The Experts below are selected from a list of 4032 Experts worldwide ranked by ideXlab platform
I. Baumgart - One of the best experts on this subject based on the ideXlab platform.
-
Privacy-aware smart metering: A survey
IEEE Communications Surveys and Tutorials, 2015Co-Authors: Sören Finster, I. BaumgartAbstract:The increasing share of renewables creates new challenges for the existing electrical grid. To deal with these challenges, various efforts are being made to transform the existing power grid into a so-called smart grid. Part of this process is the deployment of an advanced metering infrastructure, which provides novel high-frequency two-way communication between consumers and producers. But as useful as the access to high-frequency measurements may be for energy suppliers, this also poses a major threat to the Privacy of the customers. In this survey we present approaches to the Problem of customer Privacy-protection in the smart grid. We show that the Privacy Problem in smart grids can be further divided into the Problems metering for billing and metering for operations. For each of these Problems we identify generic approaches to solve them.
Sören Finster - One of the best experts on this subject based on the ideXlab platform.
-
Privacy-aware smart metering: A survey
IEEE Communications Surveys and Tutorials, 2015Co-Authors: Sören Finster, I. BaumgartAbstract:The increasing share of renewables creates new challenges for the existing electrical grid. To deal with these challenges, various efforts are being made to transform the existing power grid into a so-called smart grid. Part of this process is the deployment of an advanced metering infrastructure, which provides novel high-frequency two-way communication between consumers and producers. But as useful as the access to high-frequency measurements may be for energy suppliers, this also poses a major threat to the Privacy of the customers. In this survey we present approaches to the Problem of customer Privacy-protection in the smart grid. We show that the Privacy Problem in smart grids can be further divided into the Problems metering for billing and metering for operations. For each of these Problems we identify generic approaches to solve them.
Nobuo Kawaguchi - One of the best experts on this subject based on the ideXlab platform.
-
ICMU - Privacy protection in WiFi-based location estimation
2014 Seventh International Conference on Mobile Computing and Ubiquitous Networking (ICMU), 2014Co-Authors: Zuotao Peng, Katsuhiko Kaji, Nobuo KawaguchiAbstract:In recent years, along with the spread of WiFi-based location estimation service, the Privacy Problem has been pointed out. For existing WiFi-based location estimation service, users' traces and position information can be obtained fraudulently. Personal Privacy may be compromised. This research proposes an algorithm that determines the reliability of the user by considering the probability of both spatial and temporal to resolve the Privacy Problem in WiFi-based location estimation. Meanwhile, we are operating a portal Locky.jp on location estimation using WiFi. Based on the actual data of base stations stored in the Locky.jp database, we confirm this algorithm. As a result, the percentage of returning position for Privacy invasion data and whole data (Privacy invasion data is also included) are about 20% and 55% respectively. In summary, we know that this algorithm reduced the Privacy invasion to about 20% in the WiFi-based location estimation system.
-
Privacy protection in WiFi-based location estimation
2014 Seventh International Conference on Mobile Computing and Ubiquitous Networking (ICMU), 2014Co-Authors: Zuotao Peng, Katsuhiko Kaji, Nobuo KawaguchiAbstract:In recent years, along with the spread of WiFi-based location estimation service, the Privacy Problem has been pointed out. For existing WiFi-based location estimation service, users' traces and position information can be obtained fraudulently. Personal Privacy may be compromised. This research proposes an algorithm that determines the reliability of the user by considering the probability of both spatial and temporal to resolve the Privacy Problem in WiFi-based location estimation. Meanwhile, we are operating a portal Locky.jp on location estimation using WiFi. Based on the actual data of base stations stored in the Locky.jp database, we confirm this algorithm. As a result, the percentage of returning position for Privacy invasion data and whole data (Privacy invasion data is also included) are about 20% and 55% respectively. In summary, we know that this algorithm reduced the Privacy invasion to about 20% in the WiFi-based location estimation system.
Abderrahim Benslimane - One of the best experts on this subject based on the ideXlab platform.
-
On Location-Privacy in Opportunistic Mobile Networks, A Survey
Journal of Network and Computer Applications, 2017Co-Authors: Sameh Zakhary, Abderrahim BenslimaneAbstract:Abstract In recent years, networked devices spread into different activities in our daily lives enabling many innovative applications. These applications were not only computationally-intelligent on their own, but also enabled collection and sharing of users' information via opportunistic and pervasive communications. This omnipresence of devices capable of continuously tracking sensitive contexts and whereabouts raised users' concerns about their own Privacy. In this paper, we present a survey of Privacy-protection solutions proposed for Opportunistic Networks. Firstly, we provide a detailed study of the Privacy Problem and major Privacy-related attacks. Secondly, we present contemporary research efforts aiming to protect users' Privacy with special focus on location-Privacy Problem, while discussing the applicability of each solution in Opportunistic Networks (OppNet). Thirdly, a taxonomy of Privacy-preserving approaches is proposed showing the major trends in addressing this challenging Problem. A systematic evaluation of the advantages and disadvantages is presented. Using this study, we present various design space elements (criteria and factors) required to successfully offer better location-Privacy. Moreover, we propose a unified framework that addresses these design space elements while enabling opportunistic communications between users. To illustrate our purpose, we apply this framework to a protocol that offers location-Privacy through obfuscation in mobile opportunistic networks. This illustration shows the feasibility and effectiveness of our proposed framework. We explore key design space elements: criteria (such as scalability) and factors (such as social-awareness of ties, and location-awareness) to achieve the highest possible Privacy level under different network conditions and nodes' requirements.
Andrew M Odlyzko - One of the best experts on this subject based on the ideXlab platform.
-
the unsolvable Privacy Problem and its implications for security technologies
Australasian Conference on Information Security and Privacy, 2003Co-Authors: Andrew M OdlyzkoAbstract:Privacy presents many puzzles. In particular, why is it eroding, given the high value people assign to their Privacy? This extended abstract argues that there are strong incentives for decreasing Privacy, rooted in the economic benefits of price discrimination. As a result, the Privacy Problem is unsolvable. The conflict between incentives to price discriminate and the public dislike of this practice will influence what security technologies are likely to succeed.
-
ACISP - The unsolvable Privacy Problem and its implications for security technologies
Information Security and Privacy, 2003Co-Authors: Andrew M OdlyzkoAbstract:Privacy presents many puzzles. In particular, why is it eroding, given the high value people assign to their Privacy? This extended abstract argues that there are strong incentives for decreasing Privacy, rooted in the economic benefits of price discrimination. As a result, the Privacy Problem is unsolvable. The conflict between incentives to price discriminate and the public dislike of this practice will influence what security technologies are likely to succeed.