-
1
Blockchain data sharing scheme based on localized difference privacy and attribute-based searchable encryption
Published 2023-05-01“…Aiming at the problem that traditional cloud-based data sharing schemes rely on trusted third parties and only focus on data privacy protection or access control, a blockchain data sharing scheme based on localized difference privacy and attribute-based searchable encryption was proposed.The blockchain and cloud server were combined to store data chain by chain and provide efficient, reliable and tamper-proof data sharing.Firstly, the localization difference privacy was introduced to preprocess the shared data to protect the privacy of the data owner and resist the attack of the untrusted third party.Secondly, the searchable encryption technology and attribute-based encryption were combined to realize data privacy protection, support ciphertext retrieval, and provide fine-grained access control for shared data.Finally, the safety, the correctness proof, and the experimental analysis proves that the proposed scheme meets the safety objectives.…”
Get full text
Article -
2
Blockchain data sharing scheme based on localized difference privacy and attribute-based searchable encryption
Published 2023-05-01“…Aiming at the problem that traditional cloud-based data sharing schemes rely on trusted third parties and only focus on data privacy protection or access control, a blockchain data sharing scheme based on localized difference privacy and attribute-based searchable encryption was proposed.The blockchain and cloud server were combined to store data chain by chain and provide efficient, reliable and tamper-proof data sharing.Firstly, the localization difference privacy was introduced to preprocess the shared data to protect the privacy of the data owner and resist the attack of the untrusted third party.Secondly, the searchable encryption technology and attribute-based encryption were combined to realize data privacy protection, support ciphertext retrieval, and provide fine-grained access control for shared data.Finally, the safety, the correctness proof, and the experimental analysis proves that the proposed scheme meets the safety objectives.…”
Get full text
Article -
3
-
4
Adaptive personalized privacy-preserving data collection scheme with local differential privacy
Published 2024-04-01“…Local differential privacy (LDP) is a state-of-the-art privacy notion that enables terminal participants to share their private data safely while controlling the privacy disclosure at the source. …”
Get full text
Article -
5
Enhancing Privacy in Lightweight Data Encoding for Sensitive Applications
Published 2025-01-01“…We also introduce the Utility-optimized Bloom Filter (UBF), a privacy-preserving mechanism grounded in User-Level Local Differential Privacy (ULDP), which offers formal and quantifiable privacy guarantees. …”
Get full text
Article -
6
-
7
IFed: A novel federated learning framework for local differential privacy in Power Internet of Things
Published 2020-05-01“…Last, users were categorized based on different levels of privacy requirements, and stronger privacy guarantee was provided for sensitive users. …”
Get full text
Article -
8
Employing Ontology-Alignment and Locality-Sensitive Hashing to Improve Attribute Interoperability in Federated eID Systems
Published 2016-10-01“…Furthermore, providing attributes to intermediate entities required to align and aggregate attributes potentially violates privacy rules. To tackle these problems, we propose the use of combined ontology-alignment (OA) approaches and locality-sensitive hashing (LSH) functions. …”
Get full text
Article -
9
Reversible Data Hiding Algorithm in Encrypted Images with Difference Encoding and Block Compression
Published 2024-07-01“…With the development of digital information and cloud-computing technology toward maturity, reversible hiding of data in encrypted images is gradually becoming an area of intensive research for protection of data privacy in communications. Nonetheless, notable challenges still exist regarding achieving greater compression of carriers to enhance embedding capacity by adaptive-recognition coding of pixels in local areas based on the distribution characteristics of pixels in different cover images. …”
Get full text
Article -
10
Novel Bounds for Incremental Hessian Estimation With Application to Zeroth-Order Federated Learning
Published 2024-01-01Get full text
Article -
11
Quantization-based chained privacy-preserving federated learning
Published 2025-05-01“…Abstract Federated Learning (FL) is an advanced distributed machine learning framework crucial in protecting data privacy and security. By enabling multiple participants to train models while keeping their data local collaboratively, FL effectively mitigates the risks associated with centralized storage and sharing of raw data. …”
Get full text
Article -
12
Privacy-preserving federated learning framework with dynamic weight aggregation
Published 2022-10-01“…There are two problems with the privacy-preserving federal learning framework under an unreliable central server.① A fixed weight, typically the size of each participant’s dataset, is used when aggregating distributed learning models on the central server.However, different participants have non-independent and homogeneously distributed data, then setting fixed aggregation weights would prevent the global model from achieving optimal utility.② Existing frameworks are built on the assumption that the central server is honest, and do not consider the problem of data privacy leakage of participants due to the untrustworthiness of the central server.To address the above issues, based on the popular DP-FedAvg algorithm, a privacy-preserving federated learning DP-DFL algorithm for dynamic weight aggregation under a non-trusted central server was proposed which set a dynamic model aggregation weight.The proposed algorithm learned the model aggregation weight in federated learning directly from the data of different participants, and thus it is applicable to non-independent homogeneously distributed data environment.In addition, the privacy of model parameters was protected using noise in the local model privacy protection phase, which satisfied the untrustworthy central server setting and thus reduced the risk of privacy leakage in the upload of model parameters from local participants.Experiments on dataset CIFAR-10 demonstrate that the DP-DFL algorithm not only provides local privacy guarantees, but also achieves higher accuracy rates with an average accuracy improvement of 2.09% compared to the DP-FedAvg algorithm models.…”
Get full text
Article -
13
Fine-grained privacy operation control method for layout documents
Published 2023-05-01“…In view of the problem of privacy information disclosure caused by uncontrolled forwarding in the context of frequent exchange of privacy information, a fine-grained privacy operation control method for layout documents was proposed, which could achieve differentiated fine-grained privacy operation control according to the requirements of the sharer during the sharing process of privacy information.For the received multimodal layout document, the existing privacy operation control strategy was extracted, which combined the current sharer’s use attribute and the receiver’s privacy protection ability and other factors.The privacy operation control strategy was generated iteratively, and an abstract control strategy generation algorithm framework was given.Based on the iterative privacy operation control strategy and combined with specific operation scenarios, the differentiated data-masking control, exchange boundary control and local use control were carried out for different modes of information components, and the abstract privacy operation control algorithm framework was given.A prototype system for privacy operation control of OFD (open fixed-layout document) was developed to verify the above algorithms.The generation and delivery of iterative privacy operation control strategy based on friendship, as well as the differential data-masking control, exchange boundary control and local use control of OFD were implemented in the instant messaging system.…”
Get full text
Article -
14
A Novel Approach for Differential Privacy-Preserving Federated Learning
Published 2025-01-01“…Our analysis reveals that, as far as only one local iteration is performed by each client before transmitting to the parameter server (PS) for FedGD, both FedGD and FedAvg achieve the same accuracy/loss for the same privacy guarantees, despite requiring different perturbation noise power. …”
Get full text
Article -
15
Analysis of security and privacy challenges of smart health and sensing systems
Published 2024-12-01“…However, one of the major challenges faced by this system is the security and privacy of patient health data, which is considered vulnerable to local intruders and cyber attackers. …”
Get full text
Article -
16
A Survey on Secure WiFi Sensing Technology: Attacks and Defenses
Published 2025-03-01Get full text
Article -
17
Review of privacy computing techniques for multi-party data fusion analysis
Published 2024-12-01“…In terms of multi-party privacy information sharing control, localized control, extended control, and anonymization control techniques were discussed. …”
Get full text
Article -
18
A multimodal differential privacy framework based on fusion representation learning
Published 2022-12-01“…Then based on this representation, we use the Local Differential Privacy (LDP) mechanism to protect data. …”
Get full text
Article -
19
Hidden Anchor: A Lightweight Approach for Physical Layer Location Privacy
Published 2010-01-01“…In this paper, we propose Hidden Anchor, an algorithm that provides anchor physical layer location privacy for different classes of localization algorithms. …”
Get full text
Article -
20
FDAE: Lightweight Privacy Protection Based on Face Detection and Image Encryption
Published 2025-01-01“…Moreover, the decrypted images exhibit negligible differences from the original ones, making FDAE well-suited for batch image processing tasks and practical privacy protection applications.…”
Get full text
Article