dc.contributor.author |
Chehab, Mohamad A. |
|
dc.date.accessioned |
2020-11-03T08:55:50Z |
|
dc.date.available |
2020-11-03T08:55:50Z |
|
dc.date.copyright |
2019 |
en_US |
dc.date.issued |
2020-11-03 |
|
dc.date.submitted |
2019-05-03 |
|
dc.identifier.uri |
http://hdl.handle.net/10725/12308 |
|
dc.description.abstract |
The wide applicability of Internet of Things (IoT) would truly enable the pervasiveness
of smart devices for sensing data. IoT coupled with machine learning
would enter us in an era of smart and personalized, services. In order to achieve
service personalization, there is a need to collect sensitive data about the users.
That yields to privacy concerns due to the possibility of abusing the data or having
attackers to gain unauthorized access. Moreover, the nature of IoT devices,
being resource and computationally constrained, makes it di cult to perform
heavy protection mechanisms. Despite the presence of several solutions for protecting
user privacy, they were not created for the purpose of running on small
devices at a large scale. On top of that, existing solutions lack the customization of user privacy in which users have little to no control over their own private
data. In this regards, we address the aforementioned issue of protecting user's
privacy while taking into account e ciency as well as memory usage. The proposed
scheme embeds an e cient and lightweight algebra based that targets user
privacy and provides e cient policy evaluation. Moreover, an intelligent model to
customize user's privacy based on real time behavior is integrated. Experiments
conducted on synthetic and real-life scenarios to demonstrate the feasibility and
relevance of our proposed framework within IoT environment. |
en_US |
dc.language.iso |
en |
en_US |
dc.subject |
Lebanese American University -- Dissertations |
en_US |
dc.subject |
Dissertations, Academic |
en_US |
dc.subject |
Internet of things -- Security measures |
en_US |
dc.subject |
Embedded Internet devices -- Security measures |
en_US |
dc.subject |
Privacy, Right of -- Technological innovations |
en_US |
dc.title |
LP-SBA-XACML. (c2019) |
en_US |
dc.type |
Thesis |
en_US |
dc.title.subtitle |
lightweight semantics based scheme embedded with intelligent behavior-aware privacy preserving model |
en_US |
dc.term.submitted |
Spring |
en_US |
dc.author.degree |
MS in Computer Science |
en_US |
dc.author.school |
SAS |
en_US |
dc.author.idnumber |
201205174 |
en_US |
dc.author.commembers |
Harmanani, Haidar |
|
dc.author.commembers |
Hamdan, May |
|
dc.author.department |
Computer Science And Mathematics |
en_US |
dc.description.embargo |
N/A |
en_US |
dc.description.physdesc |
1 hard copy: xi, 68 leaves; ill. (Some col.); 30 cm. available at RNL. |
en_US |
dc.author.advisor |
Mourad, Azzam |
|
dc.keywords |
Machine Learning |
en_US |
dc.keywords |
Deep Learning |
en_US |
dc.keywords |
Access Control |
en_US |
dc.keywords |
User Privacy |
en_US |
dc.keywords |
Customized Privacy |
en_US |
dc.keywords |
Behavior Based Privacy |
en_US |
dc.keywords |
IoT |
en_US |
dc.keywords |
SBA-XACML |
en_US |
dc.keywords |
Limited Resource Devices |
en_US |
dc.description.bibliographiccitations |
Bibliography: leaves 62-68. |
en_US |
dc.identifier.doi |
https://doi.org/10.26756/th.2020.168 |
en_US |
dc.identifier.tou |
http://libraries.lau.edu.lb/research/laur/terms-of-use/thesis.php |
en_US |
dc.publisher.institution |
Lebanese American University |
en_US |
dc.author.affiliation |
Lebanese American University |
en_US |