33,804 Hits in 3.4 sec

Real Medical Data Processing and Prediction of Early Disease Using Sensors, Internet of Things (IoT) and R Programming Techniques

Pavan HVS, Maruti P, Viswanadh NR, Puhazholi
2018 Journal of Biosensors & Bioelectronics  
Thirdly, for privacy-preserving of remote cloud knowledge, we tend to partition the data hold on within the remote cloud and cypher the information in different ways that, thus on not simply guarantee  ...  Patient Self-controllable and Multilevel Privacy-preserving Cooperative Authentication in Distributed m-Health care Cloud automatic data processing system [1] .  ... 
doi:10.4172/2155-6210.1000254 fatcat:4ea2tlde65eqdkf44l7xej7frq

PRIVATE-IYE: A Framework for Privacy Preserving Data Integration

S.S. Bhowmick, L. Gruenwald, M. Iwaihara, S. Chatvichienchai
2006 22nd International Conference on Data Engineering Workshops (ICDEW'06)  
Figure 2 (a) shows the architecture of the privacy preserving query processing mechanism at a remote source. This architecture can easily be extended to a set of remote sources.  ...  In this paper we present a framework for building a deployable system called PRIVATE-IYE (PRIvacy PreserVing DAta InTEgratIon SYstEm) and some of the major research issues associated with this framework  ... 
doi:10.1109/icdew.2006.117 dblp:conf/icde/BhowmickGIC06 fatcat:vjssm4cotnfzvotc3oni3pzgue

Recent progress in database privacy

Josep Domingo-Ferrer, Yücel Saygın
2009 Data & Knowledge Engineering  
by statistical disclosure control (SDC), owner privacy, addressed by privacy-preserving data mining (PPDM), and user privacy, pursued by private information retrieval (PIR).  ...  Database privacy can be conceptually described in terms of three dimensions, each of which refers to the privacy of a different subject and is pursued by a different discipline: respondent privacy, addressed  ...  In ''Accurate and large-scale privacy-preserving data mining using the election paradigm", Magkos, Maragoudakis, Chrissikopoulos and Gritzalis discuss the design of large-scale PPDM systems in a fully  ... 
doi:10.1016/j.datak.2009.06.002 fatcat:yi2dknzycjev7f7734nxiccjs4


2018 International Journal of Computing Communications and Networking  
In this paper, we propose two-cloud architecture for secure database, with a series of intersection protocols that provide privacy preservation to various numeric-related range queries.  ...  .), those schemes cannot provide sufficient privacy protection against practical challenges, e.g., privacy leakage of statistical properties, access pattern.  ...  From the work in [16] , the privacy can be preserved Against the cloud, if the sensitive knowledge is partitioned into two parts, and distributed to two non-colluding clouds.  ... 
doi:10.30534/ijccn/2018/39722018 fatcat:m2t3hg34bbdsrpjf3kpypfd4rq

Data-Driven Automated Cardiac Health Management with Robust Edge Analytics and De-Risking

Arijit Ukil, Antonio J. Jara, Leandro Marin
2019 Sensors  
When a user sets for privacy protection, appropriate privacy preservation is guaranteed for defense against privacy-breaching knowledge mining attacks.  ...  Remote and automated healthcare management has shown the prospective to significantly impact the future of human prognosis rate.  ...  Such kind of de-risking system surely induces much more acceptability to the remote health screening and medical service provider eco-system.  ... 
doi:10.3390/s19122733 fatcat:ha222tvzyfhqvgvpriwh4irnai


B. Chinna Babu .
2015 International Journal of Research in Engineering and Technology  
In this paper, we propose a secure cloud storage system by supporting public privacy-preserving auditor service to the user data. so, here enable the TPA performance for multiple users efficiently.  ...  We motivate the best knowledge and our best scheme. The first support scalable and efficient public auditing in cloud.  ...  Here we present a public auditing scheme with provably zero knowledge leakage.  ... 
doi:10.15623/ijret.2015.0414007 fatcat:py7ywxkfx5b43o2dcq3nl6jwgu

Secure Audit Service by using TPA

Pradnya P.
2016 International Journal of Computer Applications  
Using Cloud Storage, users can remotely store their data and enjoy high quality applications and services from a shared pool of resources.  ...  Definitions and Framework A similar definition of previously proposed schemes in the context of remote data integrity checking and adapt the framework for privacy-preserving public auditing system.  ...  Again, their approach is not privacy preserving due to the same reason as [9] . Shah et al.  ... 
doi:10.5120/ijca2016909136 fatcat:3rtg2lrp2bhmneu33yhulh7oyi

An Experiment Study on Federated LearningTestbed [article]

Cheng Shen, Wanli Xue
2021 arXiv   pre-print
Recently, federated learning is proposed as an approach for privacy-preserving machine learning (PPML) for the IoT, while its practicability remains unclear.  ...  While the Internet of Things (IoT) can benefit from machine learning by outsourcing model training on the cloud, user data exposure to an untrusted cloud service provider can pose threat to user privacy  ...  It enables remote computation process on IoT devices by giving instructions from the centralized server without the knowledge of raw user data.  ... 
arXiv:2103.10579v1 fatcat:mrgrxor5xrb7rfsdgdwormh2me

Knowledge-Driven Analytics and Systems Impacting Human Quality of Life

Arijit Ukil, Leandro Marin, Antonio Jara, John Farserotu
2019 Proceedings of the 28th ACM International Conference on Information and Knowledge Management - CIKM '19  
It is understood that knowledge-driven initiatives in terms of technology, application and practical deployment have strong capability to enable long term human-centric convergence of cyber-physical systems  ...  Our endeavor is to discuss those finer details, research directions and application development aspects of analytics and systems intended for impacting human quality of life.  ...  Data privacy preservation such that different privacy breaching attacks can be nullified has been studied for years [8] [9][10] [11] .  ... 
doi:10.1145/3357384.3358799 dblp:conf/cikm/UkilMJF19 fatcat:5wnoaz6ct5f47mtbshca3dpxee

Privacy Conservation and Public Inspection for Secure Cloud Storage

2016 International Journal of Science and Research (IJSR)  
Using Cloud Storage, users will remotely store their information and revel in the on-demand top quality applications and services from a shared pool of configurable computing resources, while not the burden  ...  information support. during this paper we tend to are introducing associate economical mechanism for information correctness and error detection, for the implementation purpose we tend to simulated the system  ...  Thus, the PDP model for remote knowledge checking supports giant knowledge sets in widely-distributed storage systems.  ... 
doi:10.21275/v5i4.25031610 fatcat:6ycjfok6dfasrlk6agslii5z4i

Data Protection Based On Dynamic Encryption for Secure Cloud Computing

Akash Jain, Prasad Mancharkar, Govinda Mahajan
2014 IOSR Journal of Computer Engineering  
In this paper, we utilize and uniquely combine the public key based homomorphic authenticator with random masking to achieve the privacy-preserving public cloud data auditing system, which meets all above  ...  Cloud Computing is the long dreamed vision of computing as a utility, where users can remotely store their data into the cloud so as to enjoy the on-demand high quality applications and services from a  ...  schemes in the context of remote data integrity checking and adapt the framework for our privacy-preserving public auditing system.  ... 
doi:10.9790/0661-16153033 fatcat:sv7m7ugjgjdm3hjtyo6hlbriqy


Prof Chethan Raj C, Shivani M S, Sowjanya D R, Sowmya M T, Tejaswini D R
2020 International Journal of Innovative Research in Computer Science & Technology  
Numerous data integrity auditing systems have been implemented to guarantee the quality of the data stored in the cloud.  ...  Most of the new data integrity auditing system will be unable to operate if the user misplaced this hardware token or forgot this password.  ...  Data Possession Checking with Privacy-Preserving Authenticators for Cloud Storage, Fanyu Konhg [7] In this paper, they propose a new paradigm named remote data possession checking with privacy-preserving  ... 
doi:10.21276/ijircst.2020.8.4.9 fatcat:5375uqbzungm3opqzjkv7fhw5i

Public Audit for Cloud Computing Environment: A Review

Tejashri A., Ashish T.
2017 International Journal of Computer Applications  
The cloud computing in its various form allow users to store information at remote location and reduce load at local system.  ...  The paper reviews privacy preserving public audit schemes in cloud computing environment.  ...  2) Privacy preservation 3) Searching over encrypted data 4) Auditing of cloud data System Model The main goal of proposed system is to secure and protect the data which come under the property of users  ... 
doi:10.5120/ijca2017913372 fatcat:hndaygbz4bbgbntv4cprp45dee

Study on Auditing Approaches for Preserving Data Integrity in Cloud Storage

Anne Srijanya .K
2017 International Journal of Advanced Research in Computer Science and Software Engineering  
Cloud computing provides cloud storage a service in which data is maintained, managed and backed up remotely through a centralized large data centres and made available to user over a network.  ...  Management of data in a remote data centre may not be trustworthy. For this purpose many approaches were introduced for verifying the integrity of the user's data on the cloud storage.  ...  Lou first presented Privacy preserving public auditing system for data storage security in cloud computing ,where TPA can perform the storage auditing without demanding the local copy of data.  ... 
doi:10.23956/ijarcsse/v7i3/0146 fatcat:h62qz456u5gdbeywefx6n66tku

Privacy Enhanced Speech Emotion Communication using Deep Learning Aided Edge Computing [article]

Hafiz Shehbaz Ali, Fakhar ul Hassan, Siddique Latif, Habib Ullah Manzoor, Junaid Qadir
2021 arXiv   pre-print
To the best of our knowledge, this is the first work on a privacy-preserving framework for emotion sensing in the communication network.  ...  In this work, we present a privacy-enhanced emotion communication system for preserving the user personal information in emotion-sensing applications.  ...  We proposed the use of privacy preserved feature extraction model in edge computing layer.  ... 
arXiv:2103.17139v1 fatcat:ucslkbhc3fbgbdrhqsuk363m6e
« Previous Showing results 1 — 15 out of 33,804 results