-
61
Approach to keyword search over encrypted data in cloud
Published 2014-11-01“…With the advent of cloud computing,large-scale data are being increasingly outsourced to the cloud.For the protection of data privacy,sensitive data has to be encrypted before outsourcing,which makes effective data utilization a very challenging task.Although traditional searchable encryption approaches allow users to search over encrypted data through keywords,they don’t capture any relevance of data files,so users have to spend much time on post-processing every retrieved file in order to find ones most matching their interest.Moreover,retrieving all files containing the queried keyword further incurs unnecessary network traffic,which is not accord with pay-as-you-use cloud paradigm.An approach to ranked keyword search over encrypted data in cloud is proposed.Ranked search greatly mitigate the user’s effort by returning the matching files in a ranked order,and also protects the data privacy by order-preserving encryption.Extensive experimental results demonstrate the efficiency.…”
Get full text
Article -
62
Blockchain data access control scheme based on CP-ABE algorithm
Published 2020-06-01“…Different from the public chain,the consortium blockchain Hyperledger Fabric integrates the additional member management service(MSP) mechanism to provide channel-based data isolation protection.However,the data isolation protection mechanism still synchronizes the plaintext data within a channel,so there is a risk of data leakage.Besides,the channel-based data access control mechanism does not apply to some fine-grained privacy protection scenarios.To solve the problems of data privacy and security involved in the consortium chain Hyperledger mentioned above,a blockchain data access control scheme based on the CP-ABE algorithm was proposed.Based on the original existing Fabric-CA module in the Hyperledger,our scheme can realize the secure distribution of user attribute keys in the CP-ABE scheme while implementing the fine-grained security access control of blockchain data at the user level.The security analysis shows that the scheme achieves the security goals of ABE user attribute private key security distribution and data privacy protection.The performance analysis also shows that the proposed scheme has good usability.…”
Get full text
Article -
63
Drivers’ Perceptions of Smartphone Applications for Real-Time Route Planning and Distracted Driving Prevention
Published 2019-01-01“…Most of the participants willing to use both smartphone applications did not have data privacy concerns, but in return for allowing the applications to access their data, they expected some reduction in travel time and a safer trip. …”
Get full text
Article -
64
Personalized Federated Learning Scheme for Autonomous Driving Based on Correlated Differential Privacy
Published 2024-12-01“…However, the issue of constant attacks on data privacy arouses huge concerns among the public. …”
Get full text
Article -
65
Federated Learning for Brain Tumor Diagnosis: Methods, Challenges and Future Prospects
Published 2025-01-01“…However, traditional methods face challenges such as data privacy, model interpretability, and data heterogeneity. …”
Get full text
Article -
66
A Survey of Differential Privacy Techniques for Federated Learning
Published 2025-01-01“…The problem of data privacy protection in the information age deserves people’s attention. …”
Get full text
Article -
67
Impact of Modern Technology on Social Research Methods in Educational Contexts
Published 2025-02-01“…However, challenges such as data privacy concerns, ethical dilemmas, and the digital divide emerged as prominent issues that limit the effective integration of technology in educational research. …”
Get full text
Article -
68
An Optimized Sanitization Approach for Minable Data Publication
Published 2022-09-01“…In SA-MDP, we consider the trade-off between the data utility and the data privacy in the minable data publication problem. …”
Get full text
Article -
69
Verifiable computation scheme of batch matrix multiplication based on triple perturbation and linear combination
Published 2024-04-01“…While verifiable computing brings convenience to users, there are also security challenges: data privacy, verifiability of results, and efficiency. …”
Get full text
Article -
70
Two-party cooperative blind signature based on SM2
Published 2022-12-01“…SM2, issued by China in 2010, is a public key cryptography standard based on elliptic curves.It has been widely used in finance, social security and other fields thanks to its advantages of improved signature efficiency, decreased storage space and computing complexity than RSA.With the popularization and application of SM2, the issues of its key security and data privacy are of great concern.The single-key mode inhibits the potential application in multi-user settings, and the leakage of the key will threaten the security of the entire cryptosystem due to the centralization.The problem of secure storage and reasonable utilization of keys needs to be solved urgently.In addition, the SM2 digital signature algorithm cannot guarantee the message privacy.Aiming at the issues of key security and data privacy of the signature algorithm, many researchers have proposed the idea of cooperative signature and blind signature for SM2.However, there isn’t SM2 collaborative blind signature scheme proposed.Then a two-party cooperative blind signing protocol based on SM2 was proposed in this paper, which allowed two parties to sign except the user.The signing process did not require recovering the complete private key, while not revealing the information of the partial private key and secret number.The key was stored separately to improve the security of the key, while the blind signature protected the privacy of the message.In terms of security, the protocol satisfied unforgeability and unlinkability.The protocol was implemented using C to demonstrate the efficiency of each participant’s local operation.In the honest model, the time cost of each entity in the cooperative signature phase was similar as that of executing a lightweight SM2 blind signature.Overall, the proposed protocol has certain advantages in terms of function and efficiency.…”
Get full text
Article -
71
Machine learning and public health policy evaluation: research dynamics and prospects for challenges
Published 2025-01-01“…The challenges discussed include model interpretability, data bias, the continuation of historical health inequities, and data privacy concerns, while proposing ways to better apply machine learning in the context of big data.ResultsMachine learning techniques hold promise in overcoming some limitations of traditional methods, offering more precise evaluations of public health policies. …”
Get full text
Article -
72
A Middleware Applications Design for Health Information Sharing
Published 2024-06-01“…However, integrating such systems, including the need for interoperability standards, data privacy, and security, is a highly challenging task, especially since patient rights in data access must be considered. …”
Get full text
Article -
73
A Collaborative Privacy Preserved Federated Learning Framework for Pneumonia Detection using Diverse Chest X-ray Data Silos
Published 2025-04-01“…This model enhances data privacy while performing collaborative learning with diverse data silos and resulting in improved predictions. …”
Get full text
Article -
74
Inference Attacks on Genomic Data Based on Probabilistic Graphical Models
Published 2020-09-01“…The rapid progress and plummeting costs of human-genome sequencing enable the availability of large amount of personal biomedical information, leading to one of the most important concerns — genomic data privacy. Since personal biomedical data are highly correlated with relatives, with the increasing availability of genomes and personal traits online (i.e., leakage unwittingly, or after their releasing intentionally to genetic service platforms), kin-genomic data privacy is threatened. …”
Get full text
Article -
75
A Credit Card Fraud Detection Algorithm Based on SDT and Federated Learning
Published 2024-01-01“…Second, addressing the complex financial environment and concerns about financial data privacy, we introduce a federated learning architecture to deploy the SDT model across different banks in a distributed manner. …”
Get full text
Article -
76
Design of an improved model using federated learning and LSTM autoencoders for secure and transparent blockchain network transactions
Published 2025-01-01“…It includes some such issues as follows: data privacy, centralized vulnerability, inefficiency in fraud detection and much more. …”
Get full text
Article -
77
Conditions for anonymity in some generic public-key encryption constructions
Published 2009-01-01“…In applications of public-key encryption schemes, anonymity(key-privacy) as well as security(data-privacy) is useful and widely desired.Recently Canetti-Halevi-Katz proposed a generic and elegant IBE-based construction for(tra-ditional) public-key encryption, whose performance was improved by another construction proposed by Boneh-Katz.To analyze such two constructions’ anonymity, two new and generic concepts in IBE scheme,"master-key anonymity"and"relevant master-key anonymity"were proposed and two different sufficient conditions for chosen-ciphertext anonymity were proved for Canetti-Halevi-Katz and Boneh-Katz constructions.…”
Get full text
Article -
78
Enhancing privacy and traceability of public health insurance claim system using blockchain technology
Published 2025-02-01“…A proof-of-concept prototype was developed to demonstrate the core functionalities of the new system.ResultsBy integrating blockchain technology, our prototype ensures authorized access, bolsters data privacy, and maintains data integrity in the NHI claim workflow. …”
Get full text
Article -
79
The promise and challenges of Artificial Intelligence-Large Language Models (AI-LLMs) in obstetric and gynecology
Published 2024-07-01“…Ethical issues, such as data privacy and the risk of overreliance on technology, must be addressed. …”
Get full text
Article -
80
Evaluation method of privacy protection effect based on multi-layer fuzzy comprehensive evaluation
Published 2020-12-01“…Aiming at the problem that the evaluation of the privacy protection effect from a single data level cannot describe the overall privacy protection effect of the network environment,with the help of the fuzzy comprehensive evaluation method,the privacy protection effect influencing factors were condensed from the entire life cycle of the data.According to the data privacy differences,the factors and block weights were determined,and the overall calculation results of the overall privacy protection effect of the network environment were obtained.Case analysis shows that the proposed method is feasible and effective.…”
Get full text
Article