A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Hybrid Data Privacy and Anonymization Algorithms for Smart Health Applications
2021
SN Computer Science
In this work, k-anonymity, differential privacy, k-map, -diversity and a hybrid of the three algorithms combined with ℓ-diversity have been analyzed using algorithms running on a raspberry pi (edge) for ...
The results demonstrated a difference in using stand-alone algorithms in terms of output anonymized dataset, execution time, information loss, risk analysis, and statistical analysis. ...
Acknowledgements The authors would like to thank the University of Mauritius for the necessary facilities provided towards the proper conduction of this work. ...
doi:10.1007/s42979-021-00547-2
fatcat:ybhyz5b7jrd2lhhpjhnynjjzwa
Novel Block Chain Technique for Data Privacy and Access Anonymity in Smart Healthcare
2023
Intelligent Automation and Soft Computing
The detected data is anonymized in the device and stored in the cloud server using the Linear Scaling based Rider Optimization algorithm with integrated KL Anonymity (LSR-KLA) approach. ...
A unique blockchain-based technique is proposed to improve anonymity in terms of data access and data privacy to overcome the above-mentioned issues. ...
Acknowledgement: The author with a deep sense of gratitude would thank the supervisor for his guidance and constant support rendered during this research. ...
doi:10.32604/iasc.2023.025719
fatcat:sbhgaikg5jhflaed5zigzvwlvq
Anonymous Attestation for IoT
[article]
2019
IACR Cryptology ePrint Archive
In this paper, we present a small footprint anonymous attestation solution based on EPID that can meet the stringent resource requirements of IoT devices. ...
The EPID SW stack has a small object code footprint of 22kB. We developed a prototype on a 32-bit microcontroller that computes EPID signature generation in 17.9s at 32MHz. ...
In this paper, we have proposed a design for small footprint anonymous attestation based on EPID, and built a prototype to demonstrate its feasibility for IoT. ...
dblp:journals/iacr/GhoshRMS19
fatcat:qr6o4gdklze5jhxilejyohuamq
In-Memory Data Anonymization Using Scalable and High Performance RDD Design
2020
Electronics
We propose "SparkDA" which is a new novel anonymization technique that is designed to take the full advantage of Spark platform to generate privacy-preserving anonymized dataset in the most efficient way ...
Our proposal offers a better partition control, in-memory operation and cache management for iterative operations that are heavily utilised for data anonymization processing. ...
Generalization Hierarchy
13 end 14 end 15 for Algorithm 1: FlatMapRDD. ...
doi:10.3390/electronics9101732
fatcat:5xqrmm7yfrbm3panznzjardsii
Secure k-Anonymization over Encrypted Databases
[article]
2021
arXiv
pre-print
Data protection algorithms are becoming increasingly important to support modern business needs for facilitating data sharing and data monetization. ...
Anonymization is an important step before data sharing. Several organizations leverage on third parties for storing and managing data. ...
[23] proposed an efficient k-anonymization algorithm called k-member, which is useful in identifying required generalization to apply k-anonymity to a given dataset. ...
arXiv:2108.04780v1
fatcat:5fng4fjm5ncyxbiomhef7ucyme
Heap Bucketization Anonymity—An Efficient Privacy-Preserving Data Publishing Model for Multiple Sensitive Attributes
2022
IEEE Access
The publication of a patient's dataset is essential for various medical investigations and decision-making. ...
The quasi-identifier is anonymized by implementing k-anonymity and slicing and the sensitive attributes are anonymized by applying slicing and Heap Bucketization. ...
A novel method called ''MSAs generalization correlation attacks'' was proposed for 1:M microdata for multiple sensitive attributes. ...
doi:10.1109/access.2022.3158312
fatcat:dczviwjavnh6pmtklaz5udhp7m
D3.1 - Requirements for data crawling, integration and anonymization
2018
Zenodo
for enabling data anonymization and encryption. ...
This report summarizes the functional requirements for all WP3 tasks, in terms of: (i) data sources that will be collected in the context of CUTLER pilots, (ii) data cleaning methodologies, collection ...
When considering an anonymization strategy for data, there is no generic solution that optimizes privacy and data utility. ...
doi:10.5281/zenodo.3385901
fatcat:h2tfycs5arbttiedi5x35kuj4a
Botnet Detection in Anonymous Networks
2018
Autonomous Infrastructure, Management and Security
is a single-track event integrating regular conference paper sessions, hands-on lab, and a PhD student workshop into a highly interactive event. ...
AIMS 2018 -which took place during June 4-6, 2018 in Neubiberg, Germany and was hosted by the Universität der Bundeswehr München, Germany -was the twelfth edition of a conference series on management and ...
Acknowledgement
Acknowledgement This work was supported in part by a grant from the University Research Board of the American University of Beirut, Lebanon. Acknowledgments. ...
dblp:conf/aims/KuhnertSB18
fatcat:745qy2tejngb5apqlse4sn3djm
VoIP Traffic Detection in Tunnelled and Anonymous Networks Using Deep Learning
2021
IEEE Access
[51] investigated anonymity tools for network TC purpose via a hierarchical approach. The proposed hierarchial approach consists of four ML based classifiers, i.e. ...
[25] focused on identifying IoT devices and behavior in a smart home. ...
Author Name: Preparation of Papers for IEEE Access (February 2017) VOLUME XX, 2017 9 Author Name: Preparation of Papers for IEEE Access (February 2017) VOLUME XX, 2017 9 ...
doi:10.1109/access.2021.3073967
fatcat:rdeatf6ghrgbhjkg5th4p4aqte
Data-sharing markets for integrating IoT data processing functionalities
2021
CCF Transactions on Pervasive Computing and Interaction
For the second, we propose an information-integration model for IoT platforms. ...
Hence we need to explore other approaches to integration for IoT platforms. ...
In data publication we focus on k-anonymity because we have just slightly sensitive data that can be anonymized easily without much risk. Our goal is to use k-anonymity also for data streams. ...
doi:10.1007/s42486-020-00054-y
fatcat:fyjfrti5fbdutjiapnqt44hwm4
A survey of privacy-preserving mechanisms for heterogeneous data types
2021
Computer Science Review
In this paper, we perform a thorough study of the state of the art on the following topics: heterogeneous data types, PPMs, and tools for privacy protection. ...
Building from the achieved knowledge, we propose a privacy taxonomy that establishes a relation between different types of data and suitable PPMs for the characteristics of those data types. ...
Li et al. proposed the first algorithm based on k-anonymity for streaming data: Stream K-anonYmity (SKY) [70] . ...
doi:10.1016/j.cosrev.2021.100403
fatcat:g77hxznnjfdxjjj52sxsjenlzy
Revealing the Landscape of Privacy-Enhancing Technologies in the Context of Data Markets for the IoT: A Systematic Literature Review
[article]
2022
arXiv
pre-print
Furthermore, there is no consensus on the appropriate use of blockchain technology for IoT data markets and a low degree of leveraging existing libraries or reusing generic data market architectures. ...
To accomplish this goal, we conducted a systematic literature review on privacy enhancement in data markets for the IoT, covering 50 publications dated up to July 2020, and provided updates with 24 publications ...
, Regional Development and Energy for their funding of the project "Fraunhofer Blockchain Center (20-3066-2-6-14)" that made this paper possible. ...
arXiv:2107.11905v2
fatcat:fy4fa4gvubcqzfv2wollbigbae
A Survey on Privacy Properties for Data Publishing of Relational Data
2020
IEEE Access
To counter information leakage, a number of data anonymisation methods have been proposed during the past few years, including k-anonymity, -diversity, t-closeness, to name a few. ...
The scope of this work is to provide an in-depth overview of the current state of the art in Privacy-Preserving Data Publishing (PPDP) for relational data. ...
Yet, data publishers do not usually have the technical background to provide a properly processed dataset that is optimal for data mining algorithms while it does not compromise the privacy of individuals ...
doi:10.1109/access.2020.2980235
fatcat:vc4p6lb57bb4bprb3ll3xxaqzu
HIBAF: A data security scheme for fog computing
2021
Journal of High Speed Networks
We devise and develop a four-level Hierarchical Identity Based Architecture for Fog Computing (HIBAF) data security scheme to enhance data security. ...
We present an Identity Based Encryption (IBE) scheme to secure data security and transmission in fog clouds and IoT ecosystems. ...
Microservices in the Cloud.' ...
doi:10.3233/jhs-210673
fatcat:kagraurxwjgefdnaagqgkdhq5i
Security and Privacy Based Data Sharing in Cloud Computing
2018
International Journal of Innovative Research in Engineering & Management
is protected in a fine-grained way by adopting the attribute based encryption technique. ...
Data sharing in cloud storage is playing major role in Information Communication, since it can provide users with efficient and effective storage services. ...
While these techniques provides a good starting point for securing the big data, further research is needed to turn them into practical solutions that can achieve privacy and security in the real world ...
doi:10.21276/ijirem.2018.5.1.9
fatcat:w4ieubijjvaybjrrj22fgtq3p4
« Previous
Showing results 1 — 15 out of 523 results