首页 > 最新文献

2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing最新文献

英文 中文
Top-k Queries in Wireless Sensor Networks Leveraging Hierarchical Grid Index 利用分层网格索引的无线传感器网络Top-k查询
Jine Tang, Zhenhua Wang, Yunchuan Sun, Chu Du, Zhangbing Zhou
In the Internet of Things, smart things communicate with each other, and sensed data are aggregated and queried for satisfying certain requests of end-users. Wireless sensor networks (WSN) is a key enabling technique for achieving the vision of the Internet of Things. In real applications of WSN, such as environmental monitoring and vehicle tracking, they may require to launch spatial queries for collecting sensory data to achieve certain goals. Among various queries, top-k query is one of the fundamental operators in many applications of wireless sensor networks for phenomenon monitoring. In this paper we propose a novel top-k query algorithm based on hierarchical grid index and range filter of head nodes, which is able to filter out as many unlikely top-k results as early as possible within the network from transmission.
在物联网中,智能物之间相互通信,并对感知到的数据进行聚合和查询,以满足最终用户的某些请求。无线传感器网络是实现物联网愿景的关键使能技术。在WSN的实际应用中,如环境监测、车辆跟踪等,可能需要发起空间查询来收集感官数据,以达到一定的目的。在各种查询中,top-k查询是无线传感器网络现象监测的基本操作之一。本文提出了一种基于分层网格索引和头节点范围过滤的top-k查询算法,该算法能够尽可能早地从网络传输中过滤掉尽可能多的不可能的top-k结果。
{"title":"Top-k Queries in Wireless Sensor Networks Leveraging Hierarchical Grid Index","authors":"Jine Tang, Zhenhua Wang, Yunchuan Sun, Chu Du, Zhangbing Zhou","doi":"10.1109/IMIS.2014.51","DOIUrl":"https://doi.org/10.1109/IMIS.2014.51","url":null,"abstract":"In the Internet of Things, smart things communicate with each other, and sensed data are aggregated and queried for satisfying certain requests of end-users. Wireless sensor networks (WSN) is a key enabling technique for achieving the vision of the Internet of Things. In real applications of WSN, such as environmental monitoring and vehicle tracking, they may require to launch spatial queries for collecting sensory data to achieve certain goals. Among various queries, top-k query is one of the fundamental operators in many applications of wireless sensor networks for phenomenon monitoring. In this paper we propose a novel top-k query algorithm based on hierarchical grid index and range filter of head nodes, which is able to filter out as many unlikely top-k results as early as possible within the network from transmission.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134293450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Mobile Gateway for Ubiquitous Health Care System Using ZigBee and Bluetooth 基于ZigBee和蓝牙的普适医疗保健系统移动网关
T. Laine, Chaewoo Lee, Haejung Suk
A ubiquitous health care system takes the advantage of portability and small size of wireless sensor nodes to provide remote health care services and real-time health monitoring. A gateway is needed to mediate communication between a local sensor network and remote data consumers. In current implementations of ubiquitous health care systems ZigBee-based sensors are often used to gather vital sign data such as ECG and heart rate. Transferring large quantities of vital signs from a ZigBee-based sensor sink node to a gateway requires a bandwidth that ZigBee alone is not able to provide. In this paper, we present a technical design of a Bluetooth-based mobile gateway that bridges the connection between a sensor network and the Internet. Our system enables ubiquitous health care experience while providing a platform for additional services such as alarms, notifications and analysis of medical data. Controlling a sensor network from the mobile gateway is also possible. The flexible design of the system does not restrict its usage only to health care services - the gateway can be configured to work with any kind of sensor network having a sink node with Bluetooth capability.
无处不在的医疗保健系统利用无线传感器节点的便携性和小尺寸的优势,提供远程医疗保健服务和实时健康监测。在本地传感器网络和远程数据使用者之间需要一个网关作为通信的中介。在目前普遍存在的医疗保健系统中,基于zigbee的传感器通常用于收集诸如ECG和心率等生命体征数据。将大量生命体征从基于ZigBee的传感器汇聚节点传输到网关需要ZigBee无法单独提供的带宽。在本文中,我们提出了一种基于蓝牙的移动网关的技术设计,它在传感器网络和互联网之间架起了桥梁。我们的系统可以实现无处不在的医疗保健体验,同时为警报、通知和医疗数据分析等附加服务提供平台。从移动网关控制传感器网络也是可能的。该系统灵活的设计并不局限于医疗保健服务——网关可以配置为与任何类型的传感器网络一起工作,这些传感器网络具有具有蓝牙功能的汇聚节点。
{"title":"Mobile Gateway for Ubiquitous Health Care System Using ZigBee and Bluetooth","authors":"T. Laine, Chaewoo Lee, Haejung Suk","doi":"10.1109/IMIS.2014.17","DOIUrl":"https://doi.org/10.1109/IMIS.2014.17","url":null,"abstract":"A ubiquitous health care system takes the advantage of portability and small size of wireless sensor nodes to provide remote health care services and real-time health monitoring. A gateway is needed to mediate communication between a local sensor network and remote data consumers. In current implementations of ubiquitous health care systems ZigBee-based sensors are often used to gather vital sign data such as ECG and heart rate. Transferring large quantities of vital signs from a ZigBee-based sensor sink node to a gateway requires a bandwidth that ZigBee alone is not able to provide. In this paper, we present a technical design of a Bluetooth-based mobile gateway that bridges the connection between a sensor network and the Internet. Our system enables ubiquitous health care experience while providing a platform for additional services such as alarms, notifications and analysis of medical data. Controlling a sensor network from the mobile gateway is also possible. The flexible design of the system does not restrict its usage only to health care services - the gateway can be configured to work with any kind of sensor network having a sink node with Bluetooth capability.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130938665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
The Effect of TDMA Frame Size and the Hidden Node Problem on the Performance of a Neighbor-Aware VANET MAC TDMA帧大小和隐节点问题对邻居感知VANET MAC性能的影响
M. J. Booysen, G. Rooyen
Despite various proposed Medium Access Control (MAC) approaches, efficient medium access in VANET remains a significant challenge for the broadcast of safety messages. A key contributing factor, especially with the high node mobility apparent in VANET, is the hidden terminal problem. Since the hidden terminal problem is fundamentally a problem of lack of awareness, increased neighbor awareness at the MAC layer has been suggested as a possible solution. An increased awareness of neighboring nodes' slot allocation requires an increased number of TDMA slots. In this paper we evaluate the impact of TDMA frame size in a neighbor-aware MAC. An analytical model is developed to support the simulation results, based on a geographical probability of RF interference and the slot allocation scheme used in the TDMA MAC. The results show that the packet delivery increases with increased TDMA frame size to support neighbor awareness, as the probability for packet collisions decrease. Packet delivery decreases with increases in neighbor count, since more nodes cause packet collisions. The receiver throughput initially increases as TDMA frame size is increased, since more transmission opportunities occur, and packet delivery increases. However, when the TDMA increases beyond an optimal, throughput is adversely affected by underutilization. Despite the decrease in packet delivery ratio, receiver throughput is higher for more nodes.
尽管提出了各种媒体访问控制(MAC)方法,但在VANET中有效的媒体访问仍然是安全信息广播的重大挑战。一个关键的影响因素,特别是在VANET中明显的高节点移动性,是隐藏的终端问题。由于隐藏终端问题本质上是一个缺乏感知的问题,因此建议在MAC层增加邻居感知作为一种可能的解决方案。增加对相邻节点槽分配的了解需要增加TDMA槽的数量。在本文中,我们评估了TDMA帧大小对邻居感知MAC的影响。基于射频干扰的地理概率和TDMA MAC中使用的插槽分配方案,开发了一个分析模型来支持仿真结果。结果表明,随着支持邻居感知的TDMA帧大小的增加,数据包的发送增加,因为数据包碰撞的概率降低。随着邻居数量的增加,数据包的发送会减少,因为更多的节点会导致数据包冲突。接收端吞吐量最初随着TDMA帧大小的增加而增加,因为出现了更多的传输机会,并且数据包的发送也增加了。然而,当TDMA增加到超过最佳时,吞吐量就会受到利用率不足的不利影响。尽管数据包传送率降低,但节点越多,接收端吞吐量就越高。
{"title":"The Effect of TDMA Frame Size and the Hidden Node Problem on the Performance of a Neighbor-Aware VANET MAC","authors":"M. J. Booysen, G. Rooyen","doi":"10.1109/IMIS.2014.40","DOIUrl":"https://doi.org/10.1109/IMIS.2014.40","url":null,"abstract":"Despite various proposed Medium Access Control (MAC) approaches, efficient medium access in VANET remains a significant challenge for the broadcast of safety messages. A key contributing factor, especially with the high node mobility apparent in VANET, is the hidden terminal problem. Since the hidden terminal problem is fundamentally a problem of lack of awareness, increased neighbor awareness at the MAC layer has been suggested as a possible solution. An increased awareness of neighboring nodes' slot allocation requires an increased number of TDMA slots. In this paper we evaluate the impact of TDMA frame size in a neighbor-aware MAC. An analytical model is developed to support the simulation results, based on a geographical probability of RF interference and the slot allocation scheme used in the TDMA MAC. The results show that the packet delivery increases with increased TDMA frame size to support neighbor awareness, as the probability for packet collisions decrease. Packet delivery decreases with increases in neighbor count, since more nodes cause packet collisions. The receiver throughput initially increases as TDMA frame size is increased, since more transmission opportunities occur, and packet delivery increases. However, when the TDMA increases beyond an optimal, throughput is adversely affected by underutilization. Despite the decrease in packet delivery ratio, receiver throughput is higher for more nodes.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132688128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Construction of Scholarly n-Gram from Huge Text Data 基于海量文本数据的学术n-Gram构建
Myunggwon Hwang, Ha-neul Yeom, Mi-Nyeong Hwang, Hanmin Jung
The ultimate goal of this research is to provide n-gram data that is specialized for scholarly utilization. To this end, this paper outlines the construction of a scholarly n-gram through the processing of large text documents. Many researchers, especially non-native English language speakers, find it difficult to construct sentences and paragraphs with appropriate and disambiguated words. One of the methods that can assist them is the provision of n-gram data. A representative n-gram known as Web 1T 5-Gram Version 1, which was constructed by processing virtually all documents retrieved using Google, already exists. However, this data contain unfocused word recommendations, therefore, they are not suitable. Consequently, we are constructing a scholarly n-gram. In this paper, we demonstrate the efficiency of n-gram using Web 1T unigram and introduce and discuss the specifics of our research plan related to scholarly n-gram.
本研究的最终目标是提供专门用于学术用途的n-gram数据。为此,本文概述了通过处理大型文本文档构建学术n-gram的方法。许多研究人员,特别是非英语母语人士,发现很难用合适的和消歧的词来构建句子和段落。可以帮助他们的方法之一是提供n-gram数据。一个具有代表性的n-gram(称为Web 1t5 -gram Version 1)已经存在,它是通过处理使用谷歌检索的几乎所有文档而构建的。然而,这些数据包含了没有重点的单词推荐,因此,它们不适合。因此,我们正在构建一个学术性的n图。在本文中,我们使用Web 1T图展示了n-gram的效率,并介绍和讨论了我们与学术n-gram相关的研究计划的细节。
{"title":"Construction of Scholarly n-Gram from Huge Text Data","authors":"Myunggwon Hwang, Ha-neul Yeom, Mi-Nyeong Hwang, Hanmin Jung","doi":"10.1109/IMIS.2014.4","DOIUrl":"https://doi.org/10.1109/IMIS.2014.4","url":null,"abstract":"The ultimate goal of this research is to provide n-gram data that is specialized for scholarly utilization. To this end, this paper outlines the construction of a scholarly n-gram through the processing of large text documents. Many researchers, especially non-native English language speakers, find it difficult to construct sentences and paragraphs with appropriate and disambiguated words. One of the methods that can assist them is the provision of n-gram data. A representative n-gram known as Web 1T 5-Gram Version 1, which was constructed by processing virtually all documents retrieved using Google, already exists. However, this data contain unfocused word recommendations, therefore, they are not suitable. Consequently, we are constructing a scholarly n-gram. In this paper, we demonstrate the efficiency of n-gram using Web 1T unigram and introduce and discuss the specifics of our research plan related to scholarly n-gram.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131842281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anonymous Authentication Scheme Based on Proxy Group Signature for Wireless MESH Network 基于代理组签名的无线MESH网络匿名认证方案
Tianhan Gao, Qidi Miao, Nan Guo
Wireless MESH Network (WMN) has become an important technology and has been widely deployed due to its simplicity, low cost, and flexibility in implementation. WMN is a wireless multi-hop network, therefore the privacy protection is extremely important. This paper proposes an anonymous access authentication scheme based on the proxy group signature. The scheme completely protects user's privacy during authentication. In order to improve the efficiency of our scheme, we further adopt certificate-based signature mechanism to design a highly efficient handover authentication protocol. Finally, we show the security analysis of our scheme.
无线MESH网络(Wireless MESH Network, WMN)以其简单、成本低、实现灵活等优点已成为一项重要的技术,并得到了广泛的应用。WMN是一种无线多跳网络,因此隐私保护非常重要。提出了一种基于代理组签名的匿名访问认证方案。该方案在认证过程中完全保护了用户的隐私。为了提高方案的效率,我们进一步采用基于证书的签名机制,设计了一个高效的移交认证协议。最后,对该方案进行了安全性分析。
{"title":"Anonymous Authentication Scheme Based on Proxy Group Signature for Wireless MESH Network","authors":"Tianhan Gao, Qidi Miao, Nan Guo","doi":"10.1109/IMIS.2014.78","DOIUrl":"https://doi.org/10.1109/IMIS.2014.78","url":null,"abstract":"Wireless MESH Network (WMN) has become an important technology and has been widely deployed due to its simplicity, low cost, and flexibility in implementation. WMN is a wireless multi-hop network, therefore the privacy protection is extremely important. This paper proposes an anonymous access authentication scheme based on the proxy group signature. The scheme completely protects user's privacy during authentication. In order to improve the efficiency of our scheme, we further adopt certificate-based signature mechanism to design a highly efficient handover authentication protocol. Finally, we show the security analysis of our scheme.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115198051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Energy Efficiency of Bandwidth Expansion Algorithms in Wireless Communication Systems 无线通信系统中带宽扩展算法的能量效率
Yung-Fa Huang, Chuan-Bi Lin, Chia-Chi Chang, Che-Hao Li, Ching-Mu Chen
In this paper, the effective bandwidth expansion schemes are investigated to improve the performance of energy efficiency for the Orthogonal Frequency Division Multiplexing (OFDM) wireless communication systems. Three Improved Energy Efficient Bandwidth Expansion (IEEBE) schemes are proposed to assign the available system bandwidth for users. With an exhausted method, the energy efficient Bandwidth Expansion Coefficient (BEC) can be found. Thus the energy efficient performance of the IEEBE is superior to the Same Bandwidth Expansion (SBE). Three methods of pairs, grouping and two-layer grouping are proposed to effectively find the BEC for users based on IEEBE. Simulation results show that two-layer grouping (TLG) outperforms the other two methods and improves Energy Reduction Factor (ERF) by 8.9 % to the SBE.
为了提高正交频分复用(OFDM)无线通信系统的能效性能,研究了有效的带宽扩展方案。提出了三种改进的能效带宽扩展(IEEBE)方案,为用户分配可用的系统带宽。利用一种耗尽法,可以求出节能的带宽膨胀系数(BEC)。因此,IEEBE的节能性能优于相同带宽扩展(SBE)。在IEEBE的基础上,提出了对、分组和二层分组三种有效的用户BEC查找方法。仿真结果表明,两层分组(TLG)优于其他两种方法,并将能量降低因子(ERF)提高了8.9%。
{"title":"Energy Efficiency of Bandwidth Expansion Algorithms in Wireless Communication Systems","authors":"Yung-Fa Huang, Chuan-Bi Lin, Chia-Chi Chang, Che-Hao Li, Ching-Mu Chen","doi":"10.1109/IMIS.2014.67","DOIUrl":"https://doi.org/10.1109/IMIS.2014.67","url":null,"abstract":"In this paper, the effective bandwidth expansion schemes are investigated to improve the performance of energy efficiency for the Orthogonal Frequency Division Multiplexing (OFDM) wireless communication systems. Three Improved Energy Efficient Bandwidth Expansion (IEEBE) schemes are proposed to assign the available system bandwidth for users. With an exhausted method, the energy efficient Bandwidth Expansion Coefficient (BEC) can be found. Thus the energy efficient performance of the IEEBE is superior to the Same Bandwidth Expansion (SBE). Three methods of pairs, grouping and two-layer grouping are proposed to effectively find the BEC for users based on IEEBE. Simulation results show that two-layer grouping (TLG) outperforms the other two methods and improves Energy Reduction Factor (ERF) by 8.9 % to the SBE.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115714729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Dissemination Analysis in Mobile Wireless Ad Hoc Networks Using Probabilistic Broadcast 基于概率广播的移动无线自组网传播分析
Daniel Gutiérrez-Reina, S. T. Marín, E. Asimakopoulou, N. Bessis, F. Barrero
Broadcast schemes play an important role in the performance of mobile ad hoc networks. They are widely used as a dissemination mechanism and as a part of the discovery phase of routing protocols. The simple flooding algorithm is the usual mechanism employed in mobile ad hoc networks, but it has been demonstrated its inefficiency in congested scenarios due to the high number of collisions and contentions. These problems can be partially alleviated by using a probabilistic broadcast scheme in which every node forwards the incoming packets according to a certain forwarding probability. In this paper we use the simple probabilistic broadcast scheme to evaluate the effects of congestion on the performance of broadcasting in ad hoc networks through a mediation analysis. We hypothesize that the congestion mediates in the relationship between the forwarding probability (independent variable) and the output metric (dependent variable). The simulation results prove the existence of the mediating effects and how such effects are counterbalanced depending on the target use of the probabilistic broadcast scheme.
广播方案对移动自组网的性能起着重要的作用。它们被广泛用作一种传播机制和路由协议发现阶段的一部分。简单的泛洪算法是移动自组织网络中常用的机制,但由于大量的碰撞和争用,它在拥塞场景下效率低下。采用概率广播方案,每个节点按照一定的转发概率转发进入的数据包,可以部分缓解这些问题。本文采用简单概率广播方案,通过中介分析来评估拥塞对自组织网络广播性能的影响。我们假设拥塞调解转发概率(自变量)和输出度量(因变量)之间的关系。仿真结果证明了中介效应的存在,以及这些中介效应是如何根据目标使用的概率广播方案来平衡的。
{"title":"A Dissemination Analysis in Mobile Wireless Ad Hoc Networks Using Probabilistic Broadcast","authors":"Daniel Gutiérrez-Reina, S. T. Marín, E. Asimakopoulou, N. Bessis, F. Barrero","doi":"10.1109/IMIS.2014.15","DOIUrl":"https://doi.org/10.1109/IMIS.2014.15","url":null,"abstract":"Broadcast schemes play an important role in the performance of mobile ad hoc networks. They are widely used as a dissemination mechanism and as a part of the discovery phase of routing protocols. The simple flooding algorithm is the usual mechanism employed in mobile ad hoc networks, but it has been demonstrated its inefficiency in congested scenarios due to the high number of collisions and contentions. These problems can be partially alleviated by using a probabilistic broadcast scheme in which every node forwards the incoming packets according to a certain forwarding probability. In this paper we use the simple probabilistic broadcast scheme to evaluate the effects of congestion on the performance of broadcasting in ad hoc networks through a mediation analysis. We hypothesize that the congestion mediates in the relationship between the forwarding probability (independent variable) and the output metric (dependent variable). The simulation results prove the existence of the mediating effects and how such effects are counterbalanced depending on the target use of the probabilistic broadcast scheme.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"430 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115933157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
New Privacy-Preserving Method for Matching Location Data 一种新的位置数据匹配隐私保护方法
Mebae Ushida, Yuji Yamaoka, Kouichi Itoh, H. Tsuda
The development of the GPS has recently increased the demand for the beneficial services from the mobile users' location data. If the location data are collected from various organizations, more beneficial services will be provided. However, the organizations are never able to share their location data, because they must avoid their users' privacy information leakage. Therefore, we propose a new system that (i) organizations transform the location data into secured location data that protects users' location information and send them to the third party called mediator and, (ii) the mediator provides beneficial services from the secured location data. We focus on the service that the mediator finds users who are nearby from all users over multiple organizations (one-to-many private location matching). In previous techniques, a user can judge another user (e.g., his/her friend) is close or not by using the secured location data (one-to-one private location matching). We also propose a new scheme that the mediator can perform one-to-many matching without users' privacy information leakage. Our scheme is the first result that realizes one-to-many matching without users' huge task and leaking their privacy.
近年来,全球定位系统(GPS)的发展对移动用户的位置数据的有益服务提出了更高的要求。如果从各个组织收集位置数据,将提供更有益的服务。然而,这些组织永远无法共享他们的位置数据,因为他们必须避免用户的隐私信息泄露。因此,我们提出了一个新的系统:(i)组织将位置数据转换为安全的位置数据,以保护用户的位置信息并将其发送给称为中介的第三方;(ii)中介从安全的位置数据中提供有益的服务。我们关注中介从多个组织的所有用户中查找附近用户的服务(一对多私有位置匹配)。在以前的技术中,用户可以通过使用安全位置数据(一对一私密位置匹配)来判断另一个用户(例如,他/她的朋友)是否接近。我们还提出了一种新的方案,即中介可以在不泄露用户隐私信息的情况下进行一对多匹配。我们的方案是第一个在不给用户带来巨大任务和不泄露用户隐私的情况下实现一对多匹配的结果。
{"title":"New Privacy-Preserving Method for Matching Location Data","authors":"Mebae Ushida, Yuji Yamaoka, Kouichi Itoh, H. Tsuda","doi":"10.1109/IMIS.2014.89","DOIUrl":"https://doi.org/10.1109/IMIS.2014.89","url":null,"abstract":"The development of the GPS has recently increased the demand for the beneficial services from the mobile users' location data. If the location data are collected from various organizations, more beneficial services will be provided. However, the organizations are never able to share their location data, because they must avoid their users' privacy information leakage. Therefore, we propose a new system that (i) organizations transform the location data into secured location data that protects users' location information and send them to the third party called mediator and, (ii) the mediator provides beneficial services from the secured location data. We focus on the service that the mediator finds users who are nearby from all users over multiple organizations (one-to-many private location matching). In previous techniques, a user can judge another user (e.g., his/her friend) is close or not by using the secured location data (one-to-one private location matching). We also propose a new scheme that the mediator can perform one-to-many matching without users' privacy information leakage. Our scheme is the first result that realizes one-to-many matching without users' huge task and leaking their privacy.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115976934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Minimum Cost Content Object Reconstruction in Multi-tier Servers 多层服务器中最小成本内容对象重构
Lung-Pin Chen, Chih-Wei Hsieh, Fang-Yie Leu
An Internet web application is comprised of dynamic web objects that are updated from time to time. This work investigates the placement of web objects over multi-tier servers in which each host can obtain an object by constructing locally, or via a network transmission from the upstream host. The cost of maintaining web objects consists of the computing resources used for constructing objects as well as the network bandwidth used for object delivery. This paper develops a new efficient algorithm to find the minimum cost object placement strategy.
Internet web应用程序由不时更新的动态web对象组成。这项工作研究了web对象在多层服务器上的放置,其中每个主机可以通过本地构建或通过来自上游主机的网络传输获得对象。维护web对象的成本包括用于构造对象的计算资源和用于对象交付的网络带宽。本文提出了一种新的高效算法来寻找成本最小的目标放置策略。
{"title":"Minimum Cost Content Object Reconstruction in Multi-tier Servers","authors":"Lung-Pin Chen, Chih-Wei Hsieh, Fang-Yie Leu","doi":"10.1109/IMIS.2014.76","DOIUrl":"https://doi.org/10.1109/IMIS.2014.76","url":null,"abstract":"An Internet web application is comprised of dynamic web objects that are updated from time to time. This work investigates the placement of web objects over multi-tier servers in which each host can obtain an object by constructing locally, or via a network transmission from the upstream host. The cost of maintaining web objects consists of the computing resources used for constructing objects as well as the network bandwidth used for object delivery. This paper develops a new efficient algorithm to find the minimum cost object placement strategy.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114646131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anonymous Credential-Based Privacy-Preserving Identity Verification for Business Processes 基于匿名凭证的业务流程隐私保护身份验证
Nan Guo, Y. Jin, Kangbin Yim
During the execution of a business process users need to be authenticated by multiple component service providers, while their identities need to be shared and propagated across multi-domain in a privacy-preserving fashion. An anonymous credential-based identity verification scheme is proposed to address privacy issue. Users establish trust relationship with the federation by running the enrollment protocol, which is based on zero-knowledge proof of a set of committed attributes. The IdP cannot learn identity-related information about the user. Anonymous credentials issued by the IdP allow users to selectively disclose attributes as required and prove them in an untraceable and unlinkable way, where the IdP cannot trace the showing of credential and component service providers cannot address multiple transactions to the same user even if they collude either. With the proposed attributes proof protocols, users can prove AND and OR relation over multiple attributes, and interval and inequality relation over a single attribute as well.
在执行业务流程期间,用户需要由多个组件服务提供者进行身份验证,而他们的身份需要以保护隐私的方式跨多域共享和传播。为了解决隐私问题,提出了一种基于匿名凭证的身份验证方案。用户通过运行注册协议与联盟建立信任关系,注册协议基于对一组已提交属性的零知识证明。IdP无法学习到用户的身份相关信息。由IdP发出的匿名凭证允许用户根据需要有选择地披露属性,并以一种不可追踪和不可链接的方式证明它们,在这种情况下,IdP无法跟踪凭证的显示,组件服务提供者也无法向同一用户处理多个事务,即使它们相互勾结也是如此。利用所提出的属性证明协议,用户可以在多个属性上证明与或关系,也可以在单个属性上证明间隔和不等式关系。
{"title":"Anonymous Credential-Based Privacy-Preserving Identity Verification for Business Processes","authors":"Nan Guo, Y. Jin, Kangbin Yim","doi":"10.1109/IMIS.2014.80","DOIUrl":"https://doi.org/10.1109/IMIS.2014.80","url":null,"abstract":"During the execution of a business process users need to be authenticated by multiple component service providers, while their identities need to be shared and propagated across multi-domain in a privacy-preserving fashion. An anonymous credential-based identity verification scheme is proposed to address privacy issue. Users establish trust relationship with the federation by running the enrollment protocol, which is based on zero-knowledge proof of a set of committed attributes. The IdP cannot learn identity-related information about the user. Anonymous credentials issued by the IdP allow users to selectively disclose attributes as required and prove them in an untraceable and unlinkable way, where the IdP cannot trace the showing of credential and component service providers cannot address multiple transactions to the same user even if they collude either. With the proposed attributes proof protocols, users can prove AND and OR relation over multiple attributes, and interval and inequality relation over a single attribute as well.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123596544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1