Privacy-Preserving Adaptive Multi-Channel Communications Under Timing Constraints

被引:7
|
作者
Gai, Keke [1 ]
Qiu, Meikang [1 ,2 ]
Zhao, Hui [3 ]
Dai, Wenyun [1 ]
机构
[1] Pace Univ, Dept Comp Sci, New York, NY 10038 USA
[2] Shenzhen Univ, Coll Comp Sci, Shenzhen, Peoples R China
[3] Henan Univ, Software Sch, Kaifeng 475000, Henan, Peoples R China
关键词
Privacy protection; multi-channel communication; timing constraint; big data; smart computing;
D O I
10.1109/SmartCloud.2016.50
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Currently, privacy leakage has become a great concern when a web-based application is applied. The threats deriving from communications are generally caused by implementing lower-level security protocols. However, using a higher-level privacy protection approach is often restricted by the efficiency requirements, since an enhanced security level needs a longer execution time than the approach offering a lower-level privacy protection. This work focuses on this issue and proposes a new approach that provides an adaptive multi-channel communications solution. The proposed approach is called Dynamic Multi-Channel Communications (DMC2) model, which is designed to dynamically determine the transport layer protocols in terms of the timing constraints. We consider four contemporary deployed protocol types the optional channels and our method can produce optimal solutions to maximizing the privacy level. Our experimental evaluations have examined the performance of DMC2, which demonstrates its privacy protection capability and the adaptability.
引用
收藏
页码:190 / 195
页数:6
相关论文
共 50 条
  • [21] Privacy-Preserving Trust Management For Vehicular Communications and Federated Learning
    Byun, SangHyun
    Sarker, Arijet
    Lew, Ken
    Kalita, Jugal
    Chang, Sang-Yoon
    2023 SILICON VALLEY CYBERSECURITY CONFERENCE, SVCC, 2023,
  • [22] An Efficient Threshold Anonymous Authentication Scheme for Privacy-Preserving Communications
    Ren, Jian
    Harn, Lein
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2013, 12 (03) : 1018 - 1025
  • [23] Efficient privacy-preserving authentication protocol for vehicular communications with trustworthy
    Xiong, Hu
    Chen, Zhong
    Li, Fagen
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (12) : 1441 - 1451
  • [24] Reliable Privacy-Preserving Communications for Wireless Ad Hoc Networks
    Koh, Jing Yang
    Teo, Joseph Chee Ming
    Leong, Derek
    Wong, Wai-Choong
    2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2015, : 6271 - 6276
  • [25] Binary mechanisms under privacy-preserving noise
    Pourbabaee, Farzad
    Echenique, Federico
    JOURNAL OF ECONOMIC THEORY, 2025, 224
  • [26] Privacy-Preserving Clustering for Multi-dimensional Data Randomization Under LDP
    Kikuchi, Hiroaki
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP SEC 2023, 2024, 679 : 15 - 29
  • [27] PolyRhythm: Adaptive Tuning of a Multi-Channel Attack Template for Timing Interference
    Li, Ao
    Sudvarg, Marion
    Liu, Han
    Yu, Zhiyuan
    Gill, Chris
    Zhang, Ning
    2022 IEEE 43RD REAL-TIME SYSTEMS SYMPOSIUM (RTSS 2022), 2022, : 225 - 239
  • [28] A Privacy-Preserving Caching Scheme for Device-to-Device Communications
    Zhong, Yuqing
    Li, Zhaohua
    Liao, Liping
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [29] Homomorphic Cryptography-Based Privacy-Preserving Network Communications
    Guellier, Antoine
    Bidan, Christophe
    Prigent, Nicolas
    APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY, ATIS 2014, 2014, 490 : 159 - 170
  • [30] TPRou: A Privacy-Preserving Routing for Payment Channel Networks
    Bao, Zijian
    Wang, Qinghao
    Zhang, Yongxin
    Lei, Hong
    Shi, Wenbo
    COMPUTER SECURITY - ESORICS 2021, PT II, 2021, 12973 : 764 - 769