Search results

1 – 4 of 4
Article
Publication date: 1 June 2015

Wilson Abel Alberto Torres, Nandita Bhattacharjee and Bala Srinivasan

The purpose of this paper is to determine the effectiveness of using fully homomorphic encryption (FHE) to preserve the privacy of biometric data in an authentication system…

1364

Abstract

Purpose

The purpose of this paper is to determine the effectiveness of using fully homomorphic encryption (FHE) to preserve the privacy of biometric data in an authentication system. Biometrics offers higher accuracy for personal recognition than traditional methods because of its properties. Biometric data are permanently linked with an individual and cannot be revoked or cancelled, especially when biometric data are compromised, leading to privacy issues.

Design/methodology/approach

By reviewing current approaches, FHE is considered as a promising solution for the privacy issue because of its ability to perform computations in the encrypted domain. The authors studied the effectiveness of FHE in biometric authentication systems. In doing so, the authors undertake the study by implementing a protocol for biometric authentication system using iris.

Findings

The security analysis of the implementation scheme demonstrates the effectiveness of FHE to protect the privacy of biometric data, as unlimited operations can be performed in the encrypted domain, and the FHE secret key is not shared with any other party during the authentication protocol.

Research limitations/implications

The use of malicious model in the design of the authentication protocol to improve the privacy, packing methods and use of low-level programming language to enhance performance of the system needs to be further investigated.

Originality/value

The main contributions of this paper are the implementation of a privacy-preserving iris biometric authentication protocol adapted to lattice-based FHE and a sound security analysis of authentication and privacy.

Details

International Journal of Pervasive Computing and Communications, vol. 11 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Book part
Publication date: 26 January 2011

Michael R. Edelstein

In this chapter, the post-disaster handling of the British Petroleum Oil Spill in the Gulf of Mexico is analyzed according to the concept of “Public Reserve.” Public Reserve…

Abstract

In this chapter, the post-disaster handling of the British Petroleum Oil Spill in the Gulf of Mexico is analyzed according to the concept of “Public Reserve.” Public Reserve extends the theory of privacy from the individual into the context of corporate behavior and environmental regulation and management by government. Secrecy is viewed as a form of privacy.

Details

Government Secrecy
Type: Book
ISBN: 978-0-85724-390-4

Keywords

Article
Publication date: 2 March 2012

Johye Hwang, So‐Yeon Yoon and Lawrence J. Bendle

Recognizing that crowding in a restaurant waiting area forms a first impression of service and sets service expectations, the purpose of this study is to investigate the impact of…

4852

Abstract

Purpose

Recognizing that crowding in a restaurant waiting area forms a first impression of service and sets service expectations, the purpose of this study is to investigate the impact of crowding in the effective control of the waiting environment. The study seeks to examine the impact of crowding on customers' emotions and approach‐avoidance responses and to examine the mediating role of emotion and the moderating role of desired privacy in the relationship between crowding and approach‐avoidance responses.

Design/methodology/approach

Using real‐scale, interactive virtual reality (VR) technology that allows high‐fidelity representations of real environments, the authors created a navigable, photo‐realistic three‐dimensional model of a restaurant waiting area. Through an experimental study which manipulated crowding levels in the VR restaurant, they surveyed the subjects' responses toward crowding conditions.

Findings

The study found significant effects of crowding on emotions including arousal and dominance, but not pleasure, and on approach‐avoidance responses. The impact of crowding on approach‐avoidance responses was more direct than indirect, without having emotion as a mediator. It was also found that the desire for privacy as a psychological trait moderated the relationship between crowding and affiliation.

Practical implications

The findings of this study offer restaurant managers insights toward the effective management of the pre‐process service environment during the waiting state that minimizes the negative consequences of waiting/crowding. This study provides three courses of management actions that can make unavoidable crowding in the restaurant waiting situation more enjoyable and comfortable.

Originality/value

By using VR simulation, this study adds a new approach for crowding studies. Theoretically, this study broadened the scope of crowding studies by adding a potential mediating variable, emotions, and a moderating variable, desired privacy, in examining the relationship between crowding and approach‐avoidance responses. Also, by focusing on a restaurant waiting area, the authors were able to explore the pre‐process service expectations.

Details

International Journal of Contemporary Hospitality Management, vol. 24 no. 2
Type: Research Article
ISSN: 0959-6119

Keywords

Article
Publication date: 5 May 2020

Rashmi Gupta, Martin Crane and Cathal Gurrin

The continuous advancements in wearable sensing technologies enable the easy collection and publishing of visual lifelog data. The widespread adaptation of visual lifelog…

278

Abstract

Purpose

The continuous advancements in wearable sensing technologies enable the easy collection and publishing of visual lifelog data. The widespread adaptation of visual lifelog technologies would have the potential to pose challenges for ensuring the personal privacy of subjects and bystanders in lifelog data. This paper presents preliminary findings from a study of lifeloggers with the aim of better understanding their concerns regarding privacy in lifelog data.

Design/methodology/approach

In this study, we have collected a visual dataset of 64,837 images from 25 lifelogging participants over a period of two days each, and we conducted an interactive session (face to face conversation) with each participant in order to capture their concerns when sharing the lifelog data across three specified categories (i.e. Private (Only for Me), Semi-Private (Family/Friends) and Public).

Findings

In general, we found that participants tend to err on the side of conservative privacy settings and that there is a noticeable difference in what different participants are willing to share. In summary, we found that the categories of images that the participants wished to be kept private included personally identifiable information and professional information; categories of images that could be shared with family/friends include family moments or content related to daily routine lifestyle, and other visual lifelog data could potentially be made public).

Originality/value

We analysed the potential differences in the willingness of 25 participants to share data. In addition, reasons for being a volunteer to collect lifelog data and how the lifelogging device affected the lifestyle of the lifelogger are analysed. Based on the findings of this study, we propose a set of challenges for the anonymisation of lifelog data that should be solved when supporting lifelog data sharing.

Details

Online Information Review, vol. 45 no. 2
Type: Research Article
ISSN: 1468-4527

Keywords

1 – 4 of 4