5,066 Hits in 5.7 sec

From Centralized Protection to Distributed Edge Collaboration: A Location Difference-Based Privacy-Preserving Framework for Mobile Crowdsensing

Zihao Shao, Huiqiang Wang, Yifan Zou, Zihan Gao, Hongwu Lv, Stelvio Cimato
2021 Security and Communication Networks  
The theoretical analysis and simulation results demonstrate the security and efficiency of the proposed framework in location difference-based privacy-preserving.  ...  For remote regions, based on a more realistic distance calculation mode, we design a Paillier Encryption Data Coding (PDC) privacy-preserving method that realizes the secure computation for users' location  ...  [25] proposed a privacy-preserving truth discovery scheme based on the Paillier encryption.  ... 
doi:10.1155/2021/5855745 fatcat:beeydrrqzvd5lgvxr3h6jvxp6e

LPTD: Achieving Lightweight and Privacy-Preserving Truth Discovery in CIoT [article]

Chuan Zhang, Liehuang Zhu, Chang Xu, Kashif Sharif, Xiaojiang Du, Mohsen Guizani
2018 arXiv   pre-print
This article proposes a novel framework for lightweight and privacy-preserving truth discovery called LPTD-I, which is implemented by incorporating fog and cloud platforms, and adopting the homomorphic  ...  Although existing schemes of truth discovery can be executed with strong privacy guarantees, they are not efficient or cannot be applied in real-life CIoT applications.  ...  Conclusion This article proposes two lightweight and privacy preserving truth discovery schemes for CIoT.  ... 
arXiv:1804.02060v1 fatcat:ca4z3ox4bje4dmklgjlp3yc5yq

A Survey on Security, Privacy, and Trust in Mobile Crowdsourcing

Wei Feng, Zheng Yan, Hengrun Zhang, Kai Zeng, Yu Xiao, Y. Thomas Hou
2018 IEEE Internet of Things Journal  
., smart phones and wearable devices), mobile crowdsourcing (MCS) has emerged as an effective method for data collection and processing.  ...  We analyze the characteristics of MCS, identify its security threats, and outline essential requirements on a secure, privacy-preserving, and trustworthy MCS system.  ...  efficient data analysis and real truth discovery.  ... 
doi:10.1109/jiot.2017.2765699 fatcat:eapkruonuzh6hhzppoumnonlhq

Guest Editorial Special Issue on Trust, Security, and Privacy in Crowdsourcing

Zheng Yan, Kai Zeng, Yu Xiao, Thomas hou, Pierangela Samarati
2018 IEEE Internet of Things Journal  
In the paper titled "Efficient and Privacy-preserving Proximity Detection Scheme for Social Applications", Zhu et al. proposed two efficient and privacy-preserving proximity detection schemes, named AGRQ-P  ...  For data truth discovery, applicable solutions include correlation-based data quality analysis and trust evaluation of data sources.  ... 
doi:10.1109/jiot.2018.2860302 fatcat:jsi4pc4lerbh3mqz66bmhmxhzy

Fuzzy Framework for Preserving Privacy in Neural Networks Classification

Majid Bashir, M. Asger, Rashid Ali, Tasleem Arif
2016 International Journal of Computer Applications  
has been preserved as in the absence of integrated privacy constraints.  ...  Neural networks, as a classification technique has emerged as an important soft computing based approach in data mining. It is being used widely in healthcare for prediction and analysis.  ...  preservation mechanism.  ... 
doi:10.5120/ijca2016910290 fatcat:y6cvcorlhzdsxa6sxnzn743ake

IEEE Access Special Section Editorial: Security and Privacy in Emerging Decentralized Communication Environments

Xiaochun Cheng, Zheli Liu, Xiaojiang Du, Shui Yu, Leonardo Mostarda
2021 IEEE Access  
The article "A lightweight privacy-preserving protocol for VANETs based on secure outsourcing computing," by Wei et al., proposes an identity-based signature that achieves unforgeability against chosen-message  ...  As a result, the chances of data leakage or privacy infringement also increase, along with the need for new solutions for digital security and privacy protection.  ...  The authors presented an efficient privacy-preserving machine learning scheme for multiple data providers.  ... 
doi:10.1109/access.2021.3075818 fatcat:7t3tgqarsndc5dq2gulr7hapzi

Differential Privacy in Blockchain Technology: A Futuristic Approach [article]

Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen
2020 arXiv   pre-print
In this article, we cover the topic of integration of differential privacy in each layer of blockchain and in certain blockchain based scenarios.  ...  Blockchain works over peer-to-peer (P2P) phenomenon for its operation and does not require any trusted-third party authorization for data tracking and storage.  ...  To cope with these challenges, one of the most effective way is the integration of an efficient privacy preserving mechanism (such as differential privacy) in such networks. a) Case Study: As an illustrative  ... 
arXiv:1910.04316v3 fatcat:u2fdtysuszburar73b5pdd4ezu

Differential Privacy in Cognitive Radio Networks: A Comprehensive Survey [article]

Muneeb Ul Hassan, Mubashir Husain Rehmani, Maaz Rehan, Jinjun Chen
2021 arXiv   pre-print
In order to preserve this privacy leakage, various privacy preserving strategies have been developed by researchers, and according to us differential privacy is the most significant among them.  ...  Background/Introduction: Integrating cognitive radio (CR) with traditional wireless networks is helping solve the problem of spectrum scarcity in an efficient manner.  ...  Therefore, it is important to integrate a privacy preservation mechanism in order to protect privacy in an efficient manner.  ... 
arXiv:2111.02011v2 fatcat:a5hique4fvfxrclslvpgda5jyy

Anonymization Framework for IoT Resource Discovery based on Edge Centric Privacy Model

2020 International Journal of Engineering and Advanced Technology  
In this paper we have developed a system that uses fog computing approach to perform various tasks and filters the sensitive data, thus helps in preserving privacy.  ...  Due to resource-constrained sensing devices, IoT infrastructures use Edge devices for real-time data processing.  ...  [6] introduced an indexing mechanism for IoT resources to retrieve their data in an efficient manner using data discovery services.  ... 
doi:10.35940/ijeat.b2109.1210220 fatcat:kl3xz6spmbeurgtm7dlvdxnojy

Truth Inference on Sparse Crowdsourcing Data with Local Differential Privacy [article]

Haipei Sun, Boxiang Dong, Hui Wang, Ting Yu, Zhan Qin
2018 arXiv   pre-print
Thus we design an efficient new matrix factorization (MF) algorithm under LDP.  ...  Crowdsourcing has arisen as a new problem-solving paradigm for tasks that are difficult for computers but easy for humans.  ...  The authors propose a two-layer perturbation mechanism based on randomized response to protect worker privacy, while providing high accuracy for truth discovery.  ... 
arXiv:1808.08181v1 fatcat:e764nxozmbd6dnfekms3nprjxi

When Blockchain Meets Auction Models: A Survey, Some Applications, and Challenges [article]

Zeshun Shi, Cees de Laat, Paola Grosso, Zhiming Zhao
2021 arXiv   pre-print
As an essential market process, auctions have been well studied and applied in many business fields due to their efficiency and contributions to fair trade.  ...  In recent years, blockchain has gained widespread attention as an emerging technology for decentralization, transparency, and immutability in advancing online activities over public networks.  ...  [107] designed a privacy-preserving double auction mechanism for blockchainenabled spectrum sharing using the differential privacy technology. Wang et al.  ... 
arXiv:2110.12534v1 fatcat:tpy2cv7sz5dc3dpchnmrniab5e

Smart Privacy Protection for Big Video Data Storage Based on Hierarchical Edge Computing

Di Xiao, Min Li, Hongying Zheng
2020 Sensors  
The non-key frame is compressed with the two-layer parallel compressive sensing and encrypted by the 2D logistic-skew tent map and then transmitted to the cloud.  ...  To effectively provide smart privacy protection for video data storage, we take full advantage of three patterns (multi-access edge computing, cloudlets and fog computing) of edge computing to design the  ...  Acknowledgments: We thank the editor and anonymous reviewers for their diligent work on our paper. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s20051517 pmid:32164160 fatcat:akq2lt6y3fftbkj5jpa72uhfdm

Preserving Privacy and Optimizing Neural Network Classification by using a Mix of Soft Computing Techniques

Majid Bashir, M. Asger, Rashid Ali, Tasleem Arif
2016 International Journal of Computer Applications  
An Artificial Neural Network (ANN) commonly called as Neural Network (NN) is a mathematical tool that is used in data mining for the analysis of data.  ...  This study attempts to optimize the results of NN classification on one hand and address the problem of training time consumption on the other along with preserving privacy of the stakeholders.  ...  INTRODUCTION Data mining is an automated knowledge discovery mechanism from huge repositories of data [1] . The focus is to gain insight into large volumes of data for a better life.  ... 
doi:10.5120/ijca2016911188 fatcat:kuqxk77u7bdtbm5v2zkd5djxly

Incentive Compatibility, Scalability and Privacy in real time Demand Response [article]

Georgios Tsaousoglou, Konstantinos Steriotis, Nikolaos Efthymiopoulos, Prodrommos Makris, Emmanouel Varvarigos
2019 arXiv   pre-print
In this paper, we propose a DR architecture, including a mechanism based on Ausubel clinching auction and a communication protocol, that provably guarantee both efficiency and truthful user participation  ...  From a game theoretic perspective, the basic key performance indicators (KPIs) for such DR mechanisms are efficiency in terms of social welfare, practical applicability, and incentive guarantees, in the  ...  In what follows we present a distributed communication protocol that preserves privacy while simultaneously ensuring an efficient allocation.  ... 
arXiv:1902.09251v1 fatcat:oqev4l6dnvdx5gs4uos372w4yi

Privacy-Preserving Schemes for Ad Hoc Social Networks: A Survey

Mohamed Amine Ferrag, Leandros Maglaras, Ahmed Ahmim
2017 IEEE Communications Surveys and Tutorials  
In addition, an overview of recommendations for further research is also provided.  ...  With this survey, readers can have a more thorough understanding of research trends in privacy-preserving schemes for ad hoc social networks.  ...  Quantum cryptographic techniques provide an additional layer of security and privacy preservation of the system.  ... 
doi:10.1109/comst.2017.2718178 fatcat:pmlbjv3dnvfclfoqg2pnxlc7mi
« Previous Showing results 1 — 15 out of 5,066 results