检索文本的过程可以建模为噪声信道。我们首先为输入句子的每个单词推导候选词,然后用隐马尔可夫模型对整个句子建模,然后应用三元组语言模型推导原始句子。我们的实验验证了我们在移动设备上从录制的视频中检索有意义的英语文本输入的技术。
{"title":"Blind Recognition of Text Input on Mobile Devices via Natural Language Processing","authors":"Qinggang Yue, Z. Ling, Wei Yu, Benyuan Liu, Xinwen Fu","doi":"10.1145/2757302.2757304","DOIUrl":"https://doi.org/10.1145/2757302.2757304","url":null,"abstract":"In this paper, we investigate how to retrieve meaningful English text input on mobile devices from recorded videos while the text is illegible in the videos. In our previous work, we were able to retrieve random passwords with high success rate at a certain distance. When the distance increases, the success rate of recovering passwords decreases. However, if the input is meaningful text such as email messages, we can further increase the success rate via natural language processing techniques since the text follows spelling and grammar rules and is context sensitive. The process of retrieving the text from videos can be modeled as noisy channels. We first derive candidate words for each word of the input sentence, model the whole sentence with a Hidden Markov model and then apply the trigram language model to derive the original sentence. Our experiments validate our technique of retrieving meaningful English text input on mobile devices from recorded videos.","PeriodicalId":120179,"journal":{"name":"Proceedings of the 2015 Workshop on Privacy-Aware Mobile Computing","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126176213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Session details: Technical Paper Session 会议详情:技术论文会议
Pub Date : 2015-06-22 DOI: 10.1145/3246892
{"title":"Session details: Technical Paper Session","authors":"","doi":"10.1145/3246892","DOIUrl":"https://doi.org/10.1145/3246892","url":null,"abstract":"","PeriodicalId":120179,"journal":{"name":"Proceedings of the 2015 Workshop on Privacy-Aware Mobile Computing","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114119675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the 2015 Workshop on Privacy-Aware Mobile Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1