Filters








6,878 Hits in 8.6 sec

Privacy Intelligence: A Survey on Image Privacy in Online Social Networks [article]

Chi Liu, Tianqing Zhu, Jun Zhang, Wanlei Zhou
2021 arXiv   pre-print
Specifically, we present a definition and a taxonomy of OSN image privacy, and a high-level privacy analysis framework based on the lifecycle of OSN image sharing.  ...  To fill the gap, we contribute a survey of "privacy intelligence" that targets modern privacy issues in dynamic OSN image sharing from a user-centric perspective.  ...  [31] presented a comprehensive survey of privacy risks, attacks and privacy-preserving techniques in general for social network data publishing based on graph modelling methods. Ferrag et al.  ... 
arXiv:2008.12199v2 fatcat:vxv6rsnyavesjiw2bbnc4jzsiy

Privacy in the Genomic Era

Muhammad Naveed, Erman Ayday, Ellen W. Clayton, Jacques Fellay, Carl A. Gunter, Jean-Pierre Hubaux, Bradley A. Malin, Xiaofeng Wang
2015 ACM Computing Surveys  
In doing so, we address some of the (sometimes erroneous) beliefs of this field and we report on a survey we conducted about genome data privacy with biomedical specialists.  ...  The collection and analysis of such data has the potential to support various applications, including personalized medical services.  ...  ACKNOWLEDGMENTS We thank Aston Zhang and Ji Young Chun for their help with conducting the opinion poll; all the participants for their participation in our survey; the IRB of UIUC in general and Dustin  ... 
doi:10.1145/2767007 pmid:26640318 pmcid:PMC4666540 fatcat:2s4nhu2d6vgrtiebdg5qeognbi

Differential Privacy Techniques for Cyber Physical Systems: A Survey [article]

Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen
2019 arXiv   pre-print
This survey can serve as basis for the development of modern differential privacy techniques to address various problems and data privacy scenarios of CPSs.  ...  In particular, we survey the application and implementation of differential privacy in four major applications of CPSs named as energy systems, transportation systems, healthcare and medical systems, and  ...  • We provide an extensive survey of applications of differential privacy in CPSs.  ... 
arXiv:1812.02282v3 fatcat:bnapnprldnaetjnjedz473lrme

Privacy in the Genomic Era [article]

Muhammad Naveed, Erman Ayday, Ellen W. Clayton, Jacques Fellay, Carl A. Gunter, Jean-Pierre Hubaux, Bradley A. Malin, XiaoFeng Wang
2015 arXiv   pre-print
In doing so, we address some of the (sometimes erroneous) beliefs of this field and we report on a survey we conducted about genome data privacy with biomedical specialists.  ...  The collection and analysis of such data has the potential to support various applications, including personalized medical services.  ...  And, obfuscation-based methods reduce the accuracy (or utility) of genomic data.  ... 
arXiv:1405.1891v3 fatcat:5ax5htkxmjbezf4zvw2y3n3q4i

A Comprehensive Survey on Privacy Preserving Big Data Mining

S. Srijayanthi, R. Sethukkarasi
2017 International Journal of Computer Applications Technology and Research  
In this paper, we provide a review of the state-of-the-art methods for privacy preservation  ...  In recent years, privacy preservation of large scale datasets in big data applications such as physical, biological and biomedical sciences is becoming one of the major concerned issues for mining useful  ...  SURVEY Data Modification Data modification techniques modify the original values of a database and the transformed database is made available for mining.  ... 
doi:10.7753/ijcatr0602.1002 fatcat:yh2cedmfgbehfnt77opnacdxai

Security and Privacy in IoT Using Machine Learning and Blockchain: Threats Countermeasures [article]

Nazar Waheed, Xiangjian He, Muhammad Ikram, Muhammad Usman, Saad Sajid Hashmi, Muhammad Usman
2020 arXiv   pre-print
Security and privacy of the users have become significant concerns due to the involvement of the Internet of things (IoT) devices in numerous applications.  ...  Then, we classify the literature on security and privacy efforts based on ML algorithms and BC techniques in the IoT domain.  ...  The past literature was categorized based on application areas, which were supported by an extensive survey of the latest BC-based solutions. Kumar et al.  ... 
arXiv:2002.03488v4 fatcat:cxavellepncexgkfcs5phdj53u

Security and Privacy in Cloud Computing: Technical Review

Yunusa Simpa Abdulsalam, Mustapha Hedabou
2021 Future Internet  
The literature also provides an extensive review of security and privacy issues in cloud computing.  ...  Cloud computing offers advantages and opportunities for business users to migrate and leverage the scalability of the pay-as-you-go price model.  ...  Papanikolaou et al. [98] carried out extensive surveys on how to automate legal and regulatory processes for the regulation and extraction of privacy  ... 
doi:10.3390/fi14010011 fatcat:rzfmwfbxujcu7ohcecbqsb6p2a

Privacy and Security in the Genomic Era

Erman Ayday, Jean-Pierre Hubaux
2016 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16  
In doing so, we address some of the (sometimes erroneous) beliefs of this field and we report on a survey we conducted about genome data privacy with biomedical specialists.  ...  The collection and analysis of such data has the potential to support various applications, including personalized medical services.  ...  (IRB) of UIUC in general and Dustin Yocum in particular for a quick approval of our survey and subsequent changes; and Jeanne-Pascale Simon, Zhicong Huang and Jean-Louis Raisaro for their useful comments  ... 
doi:10.1145/2976749.2976751 dblp:conf/ccs/AydayH16 fatcat:kpmg6s66ordppcl5blaqjv2blm

Secure Multi-Party Computation based Privacy Preserving Data Analysis in Healthcare IoT Systems [article]

Kevser Şahinbaş, Ferhat Ozgur Catak
2021 arXiv   pre-print
Our proposed model presents an extensive privacy and data analysis and achieve high performance.  ...  However, the data transferred to the digital environment pose a threat of privacy leakage.  ...  For example, the advantage of the IoT and cloud computing technologies have been extensively adopted in healthcare, such as remote patient care and hand hygiene monitoring systems [4, 5, 6] .  ... 
arXiv:2109.14334v1 fatcat:lrwbkaxbezgw5kz3xtgqaf2sgm

Privacy Preservation Models for Third-Party Auditor over Cloud Computing: A Survey

Abdul Razaque, Mohamed Ben Haj Frej, Bandar Alotaibi, Munif Alotaibi
2021 Electronics  
In this paper, we present the state of the art of cloud computing's privacy-preserving models (PPM) based on a TPA.  ...  Hence, for the sake of reinforcing the trust between cloud clients (CC) and cloud service providers (CSP), as well as safeguarding the CC's data in the cloud, several security paradigms of cloud computing  ...  In addition, the authors would like to thank the deanship of scientific research at Shaqra University for supporting this work. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/electronics10212721 fatcat:c2ii7g47z5avhgh6nl64gjnjkm

DIFFERENTIAL PRIVACY FOR IOT-ENABLED CRITICAL INFRASTRUCTURE: A COMPREHENSIVE SURVEY

Muhammad Akbar Husnoo, Adnan Anwar, Ripon K. Chakrabortty, Robin Doss, Mike J. Ryan
2021 IEEE Access  
This paper provides a comprehensive and extensive survey of the application and implementation of differential privacy in four major application domains of IoT-enabled critical infrastructure: Smart Grids  ...  Adversaries carry out privacy-oriented attacks to gain access to the sensitive and confidential data of critical infrastructure for various self-centered, political and commercial gains.  ...  Rastogi and Nath's [26] innovative approach for privacy preservation in distributed data sources illustrated the accuracy of DP and its extensions for IoT networks.  ... 
doi:10.1109/access.2021.3124309 fatcat:vejtyjyrwffeffi7ob2o2svyja

Privacy Aspects of Recommender Systems [chapter]

Arik Friedman, Bart P. Knijnenburg, Kris Vanhecke, Luc Martens, Shlomo Berkovsky
2015 Recommender Systems Handbook  
We analyze the risks to user privacy imposed by recommender systems, survey the existing solutions, and discuss the privacy implications for the users of the recommenders.  ...  In this chapter we overview the state of the art in privacy enhanced recommendations.  ...  that the privacy-accuracy trade-off also exists in differential privacy based methods.  ... 
doi:10.1007/978-1-4899-7637-6_19 fatcat:a37glurl2vgyhconf6ihghekge

AN ENHANCED PRIVACY PRESERVING APPROACH WITH ENFORCING POLICIES FOR PROCESSING BIG DATA IN SPARK FRAMEWORK

Revathy Swaminathan, Arunkumar Thangavelu
2018 International Journal of Engineering & Technology  
Ensuring the privacy for the big data stored in a cloud system is one of the demanding and critical process in recent days.  ...  These enhanced mechanisms guarantee the security and confidentiality of the big data with reduced time consumption and increased accuracy.  ...  It has the capability to execute millions of instructions per second, so it has been extensively used in many application areas [2] .  ... 
doi:10.14419/ijet.v7i3.10.15613 fatcat:o35indycjzcjtfkz5paw26zo7e

Security and Privacy in Vehicular Ad Hoc Network and Vehicle Cloud Computing: A Survey

Muhammad Sameer Sheikh, Jun Liang, Wensong Wang
2020 Wireless Communications and Mobile Computing  
Several methods have been proposed for discussing the security and privacy issues for the vehicular ad hoc networks (VANETs) and vehicular cloud computing (VCC).  ...  In sum, this survey comprehensively covers the location privacy and trust management models of the VANETs and discusses the security and privacy issues in the VCC, which fills the gap of existing surveys  ...  Based on the vehicular network, the VCC has emerged, which is an extension of mobile cloud computing (MCC) [29] . Vehicular Cloud Computing.  ... 
doi:10.1155/2020/5129620 fatcat:6akm5x43pnegdkcu4xe4tewe5u

Local Differential Privacy for Deep Learning

Pathum Chamikara Mahawaga Arachchige, Peter Bertok, Ibrahim Khalil, Dongxi Liu, Seyit Camtepe, Mohammed Atiquzzaman
2019 IEEE Internet of Things Journal  
Hence, the randomization module can operate as an NFV privacy preservation service in an SDN-controlled NFV, making LATENT more practical for IoT-driven cloud-based environments compared to existing approaches  ...  IoT platforms are continually improving with innovations such as the amalgamation of software-defined networks (SDN) and network function virtualization (NFV) in the edge-cloud interplay.  ...  It is also essential that these privacy-preserving approaches for DL can be used for IoT based applications such as smart healthcare, IIoT, and Industry 4.0.  ... 
doi:10.1109/jiot.2019.2952146 fatcat:ss4vbsqkh5d27cb7p3kpzuog5y
« Previous Showing results 1 — 15 out of 6,878 results