Suggested Topics within your search.
Suggested Topics within your search.
-
161
A controllable privacy data transmission mechanism for Internet of things system based on blockchain
Published 2022-03-01“…With the in-depth integration of traditional industries and information technology in Internet of things, wireless sensor networks are used more frequently to transmit the data generated from various application scenarios. …”
Get full text
Article -
162
Preserving Big Data Privacy in Cloud Environments Based on Homomorphic Encryption and Distributed Clustering
Published 2024-03-01“…A partial homomorphic encryption system is used to encrypt data created by many sources or users and processed in the cloud without decrypting it, hence protecting data from attackers. …”
Get full text
Article -
163
South African Electoral Commission’s mobile app for voters: Data privacy and security dimensions
Published 2024-12-01“…The analysis revealed several security and privacy concerns, including inadequately secured API keys, the potential for unauthorised access, and the potential for data breaches. …”
Get full text
Article -
164
An explainable federated blockchain framework with privacy-preserving AI optimization for securing healthcare data
Published 2025-07-01“…The Entropy Deep Belief Network (EDBN) is used as the classifier to enhance classification accuracy and detect attacks. …”
Get full text
Article -
165
DP-FedCMRS: Privacy-Preserving Federated Learning Algorithm to Solve Heterogeneous Data
Published 2025-01-01“…In federated learning, non-independently and non-identically distributed heterogeneous data on the clients can limit both the convergence speed and model utility of federated learning, and gradients can be used to infer original data, posing a threat to user privacy. …”
Get full text
Article -
166
Decoding privacy concerns: the role of perceived risk and benefits in personal health data disclosure
Published 2024-10-01“…Results The analysis revealed a significant negative relationship between individuals’ personal health data disclosure behaviour and their privacy concerns. …”
Get full text
Article -
167
A synchronous compression and encryption method for massive electricity consumption data privacy preserving
Published 2025-01-01“…Our proposed algorithm uses a ternary Logistic-Tent chaotic system for generating a chaotic measurement matrix, allowing simultaneous data compression and encryption of user-side voltage and current data. …”
Get full text
Article -
168
Privacy-Preserving Keyword Search With Access Control for Secret Sharing-Based Data Outsourcing
Published 2025-01-01Get full text
Article -
169
Privacy-preserving federated learning for collaborative medical data mining in multi-institutional settings
Published 2025-04-01“…Abstract Ensuring data privacy in medical image classification is a critical challenge in healthcare, especially with the increasing reliance on AI-driven diagnostics. …”
Get full text
Article -
170
Precision-Enhanced and Encryption-Mixed Privacy-Preserving Data Aggregation in Wireless Sensor Networks
Published 2013-04-01“…Based on the Slice-Mix-AggRegaTe (SMART) scheme, it optimizes data slicing by using small data packet, node classifying, and positive and negative data slicing techniques. …”
Get full text
Article -
171
Time-based and privacy protection revocable and traceable data sharing scheme in cloud computing
Published 2021-10-01“…General ciphertext-policy attribute-based encryption (CP-ABE) provides fine-grained access control for data sharing in cloud computing, but its plaintext formed access policy may cause leakage of private and sensitive data.And revoking a malicious user by accurately tracing the identity according to a leaked decryption key is a huge challenge.Moreover, most of existing revocable schemes incur long user revocation list and low efficiency.To solve these problems, a time-based and privacy preserving revocable and traceable data sharing scheme was proposed based on CP-ABE to support expressive monotonic and partial hidden access policy, large attribute universe by conceal the attribute values in access policy.Time-limited data access control using hierarchical identity-based encryption was achieved to set key valid period for users.Moreover, with the approaches of white-box tracing and binary tree, efficient user tracing and direct revocation with shorter revocation list was realized together with high efficiency via online/offline and verifiable outsourced decryption techniques.Furthermore, the scheme was secure under decisional q-BDHE assumption.Theoretical analysis and extensive experiments demonstrate its advantageous performance in computational and storage cost.…”
Get full text
Article -
172
A blockchain-based verifiable CP-ABE scheme for medical data privacy protection
Published 2025-07-01Get full text
Article -
173
Advancing Data Privacy in Cloud Storage: A Novel Multi-Layer Encoding Framework
Published 2025-07-01“…Data privacy is a crucial concern for individuals using cloud storage services, and cloud service providers are increasingly focused on meeting this demand. …”
Get full text
Article -
174
Privacy Risk Assessment of Medical Big Data Based on Information Entropy and FCM Algorithm
Published 2024-01-01“…However, the high sensitivity and privacy of medical data also bring serious security challenges. …”
Get full text
Article -
175
A Blockchain-Based Secure Data Transaction and Privacy Preservation Scheme in IoT System
Published 2025-08-01“…With the explosive growth of Internet of Things (IoT) devices, massive amounts of heterogeneous data are continuously generated. However, IoT data transactions and sharing face multiple challenges such as limited device resources, untrustworthy network environment, highly sensitive user privacy, and serious data silos. …”
Get full text
Article -
176
Multi-party summation query method based on differential privacy
Published 2020-06-01“…Differential privacy is considered to be a very reliable protection mechanism because it does not require the a prior knowledge for the attacker.However,differential privacy is rarely used in a multi-party environment.In view of this,the differential privacy is applied to the data summation query in multi-party environment.This method was described in detail and proved the security of the method.…”
Get full text
Article -
177
Efficient and Privacy-Preserving Decision Tree Inference via Homomorphic Matrix Multiplication and Leaf Node Pruning
Published 2025-05-01“…Cloud computing is widely used by organizations and individuals to outsource computation and data storage. …”
Get full text
Article -
178
A decentralized privacy-preserving framework for diabetic retinopathy detection using federated learning and blockchain
Published 2025-06-01“…Diabetic Retinopathy (DR) detection in distributed telemedicine environments requires secure, scalable, and privacy-preserving solutions. Traditional federated learning (FL) relies on a central server, raising concerns about data privacy and system trust. …”
Get full text
Article -
179
Privacy-preserving detection and classification of diabetic retinopathy using federated learning with FedDEO optimization
Published 2024-12-01“…FL enables collaborative learning across multiple decentralized devices while maintaining data privacy. FedDEO optimization enhances the model's performance by fine-tuning hyperparameters in a distributed manner. …”
Get full text
Article -
180
A differentially-private mechanism for multi-level data publishing
Published 2015-12-01“…Privacy preserving technology had addressed the problem of privacy leakage during data publishing proc-ess,however,current data publishing technologies mostly focused on publishing privacy preserving data with single level,without considering some scenarios of multi-level users.Therefore,a differentially-private mechanism for multi-level data publishing was proposed.The proposed mechanism employed the Laplace mechanism with different privacy budgets to output results with different privacy protection levels.After the user’s level was determined ac-cording to the charge or privilege of that specific user,the goal that a user with high(low) level can only use the out-put result with low(high) privacy protection level which had low(high) error rate could be achieved.Finally,the evaluation results and security analysis show that our proposed framework can not only prevent from background knowledge attack,but also achieve multi-level data publishing with different error rates effectively .…”
Get full text
Article