-
101
Aggregated privacy-preserving auditing for cloud data integrity
Published 2015-10-01“…To solve the problem of data integrity in cloud storage,an aggregated privacy-preserving auditing scheme was proposed.To preserve data privacy against the auditor,data proof and tag proof were encrypted and combined by using the bilinearity property of the bilinear pairing on the cloud server.Furthermore,an efficient index mechanism was designed to support dynamic auditing,which could ensure that data update operations did not lead to high additional computation or communication cost.Meanwhile,an aggregation method for different proofs was designed to handle multiple auditing requests.Thus the proposed scheme could also support batch auditing for multiple owners and multiple clouds and multiple files.The communication cost of batch auditing was independent of the number of auditing requests.The theoretical analysis and experimental results show that the proposed scheme is provably secure.Compared with existing auditing scheme,the efficacy of the proposed individual auditing and batch auditing improves 21.5% and 31.8% respectively.…”
Get full text
Article -
102
Data update algorithm based on secure network coding in cloud environment
Published 2017-05-01“…In the cloud environment for data storage,the use of secure network coding technology can be a good solution to the data privacy and reliability issues.However,each coding block usually has a high correlation after network coding,very few updates to the file need to be re-encoded which is extremely easy to cause information leakage and serious consumption of system resources.To solve this problem,a network coding cloud storage data updating algorithm was proposed.Just by sending files change difference matrix,the storage node could update parts of the coding block accordingly which could complete the entire update files.Experimental results show that compared with RS coding and Tornado coding,the algorithm can not only ensure data security,but also greatly improve the efficiency of data update and data reconstruction.…”
Get full text
Article -
103
Research on Image Recognition and Classification Algorithms in Cloud Computing Environment Based on Deep Neural Networks
Published 2025-01-01“…Transfer learning techniques and the impact of ensemble approaches are also discussed in these articles. Data privacy, security, and the impact of AI on cloud computing are expected to become more critical in the future.…”
Get full text
Article -
104
Data aggregation based on the privacy-preserving element in wireless sensor networks
Published 2012-10-01“…A distributed mechanism was proposed to protect the data privacy during the data aggregation phase.The contributions of this mechanism are:1) Privacy-preserving element taking advantage of the algebraic properties of congruence was defined.In privacy-preserving elements,privacy data could be preserved without the extra data exchange,and the aggregation result could be recovered from the perturbed data in the cluster head.2)A flexible method for generating the privacy-preserving element was given.Thus,nodes could generate their privacy-preserving element without the extra data exchange,and the method was adapted to the dynamic reporting nodes.Extensive analysis showed that:compared with the centralized mechanism,the proposed mechanism has a better resistance to data loss,can avoid the single point problem and also consumes less communication overhead; compared with the other distributed mechanisms,the proposed mechanism is able to preserve privacy more efficiently while consuming less communication overhead.…”
Get full text
Article -
105
Artificial intelligence in healthcare: A focus on the best practices
Published 2024-01-01“…However, alongside this potential, challenges and ethical considerations remain. Data privacy, algorithmic bias, transparency of AI decision-making, and responsible use are crucial areas that require careful attention. …”
Get full text
Article -
106
Tracing the Blockchain Challenges in Healthcare: A Topic Modeling and Bibliometric Analysis
Published 2024-12-01“…As a result, five critical challenges have been identified regarding the use of blockchain in healthcare including data privacy/security, scalability, governance, interoperability and standards, and cost.…”
Get full text
Article -
107
A New Solution of Privacy-Preserving Public Auditing Scheme for Cloud Storage Security
Published 2012-09-01“…However, most of the existing auditing schemes do not consider data privacy problem. In this paper, after giving a new construction of a recently proposed primitive named aggregatable signature based broadcast encryption scheme, we present an efficient public auditing scheme with privacy property. …”
Get full text
Article -
108
Systematic Literature Review on Cybersecurity Issues in the Smart Home Environment
Published 2024-12-01“…Significant gaps exist in user awareness, device interoperability, data privacy, and security protocols. A multidisciplinary approach that brings together technology, policy, and social science stakeholders is recommended to build a secure, efficient, and privacy-preserving smart home ecosystem…”
Get full text
Article -
109
Secure deduplication and integrity audit system based on convergent encryption for cloud storage
Published 2017-11-01“…Cloud storage applications quickly become the best choice of the personal user and enterprise storage with its convenience,scalability and other advantages,secure deduplication and integrity auditing are key issues for cloud storage.At first,convergent key encapsulation/decoupling algorithm based on blind signature was set up,which could securely store key and enable it to deduplicate.Besides,a BLS signature algorithm based on convergence key was provided and use TTP to store public key and proxy audit which enables signature and pubic key deduplication and reduces client storage and computing overhead.Finally,cloud-based secure deduplicaion and integrity audit system was designed and implemented.It offered user with data privacy protection,deduplication authentication,audit authentication services and lowered client and cloud computation overhead.…”
Get full text
Article -
110
Risk access control model for Hadoop
Published 2016-01-01“…Combining with access token and risk supervision, the risk access control mechanism for big data privacy protection was real-ized, which could be applied to enhance the security of Hadoop Kerberos protocol. …”
Get full text
Article -
111
Research on asynchronous robust federated learning method in vehicle computing power network
Published 2024-12-01“…To address the above issues, an asynchronous robust federated learning method was proposed, which achieves vehicle data privacy protection while improving the efficiency of model collaborative training through asynchronous execution of federated learning processes between vehicles. …”
Get full text
Article -
112
A study on Pufferfish privacy algorithm based on Gaussian mixture models
Published 2025-01-01“…By leveraging a sophisticated masking mechanism, the algorithm effectively safeguards data privacy. We derive the asymptotic expressions for the Kullback–Leibler (KL) divergence and mutual information between the original and noise-added private data, thereby providing a solid theoretical foundation for the privacy guarantees of the algorithm. …”
Get full text
Article -
113
Research on endogenous security data sharing mechanism of F-RAN for 6G
Published 2021-01-01“…In order to solve the data security problem of data sharing in the fog radio access network in the 6G mobile communication system, an endogenous secure data sharing mechanism that realized local differential privacy and dynamic batch auditing was proposed.First, the user ran the RAPPOR algorithm locally on the data to protect data privacy.Next, the fog access point cached and preprocessed the data.Then the high power node performed a data integrity audit based on the BLS signature and Merkle hash tree on the data cached on the fog access point.Finally, the BBU pool infered the original distribution of shared data through statistical analysis.Security analysis and simulation show that the proposed mechanism realizes the local differential privacy of users, supports secure multi-client batch audit and data dynamic operation, and has high efficiency in time, space and communication.…”
Get full text
Article -
114
Exploring Artificial Intelligence for Enhanced Endodontic Practice: Applications, Challenges, and Future Directions
Published 2024-01-01“…However, challenges such as data privacy issues, algorithmic biases, and integration barriers must be addressed to enable broader adoption. …”
Get full text
Article -
115
Generating unseen diseases patient data using ontology enhanced generative adversarial networks
Published 2025-01-01“…., electronic health records), holds promise for fundamental research, AI model development, and enhancing data privacy safeguards. Generative Adversarial Networks (GANs) have been employed for this purpose, but their performance is largely constrained by their reliance on training data, rendering them inadequate for rare or previously unseen diseases. …”
Get full text
Article -
116
Digital Technology Adoption in the Agriculture Sector: Challenges and Complexities in Africa
Published 2023-01-01“…These include resource scarcity, limited expertise and training, a lack of digital infrastructure, data privacy and security concerns, and resistance by farmers. …”
Get full text
Article -
117
Security Data Aggregation with Recoverable Data in Heterogeneous Wireless Sensor Network
Published 2013-11-01“…The algorithm uses homomorphism encryption techniques based on elliptic curve to address data privacy protection, and uses an efficient aggregate signature scheme to ensure data integrity and authenticity. …”
Get full text
Article -
118
The Impact of GPT Models on Education: Enhancing Learning Outcomes and Addressing Challenges
Published 2025-01-01“…It also critically examines potential issues, including data privacy concerns and the need for teachers to adapt to these new technologies. …”
Get full text
Article -
119
Comprehensive synthesis of mHealth interventions in psychiatry: insights from systematic, scoping, narrative reviews and content analysis
Published 2024-10-01“…Conclusion: Despite positive outcomes, challenges such as data privacy, user engagement and healthcare integration persist. …”
Get full text
Article -
120
Addressing 6 challenges in generative AI for digital health: A scoping review.
Published 2024-05-01“…Generative artificial intelligence (AI) can exhibit biases, compromise data privacy, misinterpret prompts that are adversarial attacks, and produce hallucinations. …”
Get full text
Article