Mid Sweden University

miun.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Sensor application privacy and security
Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Technology and Media. (STC)
2010 (English)Licentiate thesis, comprehensive summary (Other academic)
Place, publisher, year, edition, pages
Sundsvall: Mid Sweden University , 2010. , p. 67
Series
Mid Sweden University licentiate thesis, ISSN 1652-8948 ; 52
National Category
Computer Engineering
Identifiers
URN: urn:nbn:se:miun:diva-12978ISBN: 978-91-86694-10-4 (print)OAI: oai:DiVA.org:miun-12978DiVA, id: diva2:387524
Supervisors
Available from: 2011-01-14 Created: 2011-01-14 Last updated: 2025-09-25Bibliographically approved
List of papers
1. ID management among clouds
Open this publication in new window or tab >>ID management among clouds
2009 (English)In: 2009 1st International Conference on Future Information Networks, ICFIN 2009, IEEE conference proceedings, 2009, p. 237-241Conference paper, Published paper (Refereed)
Abstract [en]

In the following years, the desktop-based applications will be changed to cloud computing gradually. Since all users' profile and context data will be stored on the service supplier side based on their ID. ID is becoming a security bottleneck: attackers can trace all other information via user ID. Increasingly, a simple service may be involved in a chain of service clouds; each cloud is able to access data in its cloud without the control of any technology. With ID and password cross utilization in clear text, leakage of ID profile and password in one cloud may propagate to the whole cloud chain. Without proper protection, the success of cloud computing will be threatened by ID privacy leakage. In this paper, privacy preserved ID profile utilizing protocol (PPID) is proposed to prevent this privacy flaw. PPID together with its extension ID anonymity protocol (IDA) separate ID and services. With these two protocols, threaten from crash of whole cloud chain caused by ID privacy leakage is minimized.

Place, publisher, year, edition, pages
IEEE conference proceedings, 2009
National Category
Computer Sciences
Identifiers
urn:nbn:se:miun:diva-10888 (URN)10.1109/ICFIN.2009.5339583 (DOI)000291324500046 ()2-s2.0-72049120733 (Scopus ID)978-1-4244-5158-6 (ISBN)
Conference
2009 1st International Conference on Future Information Networks, ICFIN 2009; Beijing; 14 October 2009 through 17 October 2009
Note

Article number 5339583

Available from: 2010-01-07 Created: 2010-01-07 Last updated: 2025-09-25Bibliographically approved
2. Privacy of Value-Added Context-Aware Service Cloud
Open this publication in new window or tab >>Privacy of Value-Added Context-Aware Service Cloud
Show others...
2009 (English)In: Lecture notes in computer science Volume 5931, Springer, 2009, Vol. 5931, p. 547-552Conference paper, Published paper (Refereed)
Abstract [en]

In the cloud computing era, service provider cloud and context service cloud store all your personal context data. This is a positive aspect for value-added context-aware service cloud as it makes that context information collection are easier than was the case previously. However, this computing environment does add a series of threats in relation to privacy protection. Whoever receives the context information is able to deduce the status of the owners and, generally owners are not happy to share this information. In this paper, we propose a privacy preserved framework which can be utilized by value-added context-aware service cloud. Context data and related services access privileges are determined by context-aware role-based access control (CRAC) extended from role-based access control (RAC). Privacy preserved context service protocol (PPCS) is designed to protect user privacy from exposed context information. Additionally, user network and information diffusion is combined to evaluate the privacy protection effect.

Place, publisher, year, edition, pages
Springer, 2009
Series
Lecture notes in computer science, ISSN 0302-9743 ; 5931
Keywords
Cloud computing; Privacy
National Category
Computer Engineering
Identifiers
urn:nbn:se:miun:diva-11097 (URN)10.1007/978-3-642-10665-1 (DOI)000280118000049 ()2-s2.0-71749111158 (Scopus ID)978-364210664-4 (ISBN)
Conference
1st International Conference on Cloud Computing, CloudCom 2009; Beijing; 1 December 2009 through 4 December 2009; Code 78880
Available from: 2010-01-14 Created: 2010-01-14 Last updated: 2025-09-25Bibliographically approved
3. Outer System Flow Privacy Protection
Open this publication in new window or tab >>Outer System Flow Privacy Protection
2010 (English)In: 2010 IEEE International Systems Conference Proceedings, SysCon 2010, IEEE conference proceedings, 2010, p. 117-120Conference paper, Published paper (Refereed)
Abstract [en]

Nowadays, social networks, information networks and technological networks have already become main media of information publication and exchange. Meanwhile, the information diffusion in these networks is well studied. However, most privacy protection technologies, e.g., access control, have not considered the influence of these networks systematically. In this paper, a concept of outer system flow privacy control is proposed. In addition, system privacy requirements are reconsidered. Furthermore, in user case, role base access control (RBAC) is analyzed and improved based on the outer system flow control

Place, publisher, year, edition, pages
IEEE conference proceedings, 2010
Keywords
Complex network; Privacy
National Category
Computer Engineering
Identifiers
urn:nbn:se:miun:diva-11098 (URN)10.1109/SYSTEMS.2010.5482484 (DOI)2-s2.0-77954429454 (Scopus ID)978-1-4244-5882-0 (ISBN)
Conference
4th International Systems Conference, SysCon 2010; San Diego, CA; 5 April 2010 through 8 April 2010; Category number CFP10SYT-CDR; Code 80932
Available from: 2010-01-14 Created: 2010-01-14 Last updated: 2025-09-25Bibliographically approved
4. Sensor Aided Authentication
Open this publication in new window or tab >>Sensor Aided Authentication
Show others...
2010 (English)In: Communications in Computer and Information Science Volume 76 CCIS, 2010, Springer, 2010, p. 265-277Conference paper, Published paper (Refereed)
Abstract [en]

The sharing of sensor data globally becomes possible by the development of wireless sensor network, cloud computing, and other related technologies. These new trends can also benefit information security. In this paper, the sensor data is involved in the authentication procedure which is one main component of security systems. Sensor aided password is proposed. In addition, the architecture for sensor aided authentication corresponding to the simple authentication scenario is also designed. Sensor data aided password generation and utilization bring convenience to users without weakening the password strength.

Place, publisher, year, edition, pages
Springer, 2010
Series
Communications in Computer and Information Science, ISSN 1865-0929 ; 76
Keywords
authentication; password; Sensor
National Category
Computer Sciences
Identifiers
urn:nbn:se:miun:diva-11479 (URN)10.1007/978-3-642-13365-7_26 (DOI)000289176900026 ()2-s2.0-77957949035 (Scopus ID)3642133649 (ISBN)978-364213364-0 (ISBN)
Conference
4th International Conference on Information Security and Assurance, ISA 2010; Miyazaki; 23 June 2010 through 25 June 2010; Code 81893
Projects
STCSensible Reality
Available from: 2010-05-03 Created: 2010-05-03 Last updated: 2025-09-25Bibliographically approved
5. Privacy and Security Aware Home Sensor System
Open this publication in new window or tab >>Privacy and Security Aware Home Sensor System
2010 (English)In: 2010 Cross-Strait Conference on Information Science and Technology, CSCIST 2010, Qinghuangdao, China, July, 2010, Scientific Research Publishing, 2010Conference paper, Published paper (Refereed)
Place, publisher, year, edition, pages
Scientific Research Publishing, 2010
National Category
Computer Sciences
Identifiers
urn:nbn:se:miun:diva-12808 (URN)
Available from: 2010-12-15 Created: 2010-12-15 Last updated: 2025-09-25Bibliographically approved
6. Privacy for mHealth Presence
Open this publication in new window or tab >>Privacy for mHealth Presence
2010 (English)In: International Journal of Next-Generation Networks, ISSN 0975-7252, E-ISSN 0975-7023, Vol. 2, no 4, p. 33-44Article in journal (Refereed) Published
Abstract [en]

mHealth data provision focuses on providing health services to patients via mobile devices and presence technologies. It has great influence to the healthcare business today, especially in the developing countries. However, the mHealth presence might be sensitive; and it brings potential privacy issues. For controlling what presence information can be given to which watcher, and when in mHealth presence service, XML Configuration Access Protocol (XCAP) is introduced. Nevertheless, it is not enough if only XCAP is applied. It just controls the direct privacy leakage; indirect flow might still leak the privacy information. Thus, presence authorization policy and privacy filter, which are components of XCAP, are improved based on k-anonymity for stopping indirect privacy leakage.

National Category
Computer Engineering
Identifiers
urn:nbn:se:miun:diva-12936 (URN)10.5121/ijngn.2010.2403 (DOI)
Available from: 2011-01-07 Created: 2011-01-07 Last updated: 2025-09-25Bibliographically approved

Open Access in DiVA

No full text in DiVA

Authority records

Huang, Xin

Search in DiVA

By author/editor
Huang, Xin
By organisation
Department of Information Technology and Media
Computer Engineering

Search outside of DiVA

GoogleGoogle Scholar

isbn
urn-nbn

Altmetric score

isbn
urn-nbn
Total: 1587 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf