Showing 161 - 180 results of 2,784 for search '((((( useds OR usedds) OR useddds) OR uses) privacy data ) OR ( use privacy data ))', query time: 0.37s Refine Results
  1. 161

    Efficient privacy-preserving image retrieval scheme over outsourced data with multi-user by Xiangyu WANG, Jianfeng MA, Yinbin MIAO

    Published 2019-02-01
    “…The traditional privacy-preserving image retrieval schemes not only bring large computational and communication overhead,but also cannot protect the image and query privacy in multi-user scenarios.To solve above problems,an efficient privacy-preserving content-based image retrieval scheme was proposed in multi-user scenarios.The scheme used Euclidean distance comparison technique to rank the pictures according to similarity of picture feature vectors and return top-k returned.Meanwhile,the efficient key conversion protocol designed in proposed image retrieval scheme allowed each search user to generate queries based on his own private key so that he can retrieval encrypted images generated by different data owners.Strict security analysis shows that the user privacy and cloud data security can be well protected during the image retrieval process,and the performance analysis using real-world dataset shows that the proposed image retrieval scheme is efficient and feasible in practical applications.…”
    Get full text
    Article
  2. 162
  3. 163

    Efficient and privacy-preserving certificateless data aggregation in Internet of things–enabled smart grid by Aijing Sun, Axin Wu, Xiaokun Zheng, Fangyuan Ren

    Published 2019-04-01
    “…If the user’s electricity consumption is transmitted in plaintext, the data may be used by some illegal users. At the same time, malicious users may send false data such that the control center makes a wrong power resource scheduling. …”
    Get full text
    Article
  4. 164

    Privacy-preserving federated learning for collaborative medical data mining in multi-institutional settings by Rahul Haripriya, Nilay Khare, Manish Pandey

    Published 2025-04-01
    “…Abstract Ensuring data privacy in medical image classification is a critical challenge in healthcare, especially with the increasing reliance on AI-driven diagnostics. …”
    Get full text
    Article
  5. 165

    An explainable federated blockchain framework with privacy-preserving AI optimization for securing healthcare data by Tanisha Bhardwaj, K. Sumangali

    Published 2025-07-01
    “…Abstract With the rapid growth of healthcare data and the need for secure, interpretable, and decentralized machine learning systems, Federated Learning (FL) has emerged as a promising solution. …”
    Get full text
    Article
  6. 166

    Decoding privacy concerns: the role of perceived risk and benefits in personal health data disclosure by Havva Nur Atalay, Şebnem Yücel

    Published 2024-10-01
    “…Results The analysis revealed a significant negative relationship between individuals’ personal health data disclosure behaviour and their privacy concerns. …”
    Get full text
    Article
  7. 167

    Shuffled differential privacy protection method for K-Modes clustering data collection and publication by Weijin JIANG, Yilin CHEN, Yuqing HAN, Yuting WU, Wei ZHOU, Haijuan WANG

    Published 2024-01-01
    “…Aiming at the current problem of insufficient security in clustering data collection and publication, in order to protect user privacy and improve data quality in clustering data, a privacy protection method for K-Modes clustering data collection and publication was proposed without trusted third parties based on the shuffled differential privacy model.K-Modes clustering data collection algorithm was used to sample the user data and add noise, and then the initial order of the sampled data was disturbed by filling in the value domain random arrangement publishing algorithm.The malicious attacker couldn’t identify the target user according to the relationship between the user and the data, and then to reduce the interference of noise as much as possible a new centroid was calculated by cyclic iteration to complete the clustering.Finally, the privacy, feasibility and complexity of the above three methods were analyzed from the theoretical level, and the accuracy and entropy of the three real data sets were compared with the authoritative similar algorithms KM, DPLM and LDPKM in recent years to verify the effectiveness of the proposed model.The experimental results show that the privacy protection and data quality of the proposed method are superior to the current similar algorithms.…”
    Get full text
    Article
  8. 168

    A controllable privacy data transmission mechanism for Internet of things system based on blockchain by ZiXiang Nie, YuanZhenTai Long, SenLin Zhang, YueMing Lu

    Published 2022-03-01
    “…With the in-depth integration of traditional industries and information technology in Internet of things, wireless sensor networks are used more frequently to transmit the data generated from various application scenarios. …”
    Get full text
    Article
  9. 169

    Preserving Big Data Privacy in Cloud Environments Based on Homomorphic Encryption and Distributed Clustering by Shatha A. Baker

    Published 2024-03-01
    “… Cloud computing has grown in popularity in recent years because to its efficiency, flexibility, scalability, and the services it provides for data storage and processing. Still, big businesses and organizations have severe concerns about protecting privacy and data security while processing these massive volumes of data. …”
    Get full text
    Article
  10. 170

    Precision-Enhanced and Encryption-Mixed Privacy-Preserving Data Aggregation in Wireless Sensor Networks by Geng Yang, Sen Li, Xiaolong Xu, Hua Dai, Zhen Yang

    Published 2013-04-01
    “…Security is always a hot topic in wireless sensor networks (WSNs). Privacy-preserving data aggregation has emerged as an important concern in designing data aggregation algorithm. …”
    Get full text
    Article
  11. 171

    Time-based and privacy protection revocable and traceable data sharing scheme in cloud computing by Jiawei ZHANG, Jianfeng MA, Zhuo MA, Teng LI

    Published 2021-10-01
    “…General ciphertext-policy attribute-based encryption (CP-ABE) provides fine-grained access control for data sharing in cloud computing, but its plaintext formed access policy may cause leakage of private and sensitive data.And revoking a malicious user by accurately tracing the identity according to a leaked decryption key is a huge challenge.Moreover, most of existing revocable schemes incur long user revocation list and low efficiency.To solve these problems, a time-based and privacy preserving revocable and traceable data sharing scheme was proposed based on CP-ABE to support expressive monotonic and partial hidden access policy, large attribute universe by conceal the attribute values in access policy.Time-limited data access control using hierarchical identity-based encryption was achieved to set key valid period for users.Moreover, with the approaches of white-box tracing and binary tree, efficient user tracing and direct revocation with shorter revocation list was realized together with high efficiency via online/offline and verifiable outsourced decryption techniques.Furthermore, the scheme was secure under decisional q-BDHE assumption.Theoretical analysis and extensive experiments demonstrate its advantageous performance in computational and storage cost.…”
    Get full text
    Article
  12. 172
  13. 173

    Advancing Data Privacy in Cloud Storage: A Novel Multi-Layer Encoding Framework by Kamta Nath Mishra, Rajesh Kumar Lal, Paras Nath Barwal, Alok Mishra

    Published 2025-07-01
    “…Data privacy is a crucial concern for individuals using cloud storage services, and cloud service providers are increasingly focused on meeting this demand. …”
    Get full text
    Article
  14. 174

    South African Electoral Commission’s mobile app for voters: Data privacy and security dimensions by Nawal Omar, Scott Timcke

    Published 2024-12-01
    “…The analysis revealed several security and privacy concerns, including inadequately secured API keys, the potential for unauthorised access, and the potential for data breaches. …”
    Get full text
    Article
  15. 175

    Privacy Risk Assessment of Medical Big Data Based on Information Entropy and FCM Algorithm by Xiaoliang Zhang, Tianwei Guo

    Published 2024-01-01
    “…However, the high sensitivity and privacy of medical data also bring serious security challenges. …”
    Get full text
    Article
  16. 176

    DP-FedCMRS: Privacy-Preserving Federated Learning Algorithm to Solve Heterogeneous Data by Yang Zhang, Shigong Long, Guangyuan Liu, Junming Zhang

    Published 2025-01-01
    “…In federated learning, non-independently and non-identically distributed heterogeneous data on the clients can limit both the convergence speed and model utility of federated learning, and gradients can be used to infer original data, posing a threat to user privacy. …”
    Get full text
    Article
  17. 177

    Multi-party summation query method based on differential privacy by Xianmang HE

    Published 2020-06-01
    “…Differential privacy is considered to be a very reliable protection mechanism because it does not require the a prior knowledge for the attacker.However,differential privacy is rarely used in a multi-party environment.In view of this,the differential privacy is applied to the data summation query in multi-party environment.This method was described in detail and proved the security of the method.…”
    Get full text
    Article
  18. 178

    A decentralized privacy-preserving framework for diabetic retinopathy detection using federated learning and blockchain by Omar Dib

    Published 2025-06-01
    “…Diabetic Retinopathy (DR) detection in distributed telemedicine environments requires secure, scalable, and privacy-preserving solutions. Traditional federated learning (FL) relies on a central server, raising concerns about data privacy and system trust. …”
    Get full text
    Article
  19. 179

    Efficient and Privacy-Preserving Decision Tree Inference via Homomorphic Matrix Multiplication and Leaf Node Pruning by Satoshi Fukui, Lihua Wang, Seiichi Ozawa

    Published 2025-05-01
    “…Cloud computing is widely used by organizations and individuals to outsource computation and data storage. …”
    Get full text
    Article
  20. 180

    Privacy-preserving detection and classification of diabetic retinopathy using federated learning with FedDEO optimization by Dasari Bhulakshmi, Dharmendra Singh Rajput

    Published 2024-12-01
    “…FL enables collaborative learning across multiple decentralized devices while maintaining data privacy. FedDEO optimization enhances the model's performance by fine-tuning hyperparameters in a distributed manner. …”
    Get full text
    Article