Privacy protected data forwarding in human associated delay tolerant networks

Gao, Longxiang, Li, Ming, Zhou, Wanlei and Shi, Wen 2013, Privacy protected data forwarding in human associated delay tolerant networks, in TrustCom 2013 : Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, IEEE Computer Society, Piscataway, N.J., pp. 586-593.

Attached Files
Name Description MIMEType Size Downloads

Title Privacy protected data forwarding in human associated delay tolerant networks
Author(s) Gao, Longxiang
Li, Ming
Zhou, Wanlei
Shi, Wen
Conference name IEEE Trust, Security and Privacy in Computing and Communications. Conference (12th : 2013 : Melbourne, Vic)
Conference location Melbourne, Vic.
Conference dates 16-18 Jul. 2013
Title of proceedings TrustCom 2013 : Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
Editor(s) [Unknown]
Publication date 2013
Conference series IEEE International Conference on Trust, Security and Privacy in Computing and Communications
Start page 586
End page 593
Total pages 8
Publisher IEEE Computer Society
Place of publication Piscataway, N.J.
Keyword(s) delay-tolerant network
privacy
Summary Human associated delay-tolerant networks (HDTNs) are new networks for DTNs, where mobile devices are associated with humans and demonstrate social related communication characteristics. As most of recent works use real social trace files to study the date forwarding in HDTNs, the privacy protection becomes a serious issue. Traditional privacy protections need to keep the attributes semantics, such as data mining and information retrieval. However, in HDTNs, it is not necessary to keep these meaningful semantics. In this paper, instead, we propose to anonymize the original data by coding to preserve individual's privacy and apply Privacy Protected Data Forwarding (PPDF) model to select the top N nodes to perform the multicast. We use both MIT Reality and Infocom 06 datasets, which are human associated mobile network trace file, to simulate our model. The results of our simulations show that this method can achieve a high data forwarding performance while protect the nodes' privacy as well.
ISBN 9780769550220
Language eng
Field of Research 089999 Information and Computing Sciences not elsewhere classified
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category E1 Full written paper - refereed
ERA Research output type E Conference publication
HERDC collection year 2013
Copyright notice ©2013, IEEE
Persistent URL http://hdl.handle.net/10536/DRO/DU:30061001

Document type: Conference Paper
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Access Statistics: 17 Abstract Views, 3 File Downloads  -  Detailed Statistics
Created: Fri, 21 Feb 2014, 12:16:30 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.