Privacy-Preserving Adaptive Multi-Channel Communications Under Timing Constraints

被引:7
|
作者
Gai, Keke [1 ]
Qiu, Meikang [1 ,2 ]
Zhao, Hui [3 ]
Dai, Wenyun [1 ]
机构
[1] Pace Univ, Dept Comp Sci, New York, NY 10038 USA
[2] Shenzhen Univ, Coll Comp Sci, Shenzhen, Peoples R China
[3] Henan Univ, Software Sch, Kaifeng 475000, Henan, Peoples R China
关键词
Privacy protection; multi-channel communication; timing constraint; big data; smart computing;
D O I
10.1109/SmartCloud.2016.50
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Currently, privacy leakage has become a great concern when a web-based application is applied. The threats deriving from communications are generally caused by implementing lower-level security protocols. However, using a higher-level privacy protection approach is often restricted by the efficiency requirements, since an enhanced security level needs a longer execution time than the approach offering a lower-level privacy protection. This work focuses on this issue and proposes a new approach that provides an adaptive multi-channel communications solution. The proposed approach is called Dynamic Multi-Channel Communications (DMC2) model, which is designed to dynamically determine the transport layer protocols in terms of the timing constraints. We consider four contemporary deployed protocol types the optional channels and our method can produce optimal solutions to maximizing the privacy level. Our experimental evaluations have examined the performance of DMC2, which demonstrates its privacy protection capability and the adaptability.
引用
收藏
页码:190 / 195
页数:6
相关论文
共 50 条
  • [41] Privacy-preserving vertically partitioned linear program with nonnegativity constraints
    Haohao Li
    Zhiyi Tan
    Wei Li
    Optimization Letters, 2013, 7 : 1725 - 1731
  • [42] Privacy-preserving horizontally partitioned linear programs with inequality constraints
    Wei Li
    Haohao Li
    Chongyang Deng
    Optimization Letters, 2013, 7 : 137 - 144
  • [43] Privacy-Preserving Consensus of Double-Integrator Multi-Agent Systems With Input Constraints
    Deng, Qingyun
    Liu, Kexin
    Zhang, Yinyan
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE, 2024, 8 (06): : 4119 - 4129
  • [44] Privacy-preserving horizontally partitioned linear programs with inequality constraints
    Li, Wei
    Li, Haohao
    Deng, Chongyang
    OPTIMIZATION LETTERS, 2013, 7 (01) : 137 - 144
  • [45] Privacy-preserving vertically partitioned linear program with nonnegativity constraints
    Li, Haohao
    Tan, Zhiyi
    Li, Wei
    OPTIMIZATION LETTERS, 2013, 7 (08) : 1725 - 1731
  • [46] Delay-aware privacy-preserving location-based services under spatiotemporal constraints
    Shahid, Abdur R.
    Pissinou, Niki
    Iyengar, S. S.
    Makki, Kia
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2021, 34 (01)
  • [47] Development of multi-channel timing generator
    Xu, Ruinian
    Zhang, Jidong
    Wang, Wenfeng
    Li, Deming
    He Jishu/Nuclear Techniques, 2005, 28 (03): : 169 - 172
  • [48] Privacy-Preserving Genomic Statistical Analysis Under Local Differential Privacy
    Yamamoto, Akito
    Shibuya, Tetsuo
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXXVII, DBSEC 2023, 2023, 13942 : 40 - 48
  • [49] Privacy-preserving multi-criteria collaborative filtering
    Yargic, Alper
    Bilge, Alper
    INFORMATION PROCESSING & MANAGEMENT, 2019, 56 (03) : 994 - 1009
  • [50] VALNET: Privacy-preserving multi-path validation
    Sengupta, Binanda
    COMPUTER NETWORKS, 2022, 204