Filters








18,864 Hits in 4.6 sec

Managing Distributed Queries under Personalized Anonymity Constraints

Axel Michel, Benjamin Nguyen, Philippe Pucheral
2017 Proceedings of the 6th International Conference on Data Science, Technology and Applications  
Moreover, we propose a decentralized computing infrastructure based on secure hardware enforcing these personalized privacy guarantees all along the query execution process.  ...  This paper proposes a novel approach to push personalized privacy guarantees in the processing of database queries so that individuals can disclose different amounts of information (i.e. data at different  ...  CONCLUSION In this paper, we presented a novel approach to define and enforce personalized anonymity constraints on SQL GROUP BY queries.  ... 
doi:10.5220/0006477001070117 dblp:conf/data/MichelNP17 fatcat:6qf4k2b72bdzxlqphxsj4sofii

Privacy-preserving data publishing for horizontally partitioned databases

Pawel Jurczyk, Li Xiong
2008 Proceeding of the 17th ACM conference on Information and knowledge mining - CIKM '08  
Our approach includes a distributed anonymization protocol that allows independent data providers to build a virtual anonymized database, and a distributed querying protocol that allows clients to query  ...  There is an increasing need for sharing data repositories containing personal information across multiple distributed, possibly untrusted, and private databases.  ...  We would like to thank Kristen Lefevre for providing the implementation of Mondrian algorithm and the anonymous reviewers for their valuable comments.  ... 
doi:10.1145/1458082.1458257 dblp:conf/cikm/JurczykX08 fatcat:jddp2kztnvdlpnwqbvoyj3uvc4

Security and Accuracy Constrained Task-Role based Access Control and Privacy Preserving Mechanism for Relational Data

Pratik Bhingardeve, Prof. D. H. Kulkarni
2015 International Journal of Engineering Research and  
Security saving miniaturized scale information distributed right now does not have a strong hypothetical establishment.  ...  A PPM can utilize concealment and speculation of social information to anonymize and fulfill security prerequisites, e.g., k-namelessness and l-assorted qualities, against character and property exposure  ...  Given:-n tuples, (tuples are uniformly distributed ) To Find:-1. Expected imprecision for a randomly selected query. 2. Expected number of partitions overlapping the query. 3.  ... 
doi:10.17577/ijertv4is070918 fatcat:2ucktco7ofeo5gpzbzppfbd57q

Privacy Principles for Sharing Cyber Security Data

Gina Fisk, Calvin Ardi, Neale Pickett, John Heidemann, Mike Fisk, Christos Papadopoulos
2015 2015 IEEE Security and Privacy Workshops  
They are also complicated by the trade-offs in privacy preservation and utility present in anonymization to manage disclosure.  ...  We then discuss engineering approaches that apply these principles to a distributed security system.  ...  Privacy Balance is illustrated with query management.  ... 
doi:10.1109/spw.2015.23 dblp:conf/sp/FiskAPHFP15 fatcat:r2amjo7hunf2pc6r35buraxnq4

DObjects+: Enabling Privacy-Preserving Data Federation Services

Pawel Jurczyk, Li Xiong, Slawomir Goryczka
2012 2012 IEEE 28th International Conference on Data Engineering  
The framework is built on top of a distributed mediatorwrapper architecture where nodes can form collaborative groups for secure anonymization and secure query processing when private data need to be accessed  ...  The emergence of cloud computing implies and facilitates managing large collections of highly distributed, autonomous, and possibly private databases.  ...  The authors would like to thank the anonymous reviewers for their suggestions that helped improve this demo.  ... 
doi:10.1109/icde.2012.138 dblp:conf/icde/JurczykXG12 fatcat:vjcrdqr3ebgbpafpupf5ymyx5u

Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms

Bugra Gedik, Ling Liu
2008 IEEE Transactions on Mobile Computing  
This architecture includes the development of a personalized location anonymization model and a suite of location perturbation algorithms.  ...  A unique characteristic of our location privacy architecture is the use of a flexible privacy personalization framework to support location k-anonymity for a wide range of mobile clients with context-sensitive  ...  ACKNOWLEDGMENTS The authors thank the anonymous reviewers for their constructive suggestions that helped them in improving this paper. This research was partially supported by a US  ... 
doi:10.1109/tmc.2007.1062 fatcat:ooxwwdaqazezzmugp75u7e2pdu

Towards privacy-preserving integration of distributed heterogeneous data

Pawel Jurczyk, Li Xiong
2008 Proceeding of the 2nd PhD workshop on Information and knowledge management - PIKM '08  
In this paper, we propose a distributed anonymization protocol that allows independent data providers to build a virtual anonymized database from horizontally partitioned databases, and a secure query  ...  We also propose a distributed data sharing and integration architecture for querying these distributed heterogeneous and possibly private databases.  ...  We would like to thank Kristen Lefevre for providing the implementation of Mondrian algorithm and the anonymous reviewers for their valuable comments.  ... 
doi:10.1145/1458550.1458562 dblp:conf/cikm/JurczykX08a fatcat:csteu32az5ekxkib66cpl5va3i

Navigating legal constraints in clinical data warehousing: a case study in personalized medicine

B. R. Jefferys, I. Nwankwo, E. Neri, D. C. W. Chang, L. Shamardin, S. Hanold, N. Graf, N. Forgo, P. Coveney
2013 Interface Focus  
developed for the clinical data warehouse in the personalized medicine project p-medicine.  ...  We describe an unconstrained clinical data warehousing architecture, some of the legal constraints that have led us to reconsider this architecture, and the legal and technical solutions to these constraints  ...  Therefore, it may be removed or generalized into categories or summaries in order to create anonymous data, which may be distributed more widely than the more sensitive source data.  ... 
doi:10.1098/rsfs.2012.0088 pmid:24427531 pmcid:PMC3638485 fatcat:hq4v6ukijffzbd63yyb33z5zja

Cloud Computing Based PHR Architecture Using Multi Layers Model

Shinji Kikuchi, Shelly Sachdeva, Subhash Bhalla
2012 Journal of Software Engineering and Applications  
Through the proposed considerations the requirement for the new techniques of query processing has been identified as one of the critical factors, that are combined with several items such as managing  ...  In this context, Personal Health Records have been proposed and some services have already been launched.  ...  Security and privacy Depends on current major methods such as 1) Column level encryption. 2) Separated, distributed identifier data. 3) Anonymization. 1) Separated, distributed identifier data.  ... 
doi:10.4236/jsea.2012.531105 fatcat:6ji6lw3f6zahdk55pdojmtst7a

Collaborative Search and User Privacy:How Can They Be Reconciled? [chapter]

Thorben Burghardt, Erik Buchmann, Klemens Böhm, Chris Clifton
2009 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
We also give an approach to address the reciprocity condition identified in the study, and we discuss options to anonymize sharing of query terms.  ...  To control the information shared, the participants of our study have called for anonymity and reciprocity in combination with time-and/or context-dependent conditions.  ...  In this section, we assume a distributed, anonymized system architecture, and we propose mechanisms to manage policies at the client.  ... 
doi:10.1007/978-3-642-03354-4_8 fatcat:x7xct5n6s5byraszyffwkkei4i

Privacy-Preservation for Publishing Sample Availability Data with Personal Identifiers

Ali Gholami, Erwin Laure, Peter Somogyi, Ola Spjuth, Salman Niazi, Jim Dowling
2015 Journal of Medical and Bioengineering  
We realize our solution by having a two-level anonymiziation mechanism, where our toolkit for publishing availability data first pseudonymizes personal identifiers and then anonymizes sensitive attributes  ...  We believe that our toolkit contributes a first step to support the privacy preserving publication of data containing personal identifiers.   ...  Anonymization will result in attribute values being suppressed when either kanonymity or l-diversity constraints are not met.  ... 
doi:10.12720/jomb.4.2.117-125 fatcat:6avm66qjfnhyfl4rsv6xq4lzby

Personal Privacy in Mobile Networks [chapter]

Claudio A. Ardagna, Sabrina De Capitani di Vimercati, Pierangela Samarati
2011 Mobile Technologies for Conflict Management  
Acknowledgements This work was supported in part by the EU within the 7FP project "PrimeLife" under grant agreement 216483.  ...  that manages anonymous queries and cloaked spatial areas (Mokbel et al. 2006) .  ...  The message perturbation engine generates anonymous queries through the CliqueCloak algorithm, which is based on a constraint graph that models the anonymization preferences of each message (i.e., the  ... 
doi:10.1007/978-94-007-1384-0_14 fatcat:d77oitt6xrg3jcqexrcvfesadi

Issues of privacy policy conflict in mobile social network

Pingshui Wang, Qinjuan Ma
2020 International Journal of Distributed Sensor Networks  
conflict brought by the resource-level relationship; meanwhile, we proposed a scheme of consistency verification for privacy policy to improve the previous personalized privacy protection model.  ...  In this article, aiming at the personalized privacy protection model proposed in our published paper, we analyzed the possible conflict between privacy policies and comprehensively considered the policy  ...  Acknowledgements The authors the anonymous reviewers and editors for their very constructive comments.  ... 
doi:10.1177/1550147720912939 fatcat:6fomywex6vgszigc5sgqkrmlea

Design of a Privacy-Preserving Data Platform for Collaboration Against Human Trafficking [article]

Darren Edge, Weiwei Yang, Kate Lytvynets, Harry Cook, Claire Galez-Davis, Hannah Darnton, Christopher M. White
2020 arXiv   pre-print
We present new methods to anonymize, publish, and explore such data, implemented as a pipeline generating three artifacts: (1) synthetic data mitigating the privacy risk that published attribute combinations  ...  Under looser constraints, DPPro [61] uses random projections that maintain probabilistic (ϵ, δ )differential privacy [14] .  ...  release; • managing utility risks by releasing reportable aggregate counts of cases matching different attribute combinations (i.e., queries); • managing accessibility risks by enabling interactive visual  ... 
arXiv:2005.05688v2 fatcat:ep72y2ehnfdfdepffrlikfccaa

Pluggable personal data servers

Nicolas Anciaux, Luc Bouganim, Yanli Guo, Philippe Pucheral, Jean-Jacques Vandewalle, Shaoyi Yin
2010 Proceedings of the 2010 international conference on Management of data - SIGMOD '10  
By embedding a full-fledged database server in such device, an individual can now store her personal data in her own secure token, kept under her control, and never disclose in clear her private data to  ...  The demonstration also highlights interesting features of the embedded DBMS engine introduced to tackle the secure token's strong hardware constraints.  ...  This research is partially supported by the French National Agency for Research (ANR) under RNTL grant PlugDB and by the French Yvelines District under grant DMSP.  ... 
doi:10.1145/1807167.1807328 dblp:conf/sigmod/AnciauxBGPVY10 fatcat:qt6czlcxtjhfpjelhjtam226ru
« Previous Showing results 1 — 15 out of 18,864 results