Search results for "centralized"
showing 10 items of 38 documents
Privacy-preserving data allocation in decentralized online social networks
2016
International audience; Distributed Online Social Networks (DOSNs) have been recently proposed as an alternative to centralized solutions to allow a major control of the users over their own data. Since there is no centralized service provider which decides the term of service, the DOSNs infrastructure exploits users’ devices to take on the online social network services. In this paper, we propose a data allocation strategy for DOSNs which exploits the privacy policies of the users to increase the availability of the users’ contents without diverging from their privacy preferences. A set of replicas of the profile’s content of a user U are stored on the devices of other users who are entitl…
Analysis of Users Behaviour from a Movie Preferences Perspective
2018
Despite their tremendous popularity, Online Social Networks (OSNs) have several issues related to the privacy of social users. These issues have motivated researchers to develop OSN services that take advantage of the decentralized platforms (such as P2P systems or opportunistic networks). Decentralized Online Social Networks (DOSNs) need specific approaches to manage the decentralization of social data. In particular, data availability is one of the main issues and current proposals exploit properties of the social relationships to manage it. At the best of our knowledge, there are no proposals which exploit similarity between users, expressed with the term homophily. Homophily has been we…
Exploiting community detection to recommend privacy policies in decentralized online social networks
2018
The usage of Online Social Networks (OSNs) has become a daily activity for billions of people that share their contents and personal information with the other users. Regardless of the platform exploited to provide the OSNs’ services, these contents’ sharing could expose the OSNs’ users to a number of privacy risks if proper privacy-preserving mechanisms are not provided. Indeed, users must be able to define its own privacy policies that are exploited by the OSN to regulate access to the shared contents. To reduce such users’ privacy risks, we propose a Privacy Policies Recommended System (PPRS) that assists the users in defining their own privacy policies. Besides suggesting the most appro…
A privacy-aware framework for decentralized online social networks
2015
Online social networks based on a single service provider suffer several drawbacks, first of all the privacy issues arising from the delegation of user data to a single entity. Distributed online social networks (DOSN) have been recently proposed as an alternative solution allowing users to keep control of their private data. However, the lack of a centralized entity introduces new problems, like the need of defining proper privacy policies for data access and of guaranteeing the availability of user's data when the user disconnects from the social network. This paper introduces a privacy-aware support for DOSN enabling users to define a set of privacy policies which describe who is entitle…
A Logical Key Hierarchy Based approach to preserve content privacy in Decentralized Online Social Networks
2020
Distributed Online Social Networks (DOSNs) have been proposed to shift the control over user data from a unique entity, the online social network provider, to the users of the DOSN themselves. In this paper we focus on the problem of preserving the privacy of the contents shared to large groups of users. In general, content privacy is enforced by encrypting the content, having only authorized parties being able to decrypt it. When efficiency has to be taken into account, new solutions have to be devised that: i) minimize the re-encryption of the contents published in a group when the composition of the group changes; and, ii) enable a fast distribution of the cryptographic keys to all the m…
Accelerated Bayesian learning for decentralized two-armed bandit based decision making with applications to the Goore Game
2012
Published version of an article in the journal: Applied Intelligence. Also available from the publisher at: http://dx.doi.org/10.1007/s10489-012-0346-z The two-armed bandit problem is a classical optimization problem where a decision maker sequentially pulls one of two arms attached to a gambling machine, with each pull resulting in a random reward. The reward distributions are unknown, and thus, one must balance between exploiting existing knowledge about the arms, and obtaining new information. Bandit problems are particularly fascinating because a large class of real world problems, including routing, Quality of Service (QoS) control, game playing, and resource allocation, can be solved …
Semi-decentralized strategies in structural vibration control
2011
Published version of an article published in the journal: Modeling, Identification and Control. Also available from the publisher at: http://dx.doi.org/10.4173/mic.2011.2.2 In this work, the main ideas involved in the design of overlapping and multi-overlapping controllers via the Inclusion Principle are discussed and illustrated in the context of the Structural Vibration Control of tall buildings under seismic excitation. A detailed theoretical background on the Inclusion Principle and the design of overlapping controllers is provided. Overlapping and multi-overlapping LQR controllers are designed for a simplied five-story building model. Numerical simulations are conducted to asses the pe…
Optimal passive-damping design using a decentralized velocity-feedback H-infinity approach
2012
In this work, a new strategy to design passive energy dissipation systems for vibration control of large structures is presented. The method is based on the equivalence between passive damping systems and fully decentralized static velocity-feedback controllers. This equivalence allows to take advantage of recent developments in static output-feedback control design to formulate the passive-damping design as a single optimization problem with Linear Matrix Inequality constraints. To illustrate the application of the proposed methodology, a passive damping system is designed for the seismic protection of a five-story building with excellent results. Peer Reviewed
Modeling and Coordination of interconnected microgrids using distributed artificial intelligence approaches
2019
As renewable sources penetrate the current electrical system to relief global warming and energy shortage, microgrid (MG) emerges to reduce the impact of intermittent generation on the utility grid. Additionally, it improves the automation and intelligence of the power grid with plug-and-play characteristics. Inserting more MGs into a distribution network promotes the development of the smart grid. Thus MG networks existing in the power system are in prospect. Coordinating them could gain a system with high reliability, low cost, and strong resistance to electrical faults. Achieving these profits relies on developed technologies of communication, control strategy, and corresponding algorith…
Conception of a territorial observation and prospective tool for energy. The case of fuelwood.
2008
International audience; Decentralized energy planning has been emerged in France since the last three decades especially due to the development of renewable energies. One corollary is the increase of local actors' role in energy and land planning. In order to help them carrying out efficient policies, decision support systems (DSS) have been developed. In this paper, the authors deal with a DSS applied to fuelwood sector.