Learn More
Traditionally, pollution measurements are performed using expensive equipment at fixed locations or dedicated mobile equipment laboratories. This is a coarse-grained and expensive approach where the pollution measurements are few and far in-between. In this paper, we present a vehicular-based mobile approach for measuring fine-grained air quality in(More)
To support privacy-aware management of data in social spaces, the user personal data needs to be stored at each user device, and shared only with a trusted subset of other users. To date, social spaces only have fairly limited access control capabilities, that do not protect the possibly sensitive data of the users. In this demonstration, we showcase our(More)
Deterministic Approach • Goal: verify each tuple has been assigned to the nearest centroid • Brute-force approach: for each tuple, compute its distance to all cluster centroids. • Our approach: for each tuple, compute its distance to all of its Voronoi centroid neighbors. • Service provider (server)-provides storage and computational power as the service. •(More)
Data publishing has generated much concern on individual privacy. Recent work has focused on different background knowledge and their various threats to the privacy of published data. However, there still exist a few types of adversary knowledge waiting to be investigated. In this paper, I explain my research on privacy-preserving data publishing (PPDP) by(More)
a r t i c l e i n f o a b s t r a c t Data publishing has generated much concern on individual privacy. Recent work has shown that different background knowledge can bring various threats to the privacy of published data. In this paper, we study the privacy threat from the full functional dependency (FFD) that is used as part of adversary knowledge. We show(More)
The wireless data collected in mobile environments provides tremendous opportunities to build new applications in various domains such as Vehicular Ad Hoc Networks and mobile social networks. Storing the data decentralized in wireless devices brings major advantages over centralized ones. In this work, to facilitate effective access control of the wireless(More)
We study the privacy threat by publishing data that contains full functional dependencies (FFDs). We show that the cross-attribute correlations by FFDs can bring potential vulnerability to privacy. Unfortunately, none of the existing anonymization principles can effectively prevent against the FFD-based privacy attack. In this paper, we formalize the(More)
QoS-aware service composition problem has been drawn great attentions in recent years. As an NP-hard problem, high time complexity is inevitable if global optimization algorithms (such as integer programming) were adopted. Researchers applied various evolutionary algorithms to decrease the time complexity by looking for near optimum solution. However, each(More)
The intent of peer data management systems (PDMS) is to share as much data as possible. However, in many applications leverag-ing sensitive data, users demand adequate mechanisms to restrict the access to authorized parties. In this paper, we study a distributed access control model, where data items are stored, queried and authenticated in a totally(More)