Explore chapters and articles related to this topic
Privacy-Preserving Techniques for the 5G-Enabled Location-Based Services
Published in Yulei Wu, Haojun Huang, Cheng-Xiang Wang, Yi Pan, 5G-Enabled Internet of Things, 2019
Chen Wang, Ping Zhao, Haojun Huang, Rui Zhang, Weixing Zhu
Pseudonym is used to prevent the LBS server from mapping a specific user’s LBS queries to the user by replacing the user’s identity information with pseudonyms [43]. So, Pseudonym mainly protects the query privacy of users. Thus, when a user applies for an LBS with Pseudonym, even though attackers can obtain the locations of the users, they cannot recognize the identity of the users corresponding to their locations directly. However, using only Pseudonym cannot provide enough protection level for query privacy. It is very easy for attackers to infer the true identity of users with some background knowledge. Even though frequently changing the pseudonym, attackers can still continuously track the user through an identity match attack model, thus invalidating the role of Pseudonym. So, a more effective technique called Mix Zone has been proposed. Levente et al. [44] divides the road network into the observed zone and the unobserved zone, which functions as a mix zone. The identity of vehicles in the observed zone are visible, whereas it is invisible in the unobserved zone, and vehicles mix and change pseudonyms within this zone, making it difficult for attackers to associate the pseudonyms used by a specific vehicle before entering and or after exiting this zone. So, the mix zone is more suitable for services that need to track a user’s movement like Vehicle Ad hoc Networks (VANETs). Furthermore, it can be used in the continuous-query scenarios according to some modified version, which will be described in detail in Section 13.7.1. Somehow, mix zone can improve the effectiveness of changing a pseudonym, but weaknesses still exist: (1) mix zone is dependent on the third-party anonymity server, (2) mix zone fails to provide query service for users who locate in the mix zone such that the QoS of the system is degraded.
Electricity and Hardware Resource Consumption in Cryptocurrency Mining
Published in Sarvesh Tanwar, Sumit Badotra, Ajay Rana, Machine Learning, Blockchain, and Cyber Security in Smart Environments, 2023
Lokesh Gundaboina, Sumit Badotra, Gaurav Malik, Vishal Jain
Private and secure. Data protection has always been a serious challenge for cryptocurrencies. The blockchain ledger is predicated on extraordinary mathematical puzzles which require decoding [17]. This makes a cryptocurrency safer than normal digital exchanges. Pseudonyms are used to protect identities.
Forms of environmental support: The roles that contemporary outpatient oncology settings play in shaping patient experience
Published in Building Research & Information, 2023
The targeted population was adult cancer patients (18 and over), currently receiving infusion-based cancer treatment (e.g. chemotherapy) in outpatient or day-therapy units. Participants were endorsed by the treating team to ensure their physical and mental capacity to participate. The recruitment of patients followed number of strategies, involving the nursing team and treating doctors, in order to recruit a sample set of patients with relative interest in the study. This, as per a phenomenological approach, is important to maximize the potential to achieve thorough descriptions of the lived experience under investigation (Ritchie et al., 2013; Seamon, 2000). A number of participants were also directly approached using a convenient sampling strategy, during their waiting time, contributing further breadth to the study. In total, 18 patients or former patients participated in this study, of which three were accompanied by family members who contributed occasionally to the discussion and their comments reported, as appropriate. Table 1 represents information about the participating patients including basic demographic data accompanied by reporting of interview date, location, length, and method of approaching patients. Pseudonyms are used to protect participants privacy.
Everything changes to stay the same: persistent global health inequalities amidst new therapeutic opportunities and mobilities for Filipino nurses
Published in Mobilities, 2019
This paper is based on data gained from semi-structured interviews conducted in the Philippines between June and December 2015 with nurse graduates living in Metro Manila, the Philippines. In total, I spoke with 35 nurse graduates, 14 of whom are men. The graduates were recruited via a Facebook Page which asked for ‘nurse graduates’ regardless of migratory plans, and via subsequent snowballing. The graduates were all aged 21–45, with most in their late 20s or early 30s. Only two, Erin and Sofia, have experience of nursing employment overseas, and both spent less than 12 months abroad. Interviews were carried out in English, the language of instruction for nursing in the Philippines, by the author and recorded using a Dictaphone. Pseudonyms are used to protect participants’ anonymity. I transcribed interviews verbatim and coded according to emerging themes within a grounded theory approach. My codes represent themes and issues which emerged from the data, rather than from academic concepts.
The influence of organic urban morphologies on opportunities for home-based businesses within inner-city districts in Hanoi, Vietnam
Published in Journal of Urban Design, 2019
Ha Minh Hai Thai, Quentin Stevens, Judy Rogers
To reveal the link between HBB locations and their proximity to local main streets, data were analyzed from 50 in-depth interviews with the HBB owners, as well as survey sketches of their live/work spaces. Pseudonyms are used to maintain the anonymity of participants. Actual street names are reported to provide context. Participants were recruited from randomly-chosen main streets, alleyways and laneways, using the following criteria: