-
81
HRR: a data cleaning approach preserving local differential privacy
Published 2018-12-01“…In this work, we establish the differential privacy cleaning model H-RR, which is based on the contradiction generated by the function dependency, correct the contradictory data, and use the indistinguishability between the correction results to protect the data privacy. In this model, we add the local differential privacy mechanism in the process of data cleaning. …”
Get full text
Article -
82
Security sharing and associated deleting scheme for multi-replica in cloud
Published 2015-11-01“…In order to protect the privacy of data stored in public cloud environment,a security sharing and associated deleting scheme for multi-replica was proposed,which was based on symmetric encryption algorithm,attribute encryption algorithm and replica location technology.In this security scheme,the user’s data was first encrypted and encapsulated into the replication associated objects (RAO),then the RAO was shared in cloud service provider and managed by the replica correlation model.The comprehensive analyses show that the scheme is security and effective,and is able to support the data security sharing and associated deleting for multi-replica to protect the data privacy.…”
Get full text
Article -
83
Blockchain-based IoT architecture
Published 2020-06-01“…The Internet of things (IoT) architecture based on the traditional Internet is facing data privacy security issues,central server single point issues,and etc.Building a data security ecosystem is a challenge for the future development of the IoT.The decentralized autonomy,tamper-resistance and security of the blockchain technology are proposing a new solution to this challenge.An IoT architecture was proposed based on the blockchain technology as the foundation of a trust-free network,which provided an information-secure network service for the current IoT.Based on the decentralized characteristics of the blockchain technology,the proposed architecture could replace the client-server (C-S) centralized communication model of the traditional IoT to solve the overload problem of the central server and the data security issues.…”
Get full text
Article -
84
FedDrip: Federated Learning With Diffusion-Generated Synthetic Image
Published 2025-01-01“…In the realm of machine learning in healthcare, federated learning (FL) is often recognized as a practical solution for addressing issues related to data privacy and data distribution. However, many real-world datasets are not identically and independently distributed (non-IID). …”
Get full text
Article -
85
The Impact of Digital Technologies on the Development of Payment Services
Published 2020-10-01“…The problems and ways of protecting user identification, data privacy and money safety when using electronic payment services are investigated. …”
Get full text
Article -
86
Achieving efficient location privacy protection based on cache
Published 2017-06-01“…With the development of mobile Internet and the popularization of intelligent terminals,location based services(LBS) has been widespread in navigation,social network and other fields.Due to the sensitivity of personal location information,data privacy protection related to location of mobile objects has become the hotspots of research.Considering the openness of the background information,and based on the information cache mechanism,a dummy selection algorithm was proposed to reduce the number of interactions between the user and the untrusted server and combine the k-anonymity to achieve efficient location privacy.Without relying on trusted third party,the scheme can prevent the attackers owned background information from inference attack,and the detail simulation results indicate its effectiveness and efficiency.…”
Get full text
Article -
87
Survey on data preserving for the search of internet of things
Published 2016-09-01“…With the rapid development of the internet of things(IoT) technology and big data technology,the search engine for internet of things become a hot research topic.However,because of the openness of the search of IoT,the privacy in traditional internet search area become more prominent and face more challenges.Firstly,the research background and challenges of privacy preservation for search of IoT were described.Secondly,the framework of data privacy preservation for search of IoT were presented and several main research domain in this framework were described.Thirdly,several privacy preservation technology appropriated for search of IoT were described in detail,including the background,recent research work,main research directions.Finally,the current problems and important research field for future were presented.…”
Get full text
Article -
88
Artificial Intelligence - Blessing or Curse in Dentistry? - A Systematic Review
Published 2024-12-01“…However, issues such as data privacy, dental professional job displacement, and the necessity for thorough validation and regulation to ensure safety and efficacy remain significant concerns.…”
Get full text
Article -
89
Integrity verification protocol based on privacy homomorphism data aggregation
Published 2014-11-01“…Secure data aggregation in wireless sensor networks can effectively prevent privacy leakage,data tampering and other issues,it also achieves efficient data transmission.An integrity verification protocol based on privacy homomorphism data aggregation (IV-PHDA) was presented.The protocol uses homomorphism encryption to ensure data privacy,then it used random detection nodes to detect the integrity of the aggregated results to verify whether the aggregation node faithfully transmit each data packet.The theoretical analysis and simulation comparison verify the performance of the algorithm,the results show that this protocol can detect data integrity through transmission,and achieve better privacy protection and higher data accuracy.…”
Get full text
Article -
90
A Distributed Consensus Scenario Approach to Optimization and Control With Uncertainties
Published 2025-01-01“…Our design inherently offers robustness against adversarial attacks and preserves data privacy. We provide rigorous convergence analysis and demonstrate the effectiveness of our approach through application examples in regression and robust internal model control. …”
Get full text
Article -
91
Efficient certificateless searchable encryption scheme with verifiability
Published 2023-08-01“…Searchable encryption offers an effective way to achieve data privacy protection and keyword search in cloud computing environments.Currently, the existing schemes not only lack dynamic update and efficient verification mechanism, but also suffer from the certificate management burden and key escrow issue.To address these issues, a verifiable multi-keyword searchable encryption scheme based on improved Merkle-Tree had been proposed recently.However, through cryptoanalysis, that scheme could not achieve the indistinguishability.With improvement, an efficient able certificateless searchable encryption scheme with verifiability was proposed.Rigorous analysis show that the proposed scheme not only supports the indistinguishability and the unforgeability, but also enjoys higher computing efficiency and lower communication cost, which is more suitable for terminal devices with limited resources.…”
Get full text
Article -
92
A Fine-Grained Mobile Data Security Model
Published 2014-01-01“…The mobile data management module identified the user permissions and level of data privacy through the label to control the operation of mobile application of mobile data. …”
Get full text
Article -
93
Survey on differential privacy and its progress
Published 2017-10-01“…With the arrival of the era of big data sharing,data privacy protection issues will be highlighted.Since its introduction in 2006,differential privacy technology has been widely researched in data mining and data publishing.In recent years,Google,Apple and other companies have introduced differential privacy technology into the latest products,and differential privacy technology has become the focus of academia and industry again.Firstly,the traditional centralized model of differential privacy was summarized,from the perspective of analysis of data mining and data released in the differential privacy way.Then the latest local differential privacy regarding data collection and data analysis based on the local model was described,involving crowdsourcing with random response technology,BloomFilter,statistical inference techniques.Finally,the main problems and solutions of differential privacy technology were summarized.…”
Get full text
Article -
94
Survey on privacy preserving techniques for blockchain
Published 2018-09-01“…Blockchain is a kind of distributed ledger technology with the characteristics of decentralization,security reliability,tamper-proof and programmable.The open and transparent feature of the blockchain system has seriously threatened the transaction privacy of users,and the corresponding privacy problem solution is designed for different application scenarios.Firstly,the basic working principle of block chain technology was introduced,and typical privacy issues was introduced in blockchain,such as transaction privacy and account privacy.Secondly,the existing typical blockchain privacy protection schemes were divided into three types:mixed-coin technology,cryptography technology and secure channel technology,and presents a comprehensive and comprehensive introduction to this three privacy protection schemes; Finally,the blockchain data privacy protection technology was analyzed,the application and development on IoT security were prospeted.…”
Get full text
Article -
95
Big Data Technology:Current Applications and Prospects
Published 2015-07-01“…The research includes computer science,information science,management science,psychology,etc.Four key technologies in big data research,data collection,preprocessing and storage,data analysis and mining,data privacy protection,data center system structure were discussed and the hot research topics from domestic and overseas research groups were demonstrated in order to have comprehensive and systematic understanding of big data.The application status of big data was introduced from three perspectives,application platforms,relevant products and standardization.Meanwhile,description of current business in big data and other field was presented.Eventually,the opportunities and challenges in big data research were revealed through big data analysis strategies,privacy protection and data quality,which provide the guideline for future research.…”
Get full text
Article -
96
Progress of research on privacy protection for data publication and data mining
Published 2016-01-01“…Several methods of data privacy preserving technology were analyzed when data was processed and briefly discussed the international standards which were made by JTC1 about privacy protection. …”
Get full text
Article -
97
Dual verifiable cloud storage scheme based on blockchain
Published 2021-12-01“…In response to the problem that in the industrial Internet of things (IIoT), industrial equipment stored data in the cloud, causing data to be easily tampered with and unable to track malicious users, causing a vicious circle, with the help of the traceability and immutability of the blockchain, a dual verifiable cloud storage scheme based on the blockchain was proposed.Firstly, homomorphic encryption technology was used to encrypt data and upload it to the cloud , which ensured transmission security and realized data privacy protection.Secondly, the aggregated ciphertext and uploader information were stored on the blockchain, which could effectively avoid the risk of data being tampered with by illegal users, and could trace malicious users to achieve double verification of cloud data integrity.Finally, a safety analysis was carried out to prove that the proposed scheme is safer and more reliable than similar schemes.…”
Get full text
Article -
98
Survey on user’s mobility behavior modelling in urban environment
Published 2020-07-01“…Urban environment has become a typical scenario for areas of mobile communication,transportation scheduling,disease controlling and so on,and modelling user’s mobility behavior plays an important role in these key applications.The research development in this area was combed and summarized,which provided a literature review for related works.Firstly,the main challenges in urban mobility modelling were discussed as well as the corresponding key scientific problems,which included mobility data augmentation,urban structure-aware mobility behavior discovering,multi-scale mobility behavior prediction and mobility data privacy protection.Furthermore,according to these key scientific problems,the recent developments and up-to-date scientific output in this area were summarized,which paved the way for future research.…”
Get full text
Article -
99
Provable Data Recoverability and Hide-Able Access Pattern Based ORAM
Published 2013-12-01“…The adversary can not obtain useful information from the client access data pattern, and the data privacy is guaranteed.…”
Get full text
Article -
100
MAXGDDP:decision data release with differential privacy
Published 2018-03-01“…Specialization-based private decision data release has attracted considerable research attention in recent years.The relation among hierarchical node,taxonomy tree,and budget allocation directly constrains the accuracy of data release and classification.Most existing methods based on hierarchical specialization cannot efficiently address the above problems.An effective method was proposed,called MAXGDDP to publish decision data with specialization.MAXGDDP employed MAX index attribute selection algorithm to select the highlight concept for furthering specialization in each hierarchy.Besides,for making more rational use of privacy budget,MAXGDDP relied on geometric strategy to allocate the privacy budget in each hierarchy.Compared with existing methods such as DiffGen on the real datasets,MAXGDDP outperforms its competitors,achieves data privacy and the better result of classification simultaneously.…”
Get full text
Article