Article
Computer Science, Information Systems
Shariq Bashir, Daphne Teck Ching Lai, Owais Ahmed Malik
Summary: Search engines store users' queries in a query log for personalized information retrieval. Private web search (PWS) is a technique that allows users to retrieve information without revealing their true search queries. This article proposes a new query obfuscation technique based on proxy terms, which can effectively protect users' privacy in web search.
Article
Computer Science, Information Systems
Shariq Bashir, Akmal Saeed Khattak
Summary: People use web search engines to retrieve information, but the query logs may pose privacy concerns. Private web search (PWS) schemes have been proposed to address this issue, but there is a lack of understanding on the characteristics that should be considered. This article introduces a novel PWS scheme and analyzes existing schemes based on these characteristics, revealing vulnerabilities in the current systems.
Article
Engineering, Electrical & Electronic
Fangwei Ye, Salim El Rouayheb
Summary: We investigate the problem of intermittent private information retrieval with multiple servers, where a user consecutively requests K messages from N replicated databases, with some requests requiring protection while others do not. To model the correlation between requests, we employ a Markov chain. We propose an intermittent private information retrieval scheme that combines an obfuscation scheme and a private information retrieval scheme to prevent leakage caused by temporal correlation.
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS
(2022)
Article
Computer Science, Hardware & Architecture
Nitish Uplavikar, Bradley A. Malin, Wei Jiang
Summary: Information retrieval is crucial in daily life, but current technologies like Apache Lucene may not suffice when dealing with protected or private information. Private information retrieval approaches aim to address this issue by allowing users to retrieve sensitive information without compromising privacy, although they may have limitations in information relevancy.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
(2021)
Article
Physics, Multidisciplinary
Murali Krishnan K. H., Jagadeesh Harshan
Summary: In this work, we consider the problem of Private Information Retrieval with Private Side Information (PIR-PSI) and propose XOR-based PIR-PSI codes as an alternative to MDS-based codes, offering lower complexity but slightly lower rate than the capacity setting. Nevertheless, we show that our code-rate is strictly higher than that of XOR-based codes for PIR with no side information, making it particularly useful when downloading a file privately after having downloaded other messages from the same database earlier.
Article
Computer Science, Theory & Methods
Yu-Guang Yang, Bing-Xin Liu, Guang-Bao Xu, Yi-Hua Zhou, Wei-Min Shi
Summary: This paper points out the symbol coincidence error in Khan et al.'s QAPIR protocol and provides an improvement on it. Finally, a practical QAPIR protocol based on quantum key distribution is proposed, and its performance under certain types of noise is analyzed. The security of the protocol is also proved in an active adversary scenario. Compared with Khan et al.'s protocol, our protocol is easier to implement under current technologies and can work over the noisy quantum channel, providing a practical way for QAPIR protocol designs.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
(2023)
Article
Computer Science, Information Systems
Irfan Ullah, Shah Khusro, Ibrar Ahmad
Summary: Social Book Search explores the impact of the Social Web on book retrieval by developing a stronger classical baseline and re-ranking search results using metadata features. The study finds that utilizing all topic fields in query formulation, incorporating user-generated content in search indexing, and re-ranking classical results can enhance relevance in book search. These findings have implications for information science, IR, and Interactive IR.
MULTIMEDIA TOOLS AND APPLICATIONS
(2021)
Article
Engineering, Electrical & Electronic
Mahdi Jafari Siavoshani, Seyed Pooya Shariatpanahi, Mohammad Ali Maddah-Ali
Summary: This study explores the issue of private information retrieval, where a user with private side information aims to retrieve multiple files from servers. Results indicate that in certain scenarios, the minimum load imposed by servers is equivalent to the capacity of a problem without PSI.
IEEE TRANSACTIONS ON COMMUNICATIONS
(2021)
Article
Engineering, Electrical & Electronic
Jinbao Zhu, Qifa Yan, Xiaohu Tang
Summary: This paper studies the problem of Multi-user Blind X-secure T-colluding Symmetric Private Information Retrieval from a Maximum Distance Separable (MDS) coded storage system. A scheme based on Lagrange encoding is proposed to achieve efficient retrieval and secrecy in the distributed system.
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS
(2022)
Article
Engineering, Electrical & Electronic
Sennur Ulukus, Salman Avestimehr, Michael Gastpar, Syed A. Jafar, Ravi Tandon, Chao Tian
Summary: This article discusses privacy protection in cyberspace, focusing on information retrieval, distributed computing, and distributed learning. It presents problems, solutions, and breakthroughs in each field. The article also explores the interconnections between these topics and raises some open questions.
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS
(2022)
Article
Computer Science, Theory & Methods
Julien Lavauzelle, Razane Tajeddine, Ragnar Freij-Hollanti, Camilla Hollanti
Summary: A private information retrieval (PIR) scheme allows users to retrieve files from a database without revealing any information, and schemes have been proposed for various storage systems. However, research on PIR schemes using regenerating codes is limited. Regenerating codes enable efficient storage, low-bandwidth retrieval of files, and repair of nodes.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
(2021)
Article
Engineering, Electrical & Electronic
Hyowoon Seo, Kyungrak Son, Sangjun Park, Wan Choi
Summary: This paper introduces a novel communication-efficient and privacy-protecting framework called crowded information acquisition (CIA) for protecting clients' privacy when requesting datasets from data servers. The results show that a large number of clients demanding private services can enhance privacy protection, provide low latency services, and generate a small amount of traffic, contrary to conventional beliefs.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
(2021)
Article
Engineering, Electrical & Electronic
Sarah A. Obead, Hsuan-Yin Lin, Eirik Rosnes, Jorg Kliewer
Summary: Private computation is a generalization of the private information retrieval (PIR) problem, where a user wishes to compute a function of messages stored in coded databases without revealing any information. This paper focuses on the problem of private linear computation (PLC) in a distributed storage system using linear storage codes. An outer bound on the PLC rate is derived, and a matching PLC scheme is presented for a specific class of linear storage codes.
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS
(2022)
Article
Computer Science, Theory & Methods
Sarah A. Obead, Hsuan-Yin Lin, Eirik Rosnes, Jorg Kliewer
Summary: This paper investigates the problem of private polynomial computation in a distributed storage system. Two novel computation schemes are proposed, leveraging Lagrange encoding and linear storage codes. The systematic scheme shows significantly better computation retrieval rate in asymptotic scenarios.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
(2022)
Article
Computer Science, Information Systems
Mohib Ullah, Rafiullah Khan, Muhammad Inam Ul Haq, Atif Khan, Wael Alosaimi, Muhammad Irfan Uddin, Abdullah Alharbi
Summary: The paper introduces a multi-group distributed privacy-preserving protocol (MG-OSLo) to evaluate the impact of group size and count on user privacy. Experimental results show that MG-OSLo outperforms other protocols in user privacy protection.
Article
Computer Science, Information Systems
Alexandre Viejo, David Sanchez
Article
Computer Science, Hardware & Architecture
M. Magdalena Payeras-Capella, Macia Mut-Puigserver, Pau Conejero-Alberola, Jordi Castella-Roca, Llorenc Huguet-Rotger
Article
Computer Science, Theory & Methods
Alexandre Viejo, David Sanchez
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2020)
Article
Chemistry, Multidisciplinary
David Sanchez, Alexandre Viejo, Montserrat Batet
Summary: This paper introduces a system that can automatically assess the compliance of privacy policies and provide clear and intuitive privacy scores to users. By using this system, users can understand the risks and severity associated with services, enabling them to make informed decisions. The proposed method has been applied to the policies of 10 well-known internet services, with results consistent with related works.
APPLIED SCIENCES-BASEL
(2021)
Article
Computer Science, Artificial Intelligence
Mercedes Rodriguez-Garcia, Montserrat Batet, David Sanchez, Alexandre Viejo
Summary: This paper proposes a semantically grounded method to generate fake queries for better privacy protection, satisfying user requirements while reducing the number of fake queries necessary. The approach offers more control and greater efficiency in protecting user profiles in front of search engines.
KNOWLEDGE AND INFORMATION SYSTEMS
(2021)
Article
Engineering, Civil
Caries Angles-Tafalla, Alexandre Viejo, Jordi Castella-Roca, Macia Mut-Puigserver, M. Magdalena Payeras-Capellae
Summary: This paper proposes a new scheme for managing low emission zones by decentralizing the management of vehicle access and charging, protecting user privacy, and improving system security and availability.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
(2023)
Proceedings Paper
Computer Science, Information Systems
Cristofol Dauden-Esmel, Jordi Castella-Roca, Alexandre Viejo, Josep Domingo-Ferrer
Summary: In this paper, a lightweight blockchain-based GDPR-compliant personal data management platform is proposed. It provides public access to immutable evidences that demonstrate the agreements between Data Subjects and Service Providers. This platform allows Service Providers to show compliance with regulations, while also enabling Data Subjects to be informed about the handling of their personal data and manage it according to their rights.
2021 IEEE 5TH INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY (ICCSP)
(2021)
Article
Computer Science, Information Systems
David Pamies-Estrems, Jordi Castella-Roca, Joaquin Garcia-Alfaro
Proceedings Paper
Computer Science, Theory & Methods
Carles Angles-Tafalla, Sara Ricci, Petr Dzurenda, Jan Hajny, Jordi Castella-Roca, Alexandre Viejo
PROCEEDINGS OF THE 16TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS, VOL 2: SECRYPT
(2019)
Proceedings Paper
Computer Science, Theory & Methods
David Pamies-Estrems, Nesrine Kaaniche, Maryline Laurent, Jordi Castella-Roca, Joaquin Garcia-Alfaro
DATA PRIVACY MANAGEMENT, CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY
(2018)
Proceedings Paper
Transportation Science & Technology
Ana C. Hernandez, Jordi Castella Roca, Alexandre Viejo
2018 IEEE 88TH VEHICULAR TECHNOLOGY CONFERENCE (VTC-FALL)
(2018)
Article
Computer Science, Hardware & Architecture
Xiaolin Gu, Wenjia Wu, Yusen Zhou, Aibo Song, Ming Yang, Zhen Ling, Junzhou Luo
Summary: This study proposes a radio frequency fingerprint identification solution based on crystal oscillator temperature adjustment, which enhances the differences between Wi-Fi device fingerprints and mitigates collision. Experimental results demonstrate the effectiveness of the system in identifying smartphones under different scenarios.
Article
Computer Science, Hardware & Architecture
Yutong Wu, Jianyue Zhu, Xiao Chen, Yu Zhang, Yao Shi, Yaqin Xie
Summary: This paper proposes a quality-of-service-based SIC order method and optimizes power allocation for maximizing the rate in the uplink NOMA system. The simulation results demonstrate the superiority of the proposed method compared to traditional orthogonal multiple access and exhaustive search.
Article
Computer Science, Hardware & Architecture
Songshi Dou, Li Qi, Zehua Guo
Summary: Emerging cloud services and applications have different QoS requirements for the network. SD-WANs play a crucial role in QoS provisioning by introducing network programmability, dynamic flow routing, and low data transmission latency. However, controller failures may degrade QoS. To address this, we propose PREDATOR, a QoS-aware network programmability recovery scheme that achieves fine-grained per-flow remapping without introducing extra delays, ensuring QoS robustness for high-priority flows.
Article
Computer Science, Hardware & Architecture
Ke Wang, Xiaojuan Ma, Heng Kang, Zheng Lyu, Baorui Feng, Wenliang Lin, Zhongliang Deng, Yun Zou
Summary: This paper proposes a method based on a parallel network simulation architecture to improve the simulation efficiency of satellite networks. By effectively partitioning the network topology and using algorithms such as resource assessment and load balancing, the simulation performance is enhanced. Experimental results demonstrate the effectiveness of this method.
Article
Computer Science, Hardware & Architecture
Sijin Yang, Lei Zhuang, Julong Lan, Jianhui Zhang, Bingkui Li
Summary: This paper proposes a reuse-based online scheduling mechanism that achieves deterministic transmission of dynamic flows through dynamic path planning and coordinated scheduling of time slots. Experimental results show that the proposed mechanism improves the scheduling success rate by 37.3% and reduces time costs by up to 66.6% compared to existing online scheduling algorithms.