Showing 61 - 80 results of 288 for search '"data privacy"', query time: 0.05s Refine Results
  1. 61

    Approach to keyword search over encrypted data in cloud by Peng ZHANG, Yan LI, Hai-lun LIN, Rong YANG, Qing-yun LIU

    Published 2014-11-01
    “…With the advent of cloud computing,large-scale data are being increasingly outsourced to the cloud.For the protection of data privacy,sensitive data has to be encrypted before outsourcing,which makes effective data utilization a very challenging task.Although traditional searchable encryption approaches allow users to search over encrypted data through keywords,they don’t capture any relevance of data files,so users have to spend much time on post-processing every retrieved file in order to find ones most matching their interest.Moreover,retrieving all files containing the queried keyword further incurs unnecessary network traffic,which is not accord with pay-as-you-use cloud paradigm.An approach to ranked keyword search over encrypted data in cloud is proposed.Ranked search greatly mitigate the user’s effort by returning the matching files in a ranked order,and also protects the data privacy by order-preserving encryption.Extensive experimental results demonstrate the efficiency.…”
    Get full text
    Article
  2. 62

    Blockchain data access control scheme based on CP-ABE algorithm by Yunxiang QIU, Hongxia ZHANG, Qi CAO, Jiancong ZHANG, Xingshu CHEN, Hongjian JIN

    Published 2020-06-01
    “…Different from the public chain,the consortium blockchain Hyperledger Fabric integrates the additional member management service(MSP) mechanism to provide channel-based data isolation protection.However,the data isolation protection mechanism still synchronizes the plaintext data within a channel,so there is a risk of data leakage.Besides,the channel-based data access control mechanism does not apply to some fine-grained privacy protection scenarios.To solve the problems of data privacy and security involved in the consortium chain Hyperledger mentioned above,a blockchain data access control scheme based on the CP-ABE algorithm was proposed.Based on the original existing Fabric-CA module in the Hyperledger,our scheme can realize the secure distribution of user attribute keys in the CP-ABE scheme while implementing the fine-grained security access control of blockchain data at the user level.The security analysis shows that the scheme achieves the security goals of ABE user attribute private key security distribution and data privacy protection.The performance analysis also shows that the proposed scheme has good usability.…”
    Get full text
    Article
  3. 63

    Drivers’ Perceptions of Smartphone Applications for Real-Time Route Planning and Distracted Driving Prevention by Khaled Shaaban

    Published 2019-01-01
    “…Most of the participants willing to use both smartphone applications did not have data privacy concerns, but in return for allowing the applications to access their data, they expected some reduction in travel time and a safer trip. …”
    Get full text
    Article
  4. 64

    Personalized Federated Learning Scheme for Autonomous Driving Based on Correlated Differential Privacy by Yuan Tian, Yanfeng Shi, Yue Zhang, Qikun Tian

    Published 2024-12-01
    “…However, the issue of constant attacks on data privacy arouses huge concerns among the public. …”
    Get full text
    Article
  5. 65

    Federated Learning for Brain Tumor Diagnosis: Methods, Challenges and Future Prospects by Ma Yuhan

    Published 2025-01-01
    “…However, traditional methods face challenges such as data privacy, model interpretability, and data heterogeneity. …”
    Get full text
    Article
  6. 66

    A Survey of Differential Privacy Techniques for Federated Learning by Wang Xin, Li Jiaqian, Ding Xueshuang, Zhang Haoji, Sun Lianshan

    Published 2025-01-01
    “…The problem of data privacy protection in the information age deserves people’s attention. …”
    Get full text
    Article
  7. 67

    Impact of Modern Technology on Social Research Methods in Educational Contexts by Horia Aljounid

    Published 2025-02-01
    “…However, challenges such as data privacy concerns, ethical dilemmas, and the digital divide emerged as prominent issues that limit the effective integration of technology in educational research. …”
    Get full text
    Article
  8. 68

    An Optimized Sanitization Approach for Minable Data Publication by Fan Yang, Xiaofeng Liao

    Published 2022-09-01
    “…In SA-MDP, we consider the trade-off between the data utility and the data privacy in the minable data publication problem. …”
    Get full text
    Article
  9. 69

    Verifiable computation scheme of batch matrix multiplication based on triple perturbation and linear combination by ZHANG Tianpeng, REN Zhiyu, DU Xuehui, WANG Haichao

    Published 2024-04-01
    “…While verifiable computing brings convenience to users, there are also security challenges: data privacy, verifiability of results, and efficiency. …”
    Get full text
    Article
  10. 70

    Two-party cooperative blind signature based on SM2 by Xue BAI, Baodong QIN, Rui GUO, Dong ZHENG

    Published 2022-12-01
    “…SM2, issued by China in 2010, is a public key cryptography standard based on elliptic curves.It has been widely used in finance, social security and other fields thanks to its advantages of improved signature efficiency, decreased storage space and computing complexity than RSA.With the popularization and application of SM2, the issues of its key security and data privacy are of great concern.The single-key mode inhibits the potential application in multi-user settings, and the leakage of the key will threaten the security of the entire cryptosystem due to the centralization.The problem of secure storage and reasonable utilization of keys needs to be solved urgently.In addition, the SM2 digital signature algorithm cannot guarantee the message privacy.Aiming at the issues of key security and data privacy of the signature algorithm, many researchers have proposed the idea of cooperative signature and blind signature for SM2.However, there isn’t SM2 collaborative blind signature scheme proposed.Then a two-party cooperative blind signing protocol based on SM2 was proposed in this paper, which allowed two parties to sign except the user.The signing process did not require recovering the complete private key, while not revealing the information of the partial private key and secret number.The key was stored separately to improve the security of the key, while the blind signature protected the privacy of the message.In terms of security, the protocol satisfied unforgeability and unlinkability.The protocol was implemented using C to demonstrate the efficiency of each participant’s local operation.In the honest model, the time cost of each entity in the cooperative signature phase was similar as that of executing a lightweight SM2 blind signature.Overall, the proposed protocol has certain advantages in terms of function and efficiency.…”
    Get full text
    Article
  11. 71

    Machine learning and public health policy evaluation: research dynamics and prospects for challenges by Zhengyin Li, Hui Zhou, Zhen Xu, Qingyang Ma

    Published 2025-01-01
    “…The challenges discussed include model interpretability, data bias, the continuation of historical health inequities, and data privacy concerns, while proposing ways to better apply machine learning in the context of big data.ResultsMachine learning techniques hold promise in overcoming some limitations of traditional methods, offering more precise evaluations of public health policies. …”
    Get full text
    Article
  12. 72

    A Middleware Applications Design for Health Information Sharing by Ketut Agus Seputra, A.A. Gede Yudhi Paramartha, Gede Aditra Pradnyana, Kadek Yota Ernanda Aryanto

    Published 2024-06-01
    “…However, integrating such systems, including the need for interoperability standards, data privacy, and security, is a highly challenging task, especially since patient rights in data access must be considered. …”
    Get full text
    Article
  13. 73

    A Collaborative Privacy Preserved Federated Learning Framework for Pneumonia Detection using Diverse Chest X-ray Data Silos by Shagun Sharma, Kalpna Guleria

    Published 2025-04-01
    “…This model enhances data privacy while performing collaborative learning with diverse data silos and resulting in improved predictions. …”
    Get full text
    Article
  14. 74

    Inference Attacks on Genomic Data Based on Probabilistic Graphical Models by Zaobo He, Junxiu Zhou

    Published 2020-09-01
    “…The rapid progress and plummeting costs of human-genome sequencing enable the availability of large amount of personal biomedical information, leading to one of the most important concerns — genomic data privacy. Since personal biomedical data are highly correlated with relatives, with the increasing availability of genomes and personal traits online (i.e., leakage unwittingly, or after their releasing intentionally to genetic service platforms), kin-genomic data privacy is threatened. …”
    Get full text
    Article
  15. 75

    A Credit Card Fraud Detection Algorithm Based on SDT and Federated Learning by Yuxuan Tang, Zhanjun Liu

    Published 2024-01-01
    “…Second, addressing the complex financial environment and concerns about financial data privacy, we introduce a federated learning architecture to deploy the SDT model across different banks in a distributed manner. …”
    Get full text
    Article
  16. 76
  17. 77

    Conditions for anonymity in some generic public-key encryption constructions by TIAN Yuan, DENG Lu-yao, ZHANG Hao

    Published 2009-01-01
    “…In applications of public-key encryption schemes, anonymity(key-privacy) as well as security(data-privacy) is useful and widely desired.Recently Canetti-Halevi-Katz proposed a generic and elegant IBE-based construction for(tra-ditional) public-key encryption, whose performance was improved by another construction proposed by Boneh-Katz.To analyze such two constructions’ anonymity, two new and generic concepts in IBE scheme,"master-key anonymity"and"relevant master-key anonymity"were proposed and two different sufficient conditions for chosen-ciphertext anonymity were proved for Canetti-Halevi-Katz and Boneh-Katz constructions.…”
    Get full text
    Article
  18. 78

    Enhancing privacy and traceability of public health insurance claim system using blockchain technology by Andry Alamsyah, I. Putu Sadhu Setiawan

    Published 2025-02-01
    “…A proof-of-concept prototype was developed to demonstrate the core functionalities of the new system.ResultsBy integrating blockchain technology, our prototype ensures authorized access, bolsters data privacy, and maintains data integrity in the NHI claim workflow. …”
    Get full text
    Article
  19. 79

    The promise and challenges of Artificial Intelligence-Large Language Models (AI-LLMs) in obstetric and gynecology by Khanisyah Erza Gumilar, Ming Tan

    Published 2024-07-01
    “…Ethical issues, such as data privacy and the risk of overreliance on technology, must be addressed. …”
    Get full text
    Article
  20. 80

    Evaluation method of privacy protection effect based on multi-layer fuzzy comprehensive evaluation by Yihan YU, Yu FU, Xiaoping WU

    Published 2020-12-01
    “…Aiming at the problem that the evaluation of the privacy protection effect from a single data level cannot describe the overall privacy protection effect of the network environment,with the help of the fuzzy comprehensive evaluation method,the privacy protection effect influencing factors were condensed from the entire life cycle of the data.According to the data privacy differences,the factors and block weights were determined,and the overall calculation results of the overall privacy protection effect of the network environment were obtained.Case analysis shows that the proposed method is feasible and effective.…”
    Get full text
    Article