7,264 Hits in 6.9 sec

A Healthcare Information System for Secure Delivery and Remote Management of Medical Records

Hyoung-Kee CHOI, Ki-Eun SHIN, Hyoungshick KIM
2016 IEICE transactions on information and systems  
We propose a novel security design for the HIS complying with the security and privacy rules.  ...  With the rapid merger of healthcare business and information technology, more healthcare institutions and medical practices are sharing information.  ...  Preserving the privacy of patients is achieved by encrypting the PHI and the medical records.  ... 
doi:10.1587/transinf.2015icp0007 fatcat:3dbtm3zbifed3cqzvk5u56l7va

Privacy in Targeted Advertising: A Survey [article]

Imdad Ullah, Roksana Boreli, Salil S. Kanhere
2021 arXiv   pre-print
We discuss challenges in preserving user privacy that include threats related to private information extraction and exchange among various advertising entities, privacy threats from third-party tracking  ...  , re-identification of private information and associated privacy risks.  ...  with reduced processing time and query request size can be achieved via implementing together billing with PIR using multisecret sharing scheme.  ... 
arXiv:2009.06861v3 fatcat:exocmcbupbhq5nc3gnicg3zg2i

The Challenges of Privacy and Access Control as Key Perspectives for the Future Electric Smart Grid

Anna Triantafyllou, Jose Antonio Perez Jimenez, Alejandro del Real Torres, Thomas Lagkas, Konstantinos Rantos, Panagiotis Sarigiannidis
2020 IEEE Open Journal of the Communications Society  
Efficient categorization is provided regarding the proposed privacy preserving methods and characteristics, while focus is also given on the use of the Blockchain technology and the Multi Authority Access  ...  This study presents a comprehensive overview of the latest privacy-preserving mechanisms and policies in the ESG, while promoting the employment of modern access control techniques towards preventing personal  ...  ACKNOWLEDGMENT The research leading to these results has received funding from the European Unions Horizon 2020 research and innovation programme under grant agreement No 833955.  ... 
doi:10.1109/ojcoms.2020.3037517 fatcat:2qhvityrlrdjvawlkx54wmpkna

Balancing Security and Efficiency for Smart Metering against Misbehaving Collectors

Jianbing Ni, Kuan Zhang, Xiaodong Lin, Xuemin Shen
2017 IEEE Transactions on Smart Grid  
Secure data aggregation improves communication efficiency and preserves customers' privacy, while fails to support dynamic billing, or offer integrity protection against public collectors, which may be  ...  Our analysis shows that the proposed scheme achieves secure smart metering and verifiable dynamic billing against misbehaving collectors with low computational and communication overhead.  ...  The privacy-preserving data aggregation is achieved to prevent privacy leakage and reduce communication overhead.  ... 
doi:10.1109/tsg.2017.2761804 fatcat:n7bwzrqlubaj7jhou5hsuscayu

Privacy Protection of Grid Users Data with Blockchain and Adversarial Machine Learning [article]

Ibrahim Yilmaz, Kavish Kapoor, Ambareen Siraj, Mahmoud Abouyoussef
2021 arXiv   pre-print
Our privacy-aware approach protects consumers' privacy without compromising the correctness of billing and preserves operational efficiency without use of authoritative intermediaries.  ...  with dynamic pricing programs, bidirectional information exchange ability between end-users for better consumer-operator interaction, and so on.  ...  ACKNOWLEDGMENT This work is funded by CESR (Center for Energy Systems Research) at Tennessee Technological University with resource support from the Cybersecurity Education Research and Outreach Center  ... 
arXiv:2101.06308v1 fatcat:j4fwirwtqvbfvmr7em7kyac2oa

Differential Privacy Techniques for Cyber Physical Systems: A Survey [article]

Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen
2019 arXiv   pre-print
In order to make CPSs data more secure, certain privacy preservation strategies such as encryption, and k-anonymity have been presented in the past.  ...  Modern cyber physical systems (CPSs) has widely being used in our daily lives because of development of information and communication technologies (ICT).With the provision of CPSs, the security and privacy  ...  Moreover, preserving billing information along with maintaining dynamic pricing policy needs to be addressed in different SG scenarios.  ... 
arXiv:1812.02282v3 fatcat:bnapnprldnaetjnjedz473lrme

Privacy in the age of Pervasive Internet and Big Data Analytics – Challenges and Opportunities

Saraswathi Punagin, Arti Arya
2015 International Journal of Modern Education and Computer Science  
The article reviews current privacy challenges, existing privacy preserving solutions and their limitations.  ...  However, this brings with it several privacy challengesrisk of privacy disclosure without consent, unsolicited advertising, unwanted exposure of sensitive information and unwarranted attention by malicious  ...  It is a well known fact that privacy preservation comes at the cost of utility. The more privacy preserved a data set is, lesser the information it provides.  ... 
doi:10.5815/ijmecs.2015.07.05 fatcat:twrxbhfuznbbdnzlceviavgqpu

P4G2Go: A Privacy-Preserving Scheme for Roaming Energy Consumers of the Smart Grid-to-Go

Aristeidis Farao, Eleni Veroni, Christoforos Ntantogian, Christos Xenakis
2021 Sensors  
Finally, we reason about its security and privacy properties, proving that P4G2Go achieves to fulfill the relevant objectives.  ...  This paper presents P4G2Go, a novel privacy-preserving scheme that provides strong security and privacy assertions for roaming consumers against honest but curious entities of the smart grid.  ...  Informed Consent Statement: Not applicable. Data Availability Statement: Not applicable. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s21082686 pmid:33920337 fatcat:be7kfo5cjrelnmsfe6rnqxatlm

Targeted Advertising on the Handset: Privacy and Security Challenges [chapter]

Hamed Haddadi, Pan Hui, Tristan Henderson, Ian Brown
2011 Pervasive Advertising  
Preservation of user privacy, however, is essential for successful deployment of such a system.  ...  download and privacy-aware click report dissemination.  ...  Fig. 4 4 Collecting reports via a Delay-Tolerant Network.  ... 
doi:10.1007/978-0-85729-352-7_6 dblp:series/hci/HaddadiHHB11 fatcat:65pjhgm2gjgpfnqhs2aquzedqu

Application-Oriented Selection of Privacy Enhancing Technologies [chapter]

Immanuel Kunz, Andreas Binder
2022 Lecture Notes in Computer Science  
To create privacy-friendly software designs, architects need comprehensive knowledge of existing privacy-enhancing technologies (PETs) and their properties.  ...  It integrates existing criteria like the privacy protection goal, and also considers practical criteria like the functional context, a technology's maturity, and its impact on various non-functional requirements  ...  While they could theoretically also be used to secretly release information, an engineer would not choose ZKP to achieve confidentiality.  ... 
doi:10.1007/978-3-031-07315-1_5 fatcat:zjcqii4zdvfqnaqgbmvz2sdhv4

Network Security and Privacy Challenges in Smart Vehicle-to-Grid

Neetesh Saxena, Santiago Grijalva, Victor Chukwuka, Athanasios V. Vasilakos
2017 IEEE wireless communications  
center perspective requirements Secure transmission of the SoC information for billing purpose ü ü ü Secure and privacy-preserved payment system for charging and discharging of the vehicles ü that allows  ...  Non-deniability can be achieved in the network via zero knowledge proof, wherein an EV proves a true statement to the aggregator or server.  ...  , untraceability, and forward privacy.  ... 
doi:10.1109/mwc.2016.1600039wc fatcat:qavsge37n5b2rbeomsbhkyatr4

Privacy Challenges with Protecting Live Vehicular Location Context

Matthew Bradbury, Phillip Taylor, Ugur Ilker Atmaca, Carsten Maple, Nathan Griffiths
2020 IEEE Access  
Alex Mouzakitis and Jaguar Land Rover for their involvement in the broader research programme.  ...  This combination leaks identity information (via the digital signature) and highly accurate information on where a vehicle is at a given point in time.  ...  Toll Roads and Car Parks will track vehicles to ensure the owners are correctly billed for using those services.  ... 
doi:10.1109/access.2020.3038533 fatcat:6uqpvvehonbwzfh5ybt6ezsvdu

Techniques, Taxonomy, and Challenges of Privacy Protection in the Smart Grid [chapter]

Suleyman Uludag, Sherali Zeadally, Mohamad Badra
2015 Computer Communications and Networks  
As the ease with which any data are collected and transmitted increases, more privacy concerns arise leading to an increasing need to protect and preserve it.  ...  The Smart Grid (SG) is no exception with its key characteristics aimed at supporting bi-directional information flow between the consumer of electricity and the utility provider.  ...  Differential privacy yields plausible deniability to blur the data hidden behind. It is about an information-releasing algorithm with a mathematical underlying model.  ... 
doi:10.1007/978-3-319-08470-1_15 fatcat:eidtx25w2nc6rpl2b6uvcrblqi

P3: Privacy preservation protocol for appliance control application

Depeng Li, Zeyar Aung, John Williams, Abel Sanchez
2012 2012 IEEE Third International Conference on Smart Grid Communications (SmartGridComm)  
Without a consistent privacy preservation mechanism, the appliance control system can capture, model and divulge customers' behavior, activities, and personal information at almost every level of society  ...  To address recently emerging concerns on privacy violations, this paper investigates possible sensitive information leakages in the appliance control, which is one of the handiest and most visible applications  ...  develop a practical appliance control system with the privacy preservation property via integrating P3.  ... 
doi:10.1109/smartgridcomm.2012.6485999 dblp:conf/smartgridcomm/LiAWS12 fatcat:aa7dt6dh5rcoxpksiwrwowq5a4


Muhammad Akbar Husnoo, Adnan Anwar, Ripon K. Chakrabortty, Robin Doss, Mike J. Ryan
2021 IEEE Access  
In the past, researchers have employed several privacy preservation approaches including cryptographic encryption and k-anonymity to secure IoT-enabled critical infrastructure.  ...  Therefore, Dwork's differential privacy has emerged as the most viable privacy preservation strategy for IoT-enabled critical infrastructure.  ...  Yin et al. proposed a DP-based location privacy preservation mechanism without compromising on data utility for IIoT via building a multilevel location information tree model and select data according  ... 
doi:10.1109/access.2021.3124309 fatcat:vejtyjyrwffeffi7ob2o2svyja
« Previous Showing results 1 — 15 out of 7,264 results