118,931 Hits in 4.1 sec

Generalization-Based Privacy-Preserving Data Collection [chapter]

Lijie Zhang, Weining Zhang
Lecture Notes in Computer Science  
Existing privacy-preserving data publishing (PPDP) and privacy-preserving data collection (PPDC) methods do not sufficiently address the needs of these applications.  ...  In privacy-preserving data mining, there is a need to consider on-line data collection applications in a client-server-to-user (CS2U) model, in which a trusted server can help clients create and disseminate  ...  Due to public concerns of privacy [1] , he wants to perform privacy preserving data mining (PPDM) on anonymous data.  ... 
doi:10.1007/978-3-540-85836-2_11 fatcat:v2bubsjf2rgdtgkvb24egf6fue

Privacy-Preserving Internet of Things: Techniques and Applications

2019 International Journal of Engineering and Advanced Technology  
Hence, it is necessary to preserve the privacy of data collected by IoT devices.  ...  In this paper, we present a detailed investigation of the existing approaches to preserve the privacy of data in IoT applications.  ...  Fig.1 shows the privacy preserving IoT model to preserve the privacy of the IoT generated data. The privacy preserved data can be utilized for academics and research purposes.  ... 
doi:10.35940/ijeat.f8830.088619 fatcat:onkuoapbkzhdtggza6ib7jj5ka

Privacy Levels for Computer Forensics: Toward a More Efficient Privacy-preserving Investigation

Waleed Halboob, Ramlan Mahmod, Nur Izura Udzir, Mohd. Taufik Abdullah
2015 Procedia Computer Science  
Then, it defines several privacy levels based on the found access possibilities. The defined privacy levels lead to more efficient privacy-preserving computer forensics solution.  ...  So, there is a need for having privacy levels for computer forensics so that only relevant data are collected and then only private relevant data are encrypted.  ...  This means the data are collected without any privacy preservation.  ... 
doi:10.1016/j.procs.2015.07.222 fatcat:k2mfdzqdc5f2jjc4aypk2nklfu

A Comprehensive Analysis of Privacy Protection Techniques Developed for COVID-19 Pandemic

Abdul Majeed, Seong Oun Hwang
2021 IEEE Access  
Recently, many privacy protection techniques (PPTs) have been proposed based on the person-specific data included in different data types (e.g., tables, graphs, matrixes, barcodes, and geospatial data)  ...  Furthermore, we discuss the challenges of preserving individual privacy during a pandemic, the role of privacy regulations/laws, and promising future research directions.  ...  The choice of data representation type is generally made based on the nature of the data.  ... 
doi:10.1109/access.2021.3130610 fatcat:gzbqptyjh5hwtdtlxykcdfqmhu

Privacy Concerns In IoT A Deeper Insight into Privacy Concerns in IoT Based Healthcare

Fatma Alshohoumi, Mohamed Sarrab
2020 International Journal of Computing and Digital Systems  
Future research will extend this work to design privacy preservation mechanisms that suit the nature of IoT-based healthcare.  ...  Moreover, the paper thoroughly discusses privacy in the IoT data flow in IoT-based healthcare and suggests privacy solutions in each phase.  ...  A DEEPER INSIGHT INTO IOT-BASED HEALTHCARE DATA PRIVACY IoT-based devices collect sensitive data from healthcare in general and patients in particular, such as a patient's bio-signals in order to assist  ... 
doi:10.12785/ijcds/090306 fatcat:uweseonn2rclbnhksuljxnauim

Security and Privacy in Big Data Life Cycle: A Survey and Open Challenges

Jahoon Koo, Giluk Kang, Young-Gab Kim
2020 Sustainability  
In addition, we divide a big data life cycle into five phases (i.e., collection, storage, analytics, utilization, and destruction), and define the security taxonomy of the big data life cycle based on  ...  In particular, user tendencies can be analyzed using various big data analytics, and this information leads to the invasion of personal privacy.  ...  Privacy-Preserving Data Collection Privacy-preserving data collection refers to a method that does not infringe on privacy when collecting various data.  ... 
doi:10.3390/su122410571 fatcat:thuxbjhjmrhmzbwjheh7dz6hcm

Practical Aspect of Privacy-Preserving Data Publishing in Process Mining [article]

Majid Rafiei, Wil M. P. van der Aalst
2020 arXiv   pre-print
In this paper, we introduce a Python-based infrastructure implementing state-of-the-art privacy preservation techniques in process mining.  ...  Our infrastructure manages both standard and non-standard event data resulting from privacy preservation techniques.  ...  Figure 1 shows the general approach of privacy in process mining including two main activities: Privacy-Preserving Data Publishing (PPDP) and Privacy-Preserving Process Mining (PPPM).  ... 
arXiv:2009.11542v1 fatcat:vi2c6rda75hx3pmzgcawao4xbi

Privacy Preserving Data Analytics for Smart Homes

Antorweep Chakravorty, Tomasz Wlodarczyk, Chunming Rong
2013 2013 IEEE Security and Privacy Workshops  
In this paper we propose an approach to achieve data security & privacy through out the complete data lifecycle: data generation/collection, transfer, storage, processing and sharing.  ...  Generalization and suppression on identifiers from the identifier dictionary before re-introduction could achieve different levels of privacy preservation.  ...  We present a holistic framework to maintain data utility, ensure security and preserve privacy at different stages of data lifecycle (collection, storage, processing & sharing).  ... 
doi:10.1109/spw.2013.22 dblp:conf/sp/ChakravortyWR13 fatcat:hnnpt44ihne5xl5d5l4xxkustu

Practical Aspect of Privacy-Preserving Data Publishing in Process Mining

Majid Rafiei, Wil M. P. van der Aalst
2020 CEUR Workshop Proceedings  
Our infrastructure manages both standard and nonstandard event data resulting from privacy preservation techniques.  ...  The infrastructure provides a hierarchy of usages from single techniques to the collection of techniques, integrated as web-based tools.  ...  Figure 1 shows the general approach of privacy in process mining including two main activities: Privacy-Preserving Data Publishing (PPDP) and Privacy-Preserving Process Mining (PPPM).  ... 
doi:10.18154/rwth-2020-11373 fatcat:ejdvcw4fcfakjih3m3ymrtte4e

Data Management for Future Wireless Networks: Architecture, Privacy Preservation, and Regulation

Xuemin Sherman Shen, Cheng Huang, Dongxiao Liu, Liang Xue, Weihua Zhuang, Rob Sun, Bidi Ying
2021 IEEE Network  
Data management (DM), including data collection, storage, sharing, and computation, plays an essential role in empowering NGWN.  ...  Next-generation wireless networks (NGWN) aim to support diversified smart applications that require frequent data exchanges and collaborative data processing among multiple stakeholders.  ...  prIvAcy-preservIng technIques For dAtA mAnAgement This section focuses on four major stages of DM: data collection, data storage, data sharing, and data computation.  ... 
doi:10.1109/mnet.011.2000666 fatcat:ri3f3ptzh5bw3l6aqfsqtabkxi

The Systematic Literature Review of Privacy-Preserving Solutions in Smart Healthcare Environment

Driss El Majdoubi, Hanan El Bakkali, Souad Sadki, Zaina Maqour, Asmae Leghmid, Thippa Reddy G
2022 Security and Communication Networks  
In fact, collecting, transmitting, storing, and using data in IoMT applications raises issues regarding privacy and data protection, especially with the multitude of stakeholders involved during the whole  ...  Finally, we summarize our results showing privacy-preserving trends and identifying recommendations to involve privacy principles coverage in smart healthcare applications.  ...  generated healthcare data.  ... 
doi:10.1155/2022/5642026 fatcat:ge6jgibhxvgd7gc7i3tsuzhnh4

Privacy Threats and Privacy Preservation Techniques for Farmer Data Collections Based on Data Shuffling

Surapon Riyana, Nobutaka Ito, Tatsanee Chaiya, Uthaiwan Sriwichai, Natthawud Dussadee, Tanate Chaichana, Rittichai Assawarachan, Thongchai Maneechukate, Samerkhwan Tantikul, Noppamas Riyana
2022 ECTI Transactions on Computer and Information Technology  
To rid these vulnerabilities of anatomization models, a new privacy preservation model based on data shuffing is proposed in this work.  ...  With farm data collection, we observe that it is generally proposed to utilize in smart farm systems.  ...  However, in [8] , the authors demonstrate that privacy preservation models based on data suppression and data generalization, they often have fake query conditions.  ... 
doi:10.37936/ecti-cit.2022163.246469 fatcat:7mro7r65zbduroj66sskt2jnqq

A Survey on Privacy Preserving Data Publishing

Gokila S, Venkateswari P
2014 International Journal on Cybernetics & Informatics  
The Privacy Preservation is an important aspect of data mining to ensure the privacy by various methods. Privacy Preservation is necessary to protect sensitive information associated with individual.  ...  Privacy Preservation is one of the most important factor for an individual since he should not embarrassed by an adversary.  ...  This data have been stored in electronic format, without disturbing an individual. It preserves privacy during data collection and mining.  ... 
doi:10.5121/ijci.2014.3101 fatcat:vswoffoqrrhcfginzeqmg3m7ee

A Survey on Privacy Preserving Data Mining Techniques

G. Jelin Taric, E. Poovammal
2017 Indian Journal of Science and Technology  
While sharing the private data, privacy preserving is becoming an increasingly significant issue. Sequential pattern mining is the process of finding relevant pattern in the data set.  ...  Enormous amount of detailed private data is recurrently collected and analysed by applications using data mining, sharing of these data is useful to the application users.  ...  PRIVACY PRESERVING TECHNIQUES The main objective of privacy preserving data mining is to develop data mining methods without increasing the risk of mishandling [6] of the data used to generate those  ... 
doi:10.17485/ijst/2017/v10i5/111138 fatcat:tyq2deqf5rfaxenyauflke2zja

Security and privacy issues of physical objects in the IoT: challenges and opportunities

Xuanxia Yao, Fadi Farha, Rongyang Li, Ismini Psychoula, Liming Chen, Huansheng Ning
2020 Digital Communications and Networks  
On this basis, a physical object-based security architecture for the IoT is put forward.  ...  In the Internet of Things (IoT), security and privacy issues of physical objects are crucial to the related applications.  ...  In general, the privacy requirement in data collection involves two aspects of data privacy-preserving and identity privacy-preserving.  ... 
doi:10.1016/j.dcan.2020.09.001 fatcat:ho7hiqfwwfb55f4j5uejaa36y4
« Previous Showing results 1 — 15 out of 118,931 results