32,570 Hits in 2.9 sec

Discrimination Prevention using Privacy Preserving Techniques

Asmita Kashid, Vrushali Kulkarni, Ruhi Patankar
2015 International Journal of Computer Applications  
Recently, it is observed that data mining technique may come across two problems-potential discrimination and potential privacy violation.  ...  Privacy violation occurs if a person's sensitive information is displayed to an unauthorized entity as a result of data mining tasks.  ...  As privacy preservation is well explored area, many of the privacy preservation methods can be used for discrimination prevention.  ... 
doi:10.5120/21195-3860 fatcat:2bqqlaol4vem3ff5vn2aeo7i6u

Location Privacy in Device-Dependent Location-Based Services: Challenges and Solution

Yuhang Wang, Yanbin Sun, Shen Su, Zhihong Tian, Mohan Li, Jing Qiu, Xianzhi Wang
2019 Computers Materials & Continua  
The credit system tie together the DLBS device usability with the curious behaviour upon user's location privacy, DLBS provider has to sacrifice their revenue in order to gain extra location information  ...  To conquer these threats, we design a service architecture along with a credit system between DLBS provider and the user.  ...  Then, based on the credit score system and the proxy architecture, we designed a brand new DLBS framework, which can preserve the location privacy efficiently.  ... 
doi:10.32604/cmc.2019.05547 fatcat:pa6nf5m24rbc5pfaljfaiufxpa

Discrimination Prevention with Classification and Privacy Preservation in Data mining

Krishna KumarTripathi
2016 Procedia Computer Science  
There are the various negative social perceptions related to mining of data, out of which many are potential discrimination and potential privacy invasion.  ...  automated data collection techniques such as classification and association rule mining have provided way to taking decisions automatically, such as computation of insurance premium, loan granting or denial, credit  ...  Design a framework for web-based automated system for discrimination prevention with classification and privacy preservation. 5.  ... 
doi:10.1016/j.procs.2016.03.032 fatcat:magtwwbzbfaslpcgrqvf6gquve

Privacy Preservation Technologies in Internet of Things [article]

Jaydip Sen
2012 arXiv   pre-print
In this paper, we consider different approaches to technological protection of user data privacy in the world of Internet of Things.  ...  The privacy-preserving techniques proposed in [19] may be used in a more general context (not only in credit checking domain).  ...  Thus the privacy-preserving solution of credit checking is a process of approval of a loan application, where both the borrower's (Bob) private information from the credit report and lender's (Linda) qualification  ... 
arXiv:1012.2177v3 fatcat:56copu3ttjgldcndfoab7sbs6a

Introduction to Credit Networks

Aniket Kate
2016 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16  
We then describe and analyze recent and ongoing projects to improve the credit-network security, privacy and reliability.  ...  Nevertheless, this enthusiasm in the market significantly exceeds our understanding of security, privacy, and reliability of these inherently distributed systems.  ...  [13] formalize the integrity and privacy requirements of credit network transactions, and develop PrivPay, a centralized privacy-preserving architecture for credit networks, based on trusted hardware  ... 
doi:10.1145/2976749.2976755 dblp:conf/ccs/Kate16 fatcat:3xqzsq5xirfonhqqhtx5wz2g4i

Privacy-preserving participatory sensing

Qinghua Li, Guohong Cao
2015 IEEE Communications Magazine  
To protect privacy, tokens and their commitments are constructed and used in a privacy-preserving way.  ...  One option is to use blind signature to implement privacy-preserving credits, since it has been widely used for anonymous electronic payment.  ... 
doi:10.1109/mcom.2015.7180510 fatcat:fg2zo2dg7febfiil5lrs4hclky

A System to Analyze an Effect of Privacy Protection on Direct Discrimination

Asmita Gorave, Vrushali Kulkarni
2017 International Journal of Computer Applications  
Privacy violation occurs if a person's sensitive information is disclosed as a result of data mining tasks. Privacy  ...  Privacy provides right to a person to decide whether to disclose or not to disclose his/her sensitive information.  ...  Our system can work as a tool for analyzing effect of privacy preserving techniques on discrimination.  ... 
doi:10.5120/ijca2017915309 fatcat:dl6i7omk4nhijphy44nogrti2u

Privacy and incentive mechanisms in people-centric sensing networks

Daojing He, Sammy Chan, Mohsen Guizani
2015 IEEE Communications Magazine  
Resisting Corrupted Data While Preserving Privacy: While it is important for PS systems to preserve participants' privacy, such systems are vulnerable to the corrupted data purposely submitted by malicious  ...  Anonymity, Report Unlinkability, Location Privacy: A PS system with privacy preservation should provide anonymity, report unlinkability, and location privacy.  ... 
doi:10.1109/mcom.2015.7295484 fatcat:3vfqgbhpnffj3a5yk6wxyk4zni

An Anonymous Credit Card System [chapter]

Elli Androulaki, Steven Bellovin
2009 Lecture Notes in Computer Science  
In this paper, we present a practical and accountable anonymous credit system based on ecash , with a privacy preserving mechanism for error correction and expense-reporting.  ...  Credit cards have many important benefits; however, these same benefits often carry with them many privacy concerns.  ...  We need a system that preserves the benefits of credit cards without violating users' privacy.  ... 
doi:10.1007/978-3-642-03748-1_5 fatcat:ifljwwwus5dz7nhf5mpen43ve4

An Efficient Privacy-Preserving Incentive Scheme without TTP in Participatory Sensing Network [article]

Jingwei Liu, Xiaolu Li, Rong Sun, Xiaojiang Du, Paul Ratazzi
2018 arXiv   pre-print
In this paper, we construct an efficient privacy-preserving incentive scheme without trusted third party (TTP) for PSNs to motivate user-participation.  ...  This scheme allows each participant to earn credits by contributing data privately. Using blind and partially blind signatures, the proposed scheme is proved to be secure for privacy and incentive.  ...  AN EFFICIENT PRIVACY-PRESERVING INCENTIVE SCHEME WITHOUT TTP IN PSNS To solve the contradiction between privacy preservation and incentive mechanism, we propose an efficient privacypreserving incentive  ... 
arXiv:1811.03238v1 fatcat:jnpqoq5i2jgr5butsl2jdazfqi

Web Services Privacy Preserving Based on Negotiation and Certificate Authorities

A. Meligy, Emad Elabd, Sahar Kotb
2016 International Journal of Modern Education and Computer Science  
Preserving privacy of web services is one of the main challenges during their interaction.  ...  Credentials generalization and substitution and credentials encryption can be used for privacy preserving.  ...  Besides, the policy substitution can be used for preserving privacy.  ... 
doi:10.5815/ijmecs.2016.10.07 fatcat:ojhqxxo75fd4bkmxxxkvje3zrm

Federated learning for privacy-preserving data access

Małgorzata Śmietanka, Hirsh Pithadia, Philip Treleaven
2021 International Journal of Data Science and Big Data Analytics  
It also presents a privacy-preserving federated learning infrastructure.  ...  Federated learning is a pioneering privacy-preserving data technology and also a new machine learning model trained on distributed data sets.  ...  Re f e r e n c e Credit card fraud detection (Yang et al., 2019) Scoring systems (OpenMined, 2020) Credit rating Tencent's WeBank Figure 1 : 1 Federated learning HFL vs. VFL vs.  ... 
doi:10.51483/ijdsbda.1.2.2021.1-13 fatcat:b4rbxexaerburf5xrscizs27ae

Privacy protection in mobile crowd sensing: a survey

Yongfeng Wang, Zheng Yan, Wei Feng, Shushu Liu
2019 World wide web (Bussum)  
Besides, we review the achievements on privacy-preserving incentives in MCS from four viewpoints of incentive measures: credit incentive, auction incentive, currency incentive, and reputation incentive  ...  We first introduce a typical system structure of MCS, summarize its characteristics, propose essential requirements on privacy on the basis of a threat model.  ...  a) Privacy protection in credit-based incentive (Cr) Credit is a kind of incentive measure.  ... 
doi:10.1007/s11280-019-00745-2 fatcat:eu5uhqeae5fttgforze6w2ctzi

Enabling Strong Privacy Preservation and Accurate Task Allocation for Mobile Crowdsensing [article]

Jianbing Ni, Kuan Zhang, Qi Xia, Xiaodong Lin, Xuemin Shen
2018 arXiv   pre-print
In addition, a privacy-preserving credit management mechanism is introduced to achieve decentralized trust management and secure credit proof for mobile users.  ...  In this paper, we propose SPOON, a strong privacy-preserving mobile crowdsensing scheme supporting accurate task allocation from geographic information and credit points of mobile users.  ...  sensing tasks based on the locations and credit points of mobile users; and (4) supports privacy-preserving credit management without a centralized server.  ... 
arXiv:1806.04057v1 fatcat:s5bsackfzray5lffyhcqchyfw4

Hy-Bridge: A Hybrid Blockchain for Privacy-Preserving and Trustful Energy Transactions in Internet-of-Things Platforms

Mahdi Daghmehchi Firoozjaei, Ali Ghorbani, Hyoungshick Kim, Jaeseung Song
2020 Sensors  
To preserve the IoT users' privacy and avoid any information leakage to the main blockchain, an interconnection position, called bridge, is introduced to isolate IoT users' peer-to-peer transactions and  ...  The security and privacy issues are inevitable with an untrusted or compromised IoT platform provider.  ...  For instance, having no link to the real identity of the entities involved in a billing and charging system, we can provide a pseudonymity feature that leads to the privacy being preserved.  ... 
doi:10.3390/s20030928 pmid:32050570 pmcid:PMC7038981 fatcat:l5pbpb27nvgxjlrhhjvxlxrd4a
« Previous Showing results 1 — 15 out of 32,570 results