Location Based Services (LBS) expose user data to malicious attacks. Approaches, evolved, so far, for preserving privacy and security, suffer from one or more anomalies, and hence the problem of securing LBS data is far from being resolved. In particular, accuracy of results vs. privacy degree, privacy vs. performance, and trust between users are open problems. In this article, we present a novel approach by integration of peer-to-peer (P2P) with the caching technique and dummies from real queries. Our approach increases efficiency, leads to improved performance, and provides solutions to many problems that have existed in the past. In addition, we offer an improved way of managing cache. Simulation demonstrates superiority of our approach over earlier ones dealing with both the ratio of privacy and that of performance.
Thousands of people have lost their lives in stampedes and other crowd related disasters in recent years. Most of these fatalities seem to have been caused by poor control and management of crowds, which is discussed in this article. An efficient and effective crowd management system must also have a plan to deal with the ongoing threat of terrorism and outbreak of various kinds of communicable diseases. In this article, we present a framework of a Crowd Control and Health Management System specially designed to prevent and manage stampedes and other disasters. The system has two subsystems; one for dealing with the management of stampedes and other disasters and the other with healthcare management. As part of the proposed system, an algorithm for an early detection of stampedes, with proof and simulation of implementation, is provided. As part of the healthcare management subsystem, we integrate several mobile applications and develop four of them dealing with relief issues, blood donations, complaints and alerts, and utilizing mobile phones as a sensor device. Our system makes use of various kinds of wireless, mobile, and other technologies and tools including Fog Computing, Smart Phones, Smart Digital Street, IP-Cameras, Radio Frequency Identification (RFID), Voice Alarm, Light Alarm, and Global Positioning System (GPS). We compare merits and effectiveness of RFID and Wireless Sensor Networks (WSNs), as well as those of Cloud and Fog with a view of using them as part of the proposed framework. We also discuss applications of our systems in real-life cases of Hajj, an annual pilgrimage of millions of people to Mecca, and Kumbh Mela, a periodic gathering of tens of millions of people in India, both of which have accounted for the majority of fatalities in stampedes and other disasters.
Preservation of privacy of users’ personal data has always been a critical issue to deal with. This issue in the Internet of Things (IoT), which facilitates millions of applications, has become even more challenging. Currently, several approaches and methods are available to safeguard privacy but each of them suffers from one or more anomalies. In particular, Trusted Third-Party approach relies on the trust of a third-party server, Cooperation needs the trust of other peers, Obfuscation is known to return inaccurate results, and Dummy generates too much overhead. Moreover, these and most of the other well-known approaches deal only with specific types of applications linked to the location-based services. In this paper, we present two new methods, namely: Blind Third Party (BTP) and Blind Peers ( B L P ), and combine them to form a new one to be known as the Blind Approach ( B L A ). With the help of simulation results we shall demonstrate the effectiveness and superiority of B L A over the other available methods. The simulation results also exhibit that B L A is free from all the existing problems of the other approaches. However, B L A causes a slight increase in the average (response) time, which we consider to be a minor issue. We shall also discuss the capability and superiority of the Blind Approach in the cases of E-health, Smart Transportation, and Smart Home systems.
Connected vehicles and smart cars have become highly reliant on location-based services (i.e. LBS) to provide accurate, personalized and intelligent services. However, location-based services have endangered its users to considerable risks concerning the privacy and security of users' personal data. Although existing research provides a myriad of methods to improve and protect user privacy in LBS applications, most of these methods are concerned with handling static queries and non-mobile objects only. Moreover, various issues and challenges still persist with regards to the need to trust third parties, overloading of the user, and low accuracy of the returned results. This paper contributes a Double Obfuscation Approach (referred to as DOA) that applies two phases of obfuscation consecutively whilst integrating two differing privacy protection approaches, namely Obfuscation and Trusted Third Party, and two techniques, namely fog caching technology and mix zone. In essence, the DOA obfuscates and hides the identity and location of its users using the fog nodes, which operate as a trusted third party (TTP), and without the need to reveal the identity of the users or trust the cooperating nodes. Moreover, this paper presents a DOA algorithm that improves the overall user privacy and system performance using the fog nodes, which split the responses of each query into five parts, thus reducing the processing time of the results by the user and enhancing the overall accuracy where the user directly selects the most suitable parts based on his current location. Overall, the hybrid DOA approach empowers the users of connected vehicle applications to protect their privacy through an algorithm that caters for the dynamic nature of user queries and mobility of objects. The results of our comparative simulations against well-known hybrid privacy protection methods demonstrate the superiority of the proposed Double Obfuscation Approach especially with respect to user privacy whilst maintaining a nominal overhead on the user, reduced response time and high accuracy of the obtained results.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.