Efficient Collaborative Technique using Intrusion Detection System for Preserving Privacy in Location- based Services

نویسنده

  • Muhammad Jawad Ikram
چکیده

The ubiquitous nature of smartphones and GPSenabled devices, coupled with the increasingly popular usage of location-based services, has effectively created an environment where data access truly is anywhere at any time. While said environment is indeed convenient and quite useful, the unfortunate reality is that users are exposed to a variety of privacy and security threats. User location information can be tracked and then used in malicious ways by non-trusted applications and adversaries. We address this problem by proposing an efficient, collaborative technique that is integrated with an intrusion detection system and rekeying techniques. The algorithm is parameterized by defining performance and security metrics, which can then be used to find optimal settings, both in terms of privacy and quality of service. Based on the proposed performance-security metrics, the tradeoff between privacy and quality of service can be quantified.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Privacy-Preserving Distributed Event Corroboration

Privacy-Preserving Distributed Event Correlation Janak J. Parekh Event correlation is a widely-used data processing methodology, and is useful for the distributed monitoring of software faults and vulnerabilities. Most existing solutions have focused on “intra-organizational” correlation; organizations typically employ privacy policies that prohibit the exchange of information outside of the or...

متن کامل

Spamdoop: A privacy-preserving Big Data platform for collaborative spam detection

Spam has become the platform of choice used by cyber-criminals to spread malicious payloads such as viruses and trojans. In this paper, we consider the problem of early detection of spam campaigns. Collaborative spam detection techniques can deal with large scale e-mail data contributed by multiple sources; however, they have the well-known problem of requiring disclosure of e-mail content. Dis...

متن کامل

Privacy Preserving Architectures for Collaborative Intrusion Detection

Collaboration among multiple organizations is imperative for contemporary intrusion detection. As modern threats become well sophisticated it is difficult for organizations to defend with threat context local to their networks alone. Availability of global threat intelligence is must for organizations to defend against modern advanced persistent threats (APTs). In order to benefit from such glo...

متن کامل

Privacy-Preserving Distributed Event Correlation Thesis proposal

Event correlation is a widely-used data processing methodology for a broad variety of applications, and is especially useful in the context of distributed monitoring for software faults and vulnerabilities. However, most existing solutions have typically been focused on “intraorganizational” correlation; organizations typically employ privacy policies that prohibit the exchange of information o...

متن کامل

A Hybrid Framework for Building an Efficient Incremental Intrusion Detection System

In this paper, a boosting-based incremental hybrid intrusion detection system is introduced. This system combines incremental misuse detection and incremental anomaly detection. We use boosting ensemble of weak classifiers to implement misuse intrusion detection system. It can identify new classes types of intrusions that do not exist in the training dataset for incremental misuse detection. As...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015