771 Hits in 3.6 sec

Strengthening Order Preserving Encryption with Differential Privacy [article]

Amrita Roy Chowdhury, Bolin Ding, Somesh Jha, Weiran Liu, Jingren Zhou
2021 arXiv   pre-print
In this paper, we propose a novel differentially private order preserving encryption scheme, OPϵ. Under OPϵ, the leakage of order from the ciphertexts is differentially private.  ...  Ciphertexts of an order-preserving encryption (OPE) scheme preserve the order of their corresponding plaintexts. However, OPEs are vulnerable to inference attacks that exploit this preserved order.  ...  Contributions Novel primitive that combines order preserving encryption and differential privacy.  ... 
arXiv:2009.05679v3 fatcat:d4wkm5llenfmxiyvtmvepmy22u

Zeph: Cryptographic Enforcement of End-to-End Data Privacy [article]

Lukas Burkhalter, Nicolas Küchler, Alexander Viand, Hossein Shafagh, Anwar Hithnawi
2021 arXiv   pre-print
We introduce a hybrid cryptographic protocol for privacy-adhering transformations of encrypted data.  ...  Zeph enforces privacy policies cryptographically and ensures that data available to third-party applications complies with users' privacy policies.  ...  This work was supported in part by the SNSF Ambizione Grant No. 186050 and an ETH Grant.  ... 
arXiv:2107.03726v1 fatcat:zb6gjzasurct3on3xj6ctwhwfa

Security and privacy for big data: A systematic literature review

Boel Nelson, Tomas Olovsson
2016 2016 IEEE International Conference on Big Data (Big Data)  
In order to have access to real world use cases, we have studied privacy-preserving big data analysis in the context of the automotive domain.  ...  Our main focus is on differential privacy, a privacy model which protects individuals' privacy, while still allowing analysts to learn statistical information about a population.  ...  Privacy Models In this thesis we present two fundamentally different types of privacy models, those designed for privacy-preserving data publishing (PPDP) and differential privacy.  ... 
doi:10.1109/bigdata.2016.7841037 dblp:conf/bigdataconf/NelsonO16 fatcat:uiippetep5ea3ote2gzsxd5acm

An attribute generalization mix-zone without privacy leakage

Zhang Lei, He Lili, Liu Desheng, Li Jing, Jiang Qingfeng, Yuan Qi
2019 IEEE Access  
In order to cope with above-mentioned two problems, this paper provides an uncorrelated mix-zone based on the conception of attribute generalization and homomorphic encryption.  ...  In the road network, mix-zone is usually considered as an efficient application that provides a balance between privacy protection and service quality.  ...  In order to achieve this type of attribute similarity as well as to preserve privacy for each user from being obtained by the agency and other disguisers, a similar attributes calculation method has been  ... 
doi:10.1109/access.2019.2898996 fatcat:7o6gx3wqkzex3o3jezghrhykye

Privacy and Data Protection by Design - from policy to engineering [article]

George Danezis, Josep Domingo-Ferrer, Marit Hansen, Jaap-Henk Hoepman, Daniel Le Metayer, Rodica Tirtea, Stefan Schiffner
2015 arXiv   pre-print
., encryption became widely used, PETs have not become a standard and widely used component in system design.  ...  Privacy and data protection constitute core values of individuals and of democratic societies.  ...  While we cannot name all, we would like to thank Sébastien Gambs and Rosa Barcelo for their feedback on drafts of this report.  ... 
arXiv:1501.03726v1 fatcat:csxvtyiiprhodnquaigppcwbwi

Federated Learning in Smart City Sensing: Challenges and Opportunities

Ji Chu Jiang, Burak Kantarci, Sema Oktug, Tolga Soyata
2020 Sensors  
Despite their effectiveness, legacy data acquisition models backed with centralized Machine Learning models entail security and privacy concerns, and lead to less participation in large-scale sensing and  ...  To overcome these challenges, Federated Learning is a novel concept that can serve as a solution to the privacy and security issues encountered within the process of data collection.  ...  Motivation and Key Idea Proposed Approach Open Issues and Further Opportunities Differential Privacy [150] Enhanced privacy preservation through sketching Obfuscation of the original data to achieve  ... 
doi:10.3390/s20216230 pmid:33142863 pmcid:PMC7662977 fatcat:gl7qvweau5gzjmld6n6jabxcee

A Survey of Location Privacy Preservation in Social Internet of Vehicles

Xiaofan Jia, Ling Xing, Jianping Gao, Honghai Wu
2020 IEEE Access  
based on differential privacy k-means, which are improved through the application of differential privacy technology [60] and the clustering algorithm [61] .  ...  location privacy preservation algorithms are analyzed in detail, after which their privacy preservation performance is compared and analyzed. (5) Location privacy preservation remains an active research  ...  His research interests include delay/disrupted tolerant networks, opportunistic networks, and video delivery.  ... 
doi:10.1109/access.2020.3036044 fatcat:ygebciupkfgk7j3p2uehlvfzse

From Copyright to Information Law – Implications of Digital Rights Management [chapter]

Stefan Bechtold
2002 Lecture Notes in Computer Science  
The intertwining protection by technology, contracts, technology licenses and anti-circumvention regulations could lead to a new "property right" making copyright protection obsolete.  ...  The legislators in the U.S. and Europe use different approaches to address this problem.  ...  enforcement, reverse engineering, encryption research, privacy and security testing).  ... 
doi:10.1007/3-540-47870-1_14 fatcat:62k7elnkdfgtpkyyj3cfa3q5qi

Comparative Evaluations of Privacy on Digital Images

Xue Zhang, Wei Qi Yan
2018 2018 15th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS)  
In order to preserve privacy effectively, the content is released safely on social media. This thesis introduces the necessity of protecting the image privacy and effective protection methods.  ...  Moreover, the theory of differential privacy is adopted, which can protect the image analysis data for broader research and cooperation.  ...  The privacy evaluation investigates the issue of the antithesis of privacy preservation and the topic of utilising the differential privacy to protect the metadata which generated by image analysis.  ... 
doi:10.1109/avss.2018.8639090 dblp:conf/avss/Zhang018 fatcat:35dlv3wu4bbdfajhyrvt7dcqfm

Secure Surveillance Systems Using Partial-Regeneration-Based Non-Dominated Optimization and 5D-Chaotic Map

Gopal Ghosh, Kavita Verma, Divya Anand, Sahil Verma, Danda B. Rawat, Jana Shafi, Zbigniew Marszałek, Marcin Woźniak
2021 Symmetry  
The permutation and diffusion processes are applied to generate the encrypted images, and the convolution neural network (CNN) can play an essential role in this part.  ...  Images are important parts of Surveillance Systems, and it is required to protect the images during transmission and storage.  ...  The authors of [1] used a 2D logistic-sine system (2LSS) to encrypt the images generated by sensors before the transmission, where the permutation and diffusion-based framework was utilized to perform  ... 
doi:10.3390/sym13081447 fatcat:5fpg5nrekvf4njknpfgqvz3av4

Data-driven control on encrypted data [article]

Andreea B. Alexandru, Anastasios Tsiamis, George J. Pappas
2021 arXiv   pre-print
Hence, we require the service provider to perform data-driven control in a privacy-preserving manner on the input-output data samples from the client.  ...  We provide an efficient and private solution to the problem of encryption-aware data-driven control.  ...  In contrast, secure multi-party computation tools require collaboration between multiple cloud servers to execute the encrypted computations, and differential privacy introduces a trade-off between the  ... 
arXiv:2008.12671v2 fatcat:ofsqeejx6nhunmkk7qbezwu26a

Privacy Engineering Meets Software Engineering. On the Challenges of Engineering Privacy ByDesign [article]

Blagovesta Kostova, Seda Gürses, Carmela Troncoso
2020 arXiv   pre-print
Academic privacy engineering literature typically abstracts away such conditions of software production in order to achieve generalizable results.  ...  Specifically, we identify important limitations in the approaches that researchers take to design and evaluate privacy enhancing technologies which ripple to proposals for privacy engineering methodologies  ...  Some of these services have deployed privacy preserving methods, e.g., differential privacy.  ... 
arXiv:2007.08613v1 fatcat:2tqaxp3uhfhmrngqkmoysmrkm4

Internet of Things Security: A Review of Enabled Application Challenges and Solutions

Mona Algarni, Munirah Alkhelaiwi, Abdelrahman Karrar
2021 International Journal of Advanced Computer Science and Applications  
IoT security is a critical concern in the preservation of the privacy and reliability of users' private information.  ...  In addition, we present potential tools to ensure the security and preservation of privacy for IoT applications.  ...  With the progress of IoT, which focuses on increasing productivity, reducing costs, and improving quality of life, the privacy of the information transmitted through smart devices must be preserved.  ... 
doi:10.14569/ijacsa.2021.0120325 fatcat:bzirzdt5vvff5ghkshkymyrenu

Privacy and security in online social networks: A survey

Imrul Kayes, Adriana Iamnitchi
2017 Online Social Networks and Media  
This article provides an overview of the privacy and security issues that emerged so far in OSNs.  ...  We introduce a taxonomy of privacy and security attacks in OSNs, we overview existing solutions to mitigate those attacks, and outline challenges still to overcome.  ...  However, this substitution is not sufficient to preserve users' privacy.  ... 
doi:10.1016/j.osnem.2017.09.001 fatcat:xme5wwkyfbhnpgoiwgadknageq

A survey on functional encryption

Carla Mascia, Massimiliano Sala, Irene Villa
2021 Advances in Mathematics of Communications  
<p style='text-indent:20px;'>Functional Encryption (FE) expands traditional public-key encryption in two different ways: it supports fine-grained access control and allows learning a function of the encrypted  ...  In this paper, we review all FE classes, describing their functionalities and main characteristics.  ...  We would like to thank Andrea Gelpi, Marco Pedicini, and Michela Iezzi for their interest and valuable discussion on the subject. We also thank the anonymous referee for the helpful comments.  ... 
doi:10.3934/amc.2021049 fatcat:l3j4d2kfwrbdvk7ff4hrg7leo4
« Previous Showing results 1 — 15 out of 771 results