Filters








523 Hits in 6.8 sec

Hybrid Data Privacy and Anonymization Algorithms for Smart Health Applications

Y. N. Fakeeroodeen, Y. Beeharry
2021 SN Computer Science  
In this work, k-anonymity, differential privacy, k-map, -diversity and a hybrid of the three algorithms combined with ℓ-diversity have been analyzed using algorithms running on a raspberry pi (edge) for  ...  The results demonstrated a difference in using stand-alone algorithms in terms of output anonymized dataset, execution time, information loss, risk analysis, and statistical analysis.  ...  Acknowledgements The authors would like to thank the University of Mauritius for the necessary facilities provided towards the proper conduction of this work.  ... 
doi:10.1007/s42979-021-00547-2 fatcat:ybhyz5b7jrd2lhhpjhnynjjzwa

Novel Block Chain Technique for Data Privacy and Access Anonymity in Smart Healthcare

J. Priya, C. Palanisamy
2023 Intelligent Automation and Soft Computing  
The detected data is anonymized in the device and stored in the cloud server using the Linear Scaling based Rider Optimization algorithm with integrated KL Anonymity (LSR-KLA) approach.  ...  A unique blockchain-based technique is proposed to improve anonymity in terms of data access and data privacy to overcome the above-mentioned issues.  ...  Acknowledgement: The author with a deep sense of gratitude would thank the supervisor for his guidance and constant support rendered during this research.  ... 
doi:10.32604/iasc.2023.025719 fatcat:sbhgaikg5jhflaed5zigzvwlvq

Anonymous Attestation for IoT [article]

Santosh Ghosh, Andrew H. Reinders, Rafael Misoczki, Manoj R. Sastry
2019 IACR Cryptology ePrint Archive  
In this paper, we present a small footprint anonymous attestation solution based on EPID that can meet the stringent resource requirements of IoT devices.  ...  The EPID SW stack has a small object code footprint of 22kB. We developed a prototype on a 32-bit microcontroller that computes EPID signature generation in 17.9s at 32MHz.  ...  In this paper, we have proposed a design for small footprint anonymous attestation based on EPID, and built a prototype to demonstrate its feasibility for IoT.  ... 
dblp:journals/iacr/GhoshRMS19 fatcat:qr6o4gdklze5jhxilejyohuamq

In-Memory Data Anonymization Using Scalable and High Performance RDD Design

Sibghat Ullah Bazai, Julian Jang-Jaccard
2020 Electronics  
We propose "SparkDA" which is a new novel anonymization technique that is designed to take the full advantage of Spark platform to generate privacy-preserving anonymized dataset in the most efficient way  ...  Our proposal offers a better partition control, in-memory operation and cache management for iterative operations that are heavily utilised for data anonymization processing.  ...  Generalization Hierarchy 13 end 14 end 15 for Algorithm 1: FlatMapRDD.  ... 
doi:10.3390/electronics9101732 fatcat:5xqrmm7yfrbm3panznzjardsii

Secure k-Anonymization over Encrypted Databases [article]

Manish Kesarwani, Akshar Kaul, Stefano Braghin, Naoise Holohan, Spiros Antonatos
2021 arXiv   pre-print
Data protection algorithms are becoming increasingly important to support modern business needs for facilitating data sharing and data monetization.  ...  Anonymization is an important step before data sharing. Several organizations leverage on third parties for storing and managing data.  ...  [23] proposed an efficient k-anonymization algorithm called k-member, which is useful in identifying required generalization to apply k-anonymity to a given dataset.  ... 
arXiv:2108.04780v1 fatcat:5fng4fjm5ncyxbiomhef7ucyme

Heap Bucketization Anonymity—An Efficient Privacy-Preserving Data Publishing Model for Multiple Sensitive Attributes

J. Jayapradha, M. Prakash, Youseef Alotaibi, Osamah Ibrahim Khalaf, Saleh Ahmed Alghamdi
2022 IEEE Access  
The publication of a patient's dataset is essential for various medical investigations and decision-making.  ...  The quasi-identifier is anonymized by implementing k-anonymity and slicing and the sensitive attributes are anonymized by applying slicing and Heap Bucketization.  ...  A novel method called ''MSAs generalization correlation attacks'' was proposed for 1:M microdata for multiple sensitive attributes.  ... 
doi:10.1109/access.2022.3158312 fatcat:dczviwjavnh6pmtklaz5udhp7m

D3.1 - Requirements for data crawling, integration and anonymization

Filareti Tsalakanidou, Ekaterina Gilman, Panos Kostakos, Andrew Byrne, Spiros Nikolopoulos, Sotiris Diplaris, Yiannis Kompatsiaris, Marta Cortés, Katerina Valta, Stavros Tekes, Chandan Kumar, Jun Sun (+24 others)
2018 Zenodo  
for enabling data anonymization and encryption.  ...  This report summarizes the functional requirements for all WP3 tasks, in terms of: (i) data sources that will be collected in the context of CUTLER pilots, (ii) data cleaning methodologies, collection  ...  When considering an anonymization strategy for data, there is no generic solution that optimizes privacy and data utility.  ... 
doi:10.5281/zenodo.3385901 fatcat:h2tfycs5arbttiedi5x35kuj4a

Botnet Detection in Anonymous Networks

Katharina Kuhnert, Jessica Steinberger, Harald Baier
2018 Autonomous Infrastructure, Management and Security  
is a single-track event integrating regular conference paper sessions, hands-on lab, and a PhD student workshop into a highly interactive event.  ...  AIMS 2018 -which took place during June 4-6, 2018 in Neubiberg, Germany and was hosted by the Universität der Bundeswehr München, Germany -was the twelfth edition of a conference series on management and  ...  Acknowledgement Acknowledgement This work was supported in part by a grant from the University Research Board of the American University of Beirut, Lebanon. Acknowledgments.  ... 
dblp:conf/aims/KuhnertSB18 fatcat:745qy2tejngb5apqlse4sn3djm

VoIP Traffic Detection in Tunnelled and Anonymous Networks Using Deep Learning

Faiz Ul Islam, Guangjie Liu, Jiangtao Zhai, Weiwei Liu
2021 IEEE Access  
[51] investigated anonymity tools for network TC purpose via a hierarchical approach. The proposed hierarchial approach consists of four ML based classifiers, i.e.  ...  [25] focused on identifying IoT devices and behavior in a smart home.  ...  Author Name: Preparation of Papers for IEEE Access (February 2017) VOLUME XX, 2017 9 Author Name: Preparation of Papers for IEEE Access (February 2017) VOLUME XX, 2017 9  ... 
doi:10.1109/access.2021.3073967 fatcat:rdeatf6ghrgbhjkg5th4p4aqte

Data-sharing markets for integrating IoT data processing functionalities

Nasr Kasrin, Aboubakr Benabbas, Golnaz Elmamooz, Daniela Nicklas, Simon Steuer, Michael Sünkel
2021 CCF Transactions on Pervasive Computing and Interaction  
For the second, we propose an information-integration model for IoT platforms.  ...  Hence we need to explore other approaches to integration for IoT platforms.  ...  In data publication we focus on k-anonymity because we have just slightly sensitive data that can be anonymized easily without much risk. Our goal is to use k-anonymity also for data streams.  ... 
doi:10.1007/s42486-020-00054-y fatcat:fyjfrti5fbdutjiapnqt44hwm4

A survey of privacy-preserving mechanisms for heterogeneous data types

Mariana Cunha, Ricardo Mendes, João P. Vilela
2021 Computer Science Review  
In this paper, we perform a thorough study of the state of the art on the following topics: heterogeneous data types, PPMs, and tools for privacy protection.  ...  Building from the achieved knowledge, we propose a privacy taxonomy that establishes a relation between different types of data and suitable PPMs for the characteristics of those data types.  ...  Li et al. proposed the first algorithm based on k-anonymity for streaming data: Stream K-anonYmity (SKY) [70] .  ... 
doi:10.1016/j.cosrev.2021.100403 fatcat:g77hxznnjfdxjjj52sxsjenlzy

Revealing the Landscape of Privacy-Enhancing Technologies in the Context of Data Markets for the IoT: A Systematic Literature Review [article]

Gonzalo Munilla Garrido and Johannes Sedlmeir and Ömer Uludağ and Ilias Soto Alaoui and Andre Luckow and Florian Matthes
2022 arXiv   pre-print
Furthermore, there is no consensus on the appropriate use of blockchain technology for IoT data markets and a low degree of leveraging existing libraries or reusing generic data market architectures.  ...  To accomplish this goal, we conducted a systematic literature review on privacy enhancement in data markets for the IoT, covering 50 publications dated up to July 2020, and provided updates with 24 publications  ...  , Regional Development and Energy for their funding of the project "Fraunhofer Blockchain Center (20-3066-2-6-14)" that made this paper possible.  ... 
arXiv:2107.11905v2 fatcat:fy4fa4gvubcqzfv2wollbigbae

A Survey on Privacy Properties for Data Publishing of Relational Data

Athanasios Zigomitros, Fran Casino, Agusti Solanas, Constantinos Patsakis
2020 IEEE Access  
To counter information leakage, a number of data anonymisation methods have been proposed during the past few years, including k-anonymity, -diversity, t-closeness, to name a few.  ...  The scope of this work is to provide an in-depth overview of the current state of the art in Privacy-Preserving Data Publishing (PPDP) for relational data.  ...  Yet, data publishers do not usually have the technical background to provide a properly processed dataset that is optimal for data mining algorithms while it does not compromise the privacy of individuals  ... 
doi:10.1109/access.2020.2980235 fatcat:vc4p6lb57bb4bprb3ll3xxaqzu

HIBAF: A data security scheme for fog computing

Md Whaiduzzaman, Nishat Farjana, Alistair Barros, Md. Julkar Nayeen Mahi, Md. Shahriare Satu, Shanto Roy, Colin Fidge
2021 Journal of High Speed Networks  
We devise and develop a four-level Hierarchical Identity Based Architecture for Fog Computing (HIBAF) data security scheme to enhance data security.  ...  We present an Identity Based Encryption (IBE) scheme to secure data security and transmission in fog clouds and IoT ecosystems.  ...  Microservices in the Cloud.'  ... 
doi:10.3233/jhs-210673 fatcat:kagraurxwjgefdnaagqgkdhq5i

Security and Privacy Based Data Sharing in Cloud Computing

Dr.Prasanna Kumar.R, Porselvan G, Prem Kumar S, Robinlash F
2018 International Journal of Innovative Research in Engineering & Management  
is protected in a fine-grained way by adopting the attribute based encryption technique.  ...  Data sharing in cloud storage is playing major role in Information Communication, since it can provide users with efficient and effective storage services.  ...  While these techniques provides a good starting point for securing the big data, further research is needed to turn them into practical solutions that can achieve privacy and security in the real world  ... 
doi:10.21276/ijirem.2018.5.1.9 fatcat:w4ieubijjvaybjrrj22fgtq3p4
« Previous Showing results 1 — 15 out of 523 results