SlideShare a Scribd company logo
1 of 10
University of Piraeus
      Department of Digital Systems

Post graduate Programme in Digital Systems
                 Security

              Master Thesis

Privacy Techniques in Fourth Generation
        Heterogeneous Networks

                         Dimitris Gkikakis

           Supervising Professor: Christos Xenakis
Contents
 Problem
 Related
 Scope
 Requirements
 Proposed Architecture
 Proposed Signaling
 Evaluation




                          2
Problem
 Plethora of data for internet services
 Data mining techniques
 Credit card information exposed
 Smartphone era




                                           3
Related
 PETs
 E-commerce
 LBSs




               4
Scope
 A model that could be deployed in the
  current & future mobile networks
 Privacy
 E-commerce
 Security




                                          5
Requirements
 Privacy
    Pseudonymity
    Unlinkability
    Traceability
 Trust
    Based on existing Trust relationship
 Security
    Confidentiality
    Integrity
    Authenticity
 Business Model                            6
    Micropayments
Architecture




               7
DB entries




             8
Signaling




            9
Evaluation
 High level of Privacy
 High level of Security
 Ease of deployment
 Financial transactions without exposing
 personal information
 New IP address allocation for each
 connection
 Insider threat




                                       10

More Related Content

What's hot

Hierarchical long short term memory network for cyberattack detection
Hierarchical long short term memory network for cyberattack detectionHierarchical long short term memory network for cyberattack detection
Hierarchical long short term memory network for cyberattack detectionShakas Technologies
 
Steven Leahy_IT 543_Unit 1 Assignment
Steven Leahy_IT 543_Unit 1 AssignmentSteven Leahy_IT 543_Unit 1 Assignment
Steven Leahy_IT 543_Unit 1 AssignmentSteven Leahy
 
Ip securtiy ppt N.PRAMEELA II MSC COMPUTER SCIENCE BON SECOUR
Ip securtiy ppt N.PRAMEELA II MSC COMPUTER SCIENCE BON SECOURIp securtiy ppt N.PRAMEELA II MSC COMPUTER SCIENCE BON SECOUR
Ip securtiy ppt N.PRAMEELA II MSC COMPUTER SCIENCE BON SECOURprameelapramee
 
Cryptography and attacks ins
Cryptography and attacks insCryptography and attacks ins
Cryptography and attacks insAstha Parihar
 
Enabling privacy and_traceability_in_supply_chains_using_blockchain_and_zero_...
Enabling privacy and_traceability_in_supply_chains_using_blockchain_and_zero_...Enabling privacy and_traceability_in_supply_chains_using_blockchain_and_zero_...
Enabling privacy and_traceability_in_supply_chains_using_blockchain_and_zero_...Cláudia Alves
 
JPJ1449 Efficient Authentication for Mobile and Pervasive Computing
JPJ1449 Efficient Authentication for Mobile and Pervasive ComputingJPJ1449 Efficient Authentication for Mobile and Pervasive Computing
JPJ1449 Efficient Authentication for Mobile and Pervasive Computingchennaijp
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographyAdri Jovin
 
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATA
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATAA QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATA
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATAijcisjournal
 
Futuristic data mining technologies for cyber security
Futuristic data mining technologies for cyber securityFuturistic data mining technologies for cyber security
Futuristic data mining technologies for cyber securityPankaj Choudhary
 
fundamental of network security
fundamental of network securityfundamental of network security
fundamental of network securityManish Tiwari
 
02 fundamental aspects of security
02 fundamental aspects of security02 fundamental aspects of security
02 fundamental aspects of securityGemy Chan
 
Cryptoandnetworksecuritylitreview
CryptoandnetworksecuritylitreviewCryptoandnetworksecuritylitreview
CryptoandnetworksecuritylitreviewFaith Nweke
 
The design and implementation of intelligent campus security tracking system ...
The design and implementation of intelligent campus security tracking system ...The design and implementation of intelligent campus security tracking system ...
The design and implementation of intelligent campus security tracking system ...impulsetechembedded12
 
WAR OVER THE INTERNET - FBI Cyber Crime Event
WAR OVER THE INTERNET - FBI Cyber Crime EventWAR OVER THE INTERNET - FBI Cyber Crime Event
WAR OVER THE INTERNET - FBI Cyber Crime Eventmsharbuno
 
Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber securityzaarahary
 
Using signcryption to protect biometric information
Using signcryption to protect biometric information Using signcryption to protect biometric information
Using signcryption to protect biometric information Phil Griffin
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security ArchitectureBharathiKrishna6
 

What's hot (20)

Hierarchical long short term memory network for cyberattack detection
Hierarchical long short term memory network for cyberattack detectionHierarchical long short term memory network for cyberattack detection
Hierarchical long short term memory network for cyberattack detection
 
Steven Leahy_IT 543_Unit 1 Assignment
Steven Leahy_IT 543_Unit 1 AssignmentSteven Leahy_IT 543_Unit 1 Assignment
Steven Leahy_IT 543_Unit 1 Assignment
 
Ip securtiy ppt N.PRAMEELA II MSC COMPUTER SCIENCE BON SECOUR
Ip securtiy ppt N.PRAMEELA II MSC COMPUTER SCIENCE BON SECOURIp securtiy ppt N.PRAMEELA II MSC COMPUTER SCIENCE BON SECOUR
Ip securtiy ppt N.PRAMEELA II MSC COMPUTER SCIENCE BON SECOUR
 
Cryptography and attacks ins
Cryptography and attacks insCryptography and attacks ins
Cryptography and attacks ins
 
Enabling privacy and_traceability_in_supply_chains_using_blockchain_and_zero_...
Enabling privacy and_traceability_in_supply_chains_using_blockchain_and_zero_...Enabling privacy and_traceability_in_supply_chains_using_blockchain_and_zero_...
Enabling privacy and_traceability_in_supply_chains_using_blockchain_and_zero_...
 
JPJ1449 Efficient Authentication for Mobile and Pervasive Computing
JPJ1449 Efficient Authentication for Mobile and Pervasive ComputingJPJ1449 Efficient Authentication for Mobile and Pervasive Computing
JPJ1449 Efficient Authentication for Mobile and Pervasive Computing
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATA
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATAA QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATA
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATA
 
Ieee 2014 projects
Ieee 2014 projectsIeee 2014 projects
Ieee 2014 projects
 
Futuristic data mining technologies for cyber security
Futuristic data mining technologies for cyber securityFuturistic data mining technologies for cyber security
Futuristic data mining technologies for cyber security
 
fundamental of network security
fundamental of network securityfundamental of network security
fundamental of network security
 
End end-security
End end-securityEnd end-security
End end-security
 
02 fundamental aspects of security
02 fundamental aspects of security02 fundamental aspects of security
02 fundamental aspects of security
 
Cryptoandnetworksecuritylitreview
CryptoandnetworksecuritylitreviewCryptoandnetworksecuritylitreview
Cryptoandnetworksecuritylitreview
 
The design and implementation of intelligent campus security tracking system ...
The design and implementation of intelligent campus security tracking system ...The design and implementation of intelligent campus security tracking system ...
The design and implementation of intelligent campus security tracking system ...
 
CRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITYCRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITY
 
WAR OVER THE INTERNET - FBI Cyber Crime Event
WAR OVER THE INTERNET - FBI Cyber Crime EventWAR OVER THE INTERNET - FBI Cyber Crime Event
WAR OVER THE INTERNET - FBI Cyber Crime Event
 
Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber security
 
Using signcryption to protect biometric information
Using signcryption to protect biometric information Using signcryption to protect biometric information
Using signcryption to protect biometric information
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
 

Viewers also liked

69023141 gk-seminar-hk-arthur-china
69023141 gk-seminar-hk-arthur-china69023141 gk-seminar-hk-arthur-china
69023141 gk-seminar-hk-arthur-chinasinocismblog
 
Susie West Top Ten To Ensuring eInvoicing Success
Susie West Top Ten To Ensuring eInvoicing SuccessSusie West Top Ten To Ensuring eInvoicing Success
Susie West Top Ten To Ensuring eInvoicing Successsharedserviceslink.com
 
RedTech Advisors On Sina Weibo Regulatory Risk And Censorship
RedTech Advisors On Sina Weibo Regulatory Risk And CensorshipRedTech Advisors On Sina Weibo Regulatory Risk And Censorship
RedTech Advisors On Sina Weibo Regulatory Risk And Censorshipsinocismblog
 
Literatuuronderzoek Il En Generatie
Literatuuronderzoek Il En GeneratieLiteratuuronderzoek Il En Generatie
Literatuuronderzoek Il En GeneratieImke Limpens
 
Literatuuronderzoek Il En Cultuurverschillen
Literatuuronderzoek Il En CultuurverschillenLiteratuuronderzoek Il En Cultuurverschillen
Literatuuronderzoek Il En CultuurverschillenImke Limpens
 
Together, We Can Achieve More
Together, We Can Achieve MoreTogether, We Can Achieve More
Together, We Can Achieve Morekennyneill
 
What to ask when buying e-invoicing – the 7 truths to getting it right and wh...
What to ask when buying e-invoicing – the 7 truths to getting it right and wh...What to ask when buying e-invoicing – the 7 truths to getting it right and wh...
What to ask when buying e-invoicing – the 7 truths to getting it right and wh...sharedserviceslink.com
 
How Finance Can Really Change Behaviour Of Procurement
How Finance Can Really Change Behaviour Of ProcurementHow Finance Can Really Change Behaviour Of Procurement
How Finance Can Really Change Behaviour Of Procurementsharedserviceslink.com
 
China Politics 2.0
China Politics 2.0China Politics 2.0
China Politics 2.0sinocismblog
 
Expert C Kurt Zatloukal 16 Dec 09 Ok
Expert C Kurt Zatloukal 16 Dec 09 OkExpert C Kurt Zatloukal 16 Dec 09 Ok
Expert C Kurt Zatloukal 16 Dec 09 Okguest80d4e3cc
 
Pastoral Counseling
Pastoral CounselingPastoral Counseling
Pastoral Counselingguestf334fc
 
Content and Distribution: The Hub of Your Online Efforts
Content and Distribution: The Hub of Your Online EffortsContent and Distribution: The Hub of Your Online Efforts
Content and Distribution: The Hub of Your Online EffortsWill Davis
 
AMA Baltimore - Building Your Content Marketing Plan
AMA Baltimore - Building Your Content Marketing PlanAMA Baltimore - Building Your Content Marketing Plan
AMA Baltimore - Building Your Content Marketing PlanWill Davis
 
ΠΟΛΙΤΙΚΗ ΑΣΦΑΛΕΙΑΣ ΣΤΗΝ ΗΛΕΚΤΡΟΝΙΚΗ ΣΥΝΤΑΓΟΓΡΑΦΗΣΗ
ΠΟΛΙΤΙΚΗ ΑΣΦΑΛΕΙΑΣ ΣΤΗΝ ΗΛΕΚΤΡΟΝΙΚΗ ΣΥΝΤΑΓΟΓΡΑΦΗΣΗ ΠΟΛΙΤΙΚΗ ΑΣΦΑΛΕΙΑΣ ΣΤΗΝ ΗΛΕΚΤΡΟΝΙΚΗ ΣΥΝΤΑΓΟΓΡΑΦΗΣΗ
ΠΟΛΙΤΙΚΗ ΑΣΦΑΛΕΙΑΣ ΣΤΗΝ ΗΛΕΚΤΡΟΝΙΚΗ ΣΥΝΤΑΓΟΓΡΑΦΗΣΗ dimgkik
 
Top Strategies For Launching A New Alliance
Top Strategies For Launching A New AllianceTop Strategies For Launching A New Alliance
Top Strategies For Launching A New AllianceGerry Dehkes
 

Viewers also liked (20)

TBY PD Day Jan2014
TBY PD Day Jan2014TBY PD Day Jan2014
TBY PD Day Jan2014
 
How to get an a
How to get an aHow to get an a
How to get an a
 
69023141 gk-seminar-hk-arthur-china
69023141 gk-seminar-hk-arthur-china69023141 gk-seminar-hk-arthur-china
69023141 gk-seminar-hk-arthur-china
 
Susie West Top Ten To Ensuring eInvoicing Success
Susie West Top Ten To Ensuring eInvoicing SuccessSusie West Top Ten To Ensuring eInvoicing Success
Susie West Top Ten To Ensuring eInvoicing Success
 
RedTech Advisors On Sina Weibo Regulatory Risk And Censorship
RedTech Advisors On Sina Weibo Regulatory Risk And CensorshipRedTech Advisors On Sina Weibo Regulatory Risk And Censorship
RedTech Advisors On Sina Weibo Regulatory Risk And Censorship
 
Literatuuronderzoek Il En Generatie
Literatuuronderzoek Il En GeneratieLiteratuuronderzoek Il En Generatie
Literatuuronderzoek Il En Generatie
 
Literatuuronderzoek Il En Cultuurverschillen
Literatuuronderzoek Il En CultuurverschillenLiteratuuronderzoek Il En Cultuurverschillen
Literatuuronderzoek Il En Cultuurverschillen
 
Rules of the computer lab
Rules of the computer labRules of the computer lab
Rules of the computer lab
 
Together, We Can Achieve More
Together, We Can Achieve MoreTogether, We Can Achieve More
Together, We Can Achieve More
 
What to ask when buying e-invoicing – the 7 truths to getting it right and wh...
What to ask when buying e-invoicing – the 7 truths to getting it right and wh...What to ask when buying e-invoicing – the 7 truths to getting it right and wh...
What to ask when buying e-invoicing – the 7 truths to getting it right and wh...
 
How Finance Can Really Change Behaviour Of Procurement
How Finance Can Really Change Behaviour Of ProcurementHow Finance Can Really Change Behaviour Of Procurement
How Finance Can Really Change Behaviour Of Procurement
 
China Politics 2.0
China Politics 2.0China Politics 2.0
China Politics 2.0
 
Expert C Kurt Zatloukal 16 Dec 09 Ok
Expert C Kurt Zatloukal 16 Dec 09 OkExpert C Kurt Zatloukal 16 Dec 09 Ok
Expert C Kurt Zatloukal 16 Dec 09 Ok
 
Way of the weibo
Way of the weiboWay of the weibo
Way of the weibo
 
Pastoral Counseling
Pastoral CounselingPastoral Counseling
Pastoral Counseling
 
Content and Distribution: The Hub of Your Online Efforts
Content and Distribution: The Hub of Your Online EffortsContent and Distribution: The Hub of Your Online Efforts
Content and Distribution: The Hub of Your Online Efforts
 
AMA Baltimore - Building Your Content Marketing Plan
AMA Baltimore - Building Your Content Marketing PlanAMA Baltimore - Building Your Content Marketing Plan
AMA Baltimore - Building Your Content Marketing Plan
 
2N Easy Route
2N Easy Route2N Easy Route
2N Easy Route
 
ΠΟΛΙΤΙΚΗ ΑΣΦΑΛΕΙΑΣ ΣΤΗΝ ΗΛΕΚΤΡΟΝΙΚΗ ΣΥΝΤΑΓΟΓΡΑΦΗΣΗ
ΠΟΛΙΤΙΚΗ ΑΣΦΑΛΕΙΑΣ ΣΤΗΝ ΗΛΕΚΤΡΟΝΙΚΗ ΣΥΝΤΑΓΟΓΡΑΦΗΣΗ ΠΟΛΙΤΙΚΗ ΑΣΦΑΛΕΙΑΣ ΣΤΗΝ ΗΛΕΚΤΡΟΝΙΚΗ ΣΥΝΤΑΓΟΓΡΑΦΗΣΗ
ΠΟΛΙΤΙΚΗ ΑΣΦΑΛΕΙΑΣ ΣΤΗΝ ΗΛΕΚΤΡΟΝΙΚΗ ΣΥΝΤΑΓΟΓΡΑΦΗΣΗ
 
Top Strategies For Launching A New Alliance
Top Strategies For Launching A New AllianceTop Strategies For Launching A New Alliance
Top Strategies For Launching A New Alliance
 

Similar to Privacy Techniques in Fourth Generation Heterogeneous Networks

Cit101 social aspects_and_issues_of_the_internet spring 2012
Cit101 social aspects_and_issues_of_the_internet spring 2012Cit101 social aspects_and_issues_of_the_internet spring 2012
Cit101 social aspects_and_issues_of_the_internet spring 2012Infomanjjb
 
International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)ijcisjournal
 
Secure File Sharing In Cloud Using Encryption with Digital Signature
Secure File Sharing In Cloud Using Encryption with Digital  Signature Secure File Sharing In Cloud Using Encryption with Digital  Signature
Secure File Sharing In Cloud Using Encryption with Digital Signature IJMER
 
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...IJERA Editor
 
Reconsidering Public Key Infrastructure and its Place in Your Enterprise Stra...
Reconsidering Public Key Infrastructure and its Place in Your Enterprise Stra...Reconsidering Public Key Infrastructure and its Place in Your Enterprise Stra...
Reconsidering Public Key Infrastructure and its Place in Your Enterprise Stra...Omlis
 
International Journal on Cryptography and Information Security ( IJCIS)
International Journal on Cryptography and Information Security ( IJCIS)International Journal on Cryptography and Information Security ( IJCIS)
International Journal on Cryptography and Information Security ( IJCIS)ijcisjournal
 
Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012Creus Moreira Carlos
 
International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security  (IJCIS)International Journal on Cryptography and Information Security  (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)ijcisjournal
 
Selecting cryptographic technique in peer to peer to Systems
Selecting cryptographic technique in peer to peer to SystemsSelecting cryptographic technique in peer to peer to Systems
Selecting cryptographic technique in peer to peer to SystemsKashif Dayo
 
2019 and 2020 dot net ieee
2019 and 2020 dot net ieee2019 and 2020 dot net ieee
2019 and 2020 dot net ieeemanjunath205
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaIBM Danmark
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityPvrtechnologies Nellore
 
Protecting Your Data in the Cloud - CSO - Conference 2011
Protecting Your Data in the Cloud - CSO - Conference 2011 Protecting Your Data in the Cloud - CSO - Conference 2011
Protecting Your Data in the Cloud - CSO - Conference 2011 Ulf Mattsson
 
Application of Data Science in Cybersecurity.pptx
Application of Data Science in Cybersecurity.pptxApplication of Data Science in Cybersecurity.pptx
Application of Data Science in Cybersecurity.pptxchristinacammillus20
 
Blockchain Defined Perimeter for Cloud Security
Blockchain Defined Perimeter for Cloud SecurityBlockchain Defined Perimeter for Cloud Security
Blockchain Defined Perimeter for Cloud SecurityBlock Armour
 

Similar to Privacy Techniques in Fourth Generation Heterogeneous Networks (20)

Cit101 social aspects_and_issues_of_the_internet spring 2012
Cit101 social aspects_and_issues_of_the_internet spring 2012Cit101 social aspects_and_issues_of_the_internet spring 2012
Cit101 social aspects_and_issues_of_the_internet spring 2012
 
International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)
 
Secure File Sharing In Cloud Using Encryption with Digital Signature
Secure File Sharing In Cloud Using Encryption with Digital  Signature Secure File Sharing In Cloud Using Encryption with Digital  Signature
Secure File Sharing In Cloud Using Encryption with Digital Signature
 
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
 
Reconsidering Public Key Infrastructure and its Place in Your Enterprise Stra...
Reconsidering Public Key Infrastructure and its Place in Your Enterprise Stra...Reconsidering Public Key Infrastructure and its Place in Your Enterprise Stra...
Reconsidering Public Key Infrastructure and its Place in Your Enterprise Stra...
 
International Journal on Cryptography and Information Security ( IJCIS)
International Journal on Cryptography and Information Security ( IJCIS)International Journal on Cryptography and Information Security ( IJCIS)
International Journal on Cryptography and Information Security ( IJCIS)
 
Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012
 
International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security  (IJCIS)International Journal on Cryptography and Information Security  (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)
 
Selecting cryptographic technique in peer to peer to Systems
Selecting cryptographic technique in peer to peer to SystemsSelecting cryptographic technique in peer to peer to Systems
Selecting cryptographic technique in peer to peer to Systems
 
2019 and 2020 dot net ieee
2019 and 2020 dot net ieee2019 and 2020 dot net ieee
2019 and 2020 dot net ieee
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio Panada
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward security
 
Protecting Your Data in the Cloud - CSO - Conference 2011
Protecting Your Data in the Cloud - CSO - Conference 2011 Protecting Your Data in the Cloud - CSO - Conference 2011
Protecting Your Data in the Cloud - CSO - Conference 2011
 
Dotnet application-non-ieee
Dotnet application-non-ieeeDotnet application-non-ieee
Dotnet application-non-ieee
 
150819_oml_pki_v1p
150819_oml_pki_v1p150819_oml_pki_v1p
150819_oml_pki_v1p
 
150819_oml_pki_v1p
150819_oml_pki_v1p150819_oml_pki_v1p
150819_oml_pki_v1p
 
Application of Data Science in Cybersecurity.pptx
Application of Data Science in Cybersecurity.pptxApplication of Data Science in Cybersecurity.pptx
Application of Data Science in Cybersecurity.pptx
 
E-commerce Security
E-commerce SecurityE-commerce Security
E-commerce Security
 
Blockchain Defined Perimeter for Cloud Security
Blockchain Defined Perimeter for Cloud SecurityBlockchain Defined Perimeter for Cloud Security
Blockchain Defined Perimeter for Cloud Security
 

Privacy Techniques in Fourth Generation Heterogeneous Networks

  • 1. University of Piraeus Department of Digital Systems Post graduate Programme in Digital Systems Security Master Thesis Privacy Techniques in Fourth Generation Heterogeneous Networks Dimitris Gkikakis Supervising Professor: Christos Xenakis
  • 2. Contents  Problem  Related  Scope  Requirements  Proposed Architecture  Proposed Signaling  Evaluation 2
  • 3. Problem  Plethora of data for internet services  Data mining techniques  Credit card information exposed  Smartphone era 3
  • 5. Scope  A model that could be deployed in the current & future mobile networks  Privacy  E-commerce  Security 5
  • 6. Requirements  Privacy  Pseudonymity  Unlinkability  Traceability  Trust  Based on existing Trust relationship  Security  Confidentiality  Integrity  Authenticity  Business Model 6  Micropayments
  • 10. Evaluation High level of Privacy High level of Security Ease of deployment Financial transactions without exposing personal information New IP address allocation for each connection Insider threat 10

Editor's Notes

  1. Plethora of data for internet services & data mining techniques - violate the right to be left alone Credit card info exposed- credit card fraud