Redirigiendo al acceso original de articulo en 20 segundos...
ARTÍCULO
TITULO

Privacy Aware Monitoring of Mobile Users in Sensor Networks Environment

Balaso Jagdale    
Jagdish Bakal    

Resumen

Abstract?Due to complex monitoring systems in various business domains, secrecy and privacy has become critical issue for movable resources including human being. In a mobile object monitoring systems, balancing computing resources and quality of privacy is required.  Objects can be mobile devices or users or any other moving entity. This work is presented in wireless sensor network environment. Earlier work does not consider presence of mobile objects in 3D space. We can observe that objects also carry Z axis in city area where high rise buildings are present.  Earlier monitoring applications are mainly designed in two dimensional space to protect privacy. Our novelty is to suggest and design mechanism that reflect Z position (height) of mobile objects for protecting privacy. While calculating cloaking area and counting of objects, height is also considered as third dimension. This results in better location privacy as compared to the privacy delivered by the scheme that considers two dimensional space. We have presented performance, communications cost and privacy strength of modified 3D quality algorithm and 3D resource algorithm. Moreover, we present novel containment resolution algorithm that handles duplicate counting due to 3D presence of wireless system and mobile devices.

 Artículos similares

       
 
Addi Ait-Mlouk, Sadi A. Alawadi, Salman Toor and Andreas Hellander    
Machine reading comprehension (MRC) of text data is a challenging task in Natural Language Processing (NLP), with a lot of ongoing research fueled by the release of the Stanford Question Answering Dataset (SQuAD) and Conversational Question Answering (Co... ver más
Revista: Applied Sciences

 
Elena Fedorchenko, Evgenia Novikova and Anton Shulepov    
In order to provide an accurate and timely response to different types of the attacks, intrusion and anomaly detection systems collect and analyze a lot of data that may include personal and other sensitive data. These systems could be considered a sourc... ver más
Revista: Algorithms

 
Erasmo Purificato, Sabine Wehnert and Ernesto William De Luca    
In the age of digital information, where the internet and social networks, as well as personalised systems, have become an integral part of everyone?s life, it is often challenging to be aware of the amount of data produced daily and, unfortunately, of t... ver más
Revista: Computers

 
Cori Faklaris, Francesco Cafaro, Asa Blevins, Matthew A. O?Haver and Neha Singhal    
With the advent of mobile apps such as Periscope, Facebook Live, and now TikTok, live-streaming video has become a commonplace form of social computing. It has not been clear, however, to what extent the current ubiquity of smartphones is impacting this ... ver más
Revista: Informatics

 
Sara Larno,Ville Seppänen,Jarkko Nurmi     Pág. 57 - 71
Organizations need to consider many facets of information security in their daily operations ? among others, the rapidly increasing use of IT, emerging technologies and digitalization of organizations? core resources provoke new threats that can be diffi... ver más