PBA: Prediction-Based Authentication for Vehicle-to-Vehicle Communications Abstract? In vehicular networks, broadcast communications are critically important, as many safety-related applications rely on single-hop beacon messages broadcast to neighbor vehicles. However, it becomes a challenging problem to design a broadcast authentication scheme for secure vehicle-to-vehicle communications. Especially when a large number of beacons arrive in a short…
Performance Modeling for Multipath Mobile Data Offloading in Cellular/WiFi Networks Abstract-With the proliferation of mobile devices in recent years, the volume of global mobile data traffic has grown exponentially. As a result, effective approaches for mobile data offloading are urgently required. In the past few years, two main WiFi offloading techniques, namely opportunistic offloading and…
Privacy-Preserving Ciphertext Multi-Sharing Control for Big Data Storage Abstract? Privacy-Preserving Ciphertext Multi-Sharing Control for Big Data Storage. The need of secure big data storage service is more desirable than ever to date. The basic requirement of the service is to guarantee the < Final Year Projects 2016 > confidentiality > of the data. However, the…
Privacy-Preserving Detection of Sensitive Data Exposure Abstract? Privacy-Preserving Detection of Sensitive Data Exposure. Statistics from security firms, research institutions and government organizations show that the number of data-leak instances have grown rapidly in recent years. Among various data-leak cases, human mistakes are one of the main causes of data loss. There exist solutions detecting inadvertent…
Private Searching on Streaming Data Based on Keyword Frequency Abstract?Private Searching on Streaming Data Based on Keyword Frequency. Private searching on streaming data is a process to dispatch to a public server a program, which searches streaming sources of data without revealing searching criteria and then sends back a buffer containing the findings. From an…
Providing Privacy-Aware Incentives in Mobile Sensing Systems Abstract? Providing Privacy-Aware Incentives in Mobile Sensing Systems. Mobile sensing relies on data contributed by users through their mobile device (e.g., smart phone) to obtain useful information about people and their surroundings. However, users may not want to contribute due to lack of incentives and concerns on possible…
Proximity-Aware Local-Recoding Anonymization with MapReduce for Scalable Big Data Privacy Preservation in Cloud Abstract? Cloud computing provides promising scalable IT infrastructure to support various processing of a variety of big data applications in sectors such as healthcare and business. Data sets like electronic health records in such applications often contain privacy-sensitive information, which brings about…
PUBLIC AUDITING OF DYNAMIC BIG DATA ON CLOUD STORAGE Abstract?PUBLIC AUDITING OF DYNAMIC BIG DATA ON CLOUD STORAGE. Cloud computing that provides elastic computing and storage resource on demand has become increasingly important due to the emergence of ?big data?. Cloud computing resources are a natural fit for processing big data streams as they…
PWDGR: Pair-Wise Directional Geographical Routing Based on Wireless Sensor Network Abstract? PWDGR: Pair-Wise Directional Geographical Routing Based on Wireless Sensor Network. Multipath routing in wireless multimedia sensor net-work makes it possible to transfer data simultaneously so as to reduce delay and congestion and it is worth researching. However, the current multipath routing strategy may cause…
Quality-Aware Subgraph Matching Over Inconsistent Probabilistic Graph Databases Abstract? Resource Description Framework (RDF) has been widely used in the SemanticWeb to describe resources and their relationships. The RDF graph is one of the most commonly used representations for RDF data. However, in many real applications such as the data extraction/integration, RDF graphs integrated from different…
RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks Abstract? RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks. Recently, several data aggregation schemes based on privacy homomorphism encryption have been proposed and investigated on wireless sensor networks. These data aggregation schemes provide better security compared with traditional aggregation…
Real-Time Scheduling with Security Enhancement for Packet Switched Networks Abstract? Real-time network applications depend on schedulers to guarantee the quality of service (QoS). Conventional real-time schedulers focus on the timing constraints but are much less effective in satisfying the security requirements. < Final Year Projects >In this paper, we propose an adaptive security-aware scheduling…