Filters








10,258 Hits in 6.0 sec

Privacy-Preserving Assessment of Social Network Data Trustworthiness

Chenyun Dai, Fang-Yu Rao, Traian Marius Truta, Elisa Bertino
2014 International Journal of Cooperative Information Systems  
This paper addresses this issue by introducing the problem of data trustworthiness in social networks when repositories of anonymized social networks exist that can be used to assess such trustworthiness  ...  To add to the difficulty of this problem, privacy concerns that exist for many social network datasets have restricted the ability to analyze these networks and consequently to maximize the knowledge that  ...  The organizations that own such data will benefit from it if they can assess the trustworthiness of such data and if identify possible fake information.  ... 
doi:10.1142/s0218843014410044 fatcat:73igpjs4q5dgtbzo53vj4oj5q4

Privacy-Preserving Assessment of Social Network Data Trustworthiness

Chenyun Dai, Fang-Yu Rao, Traian Truta, Elisa Bertino
2012 Proceedings of the 8th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing  
This paper addresses this issue by introducing the problem of data trustworthiness in social networks when repositories of anonymized social networks exist that can be used to assess such trustworthiness  ...  To add to the difficulty of this problem, privacy concerns that exist for many social network datasets have restricted the ability to analyze these networks and consequently to maximize the knowledge that  ...  The organizations that own such data will benefit from it if they can assess the trustworthiness of such data and if identify possible fake information.  ... 
doi:10.4108/icst.collaboratecom.2012.250417 dblp:conf/colcom/DaiRTB12 fatcat:epo36blqq5dn5iful6y4hvchmq

Identity, Privacy, and Deception in Social Networks

Elisa Bertino, James Caverlee, Elena Ferrari
2014 IEEE Internet Computing  
for preserving privacy in social networks.  ...  Privacy is also relevant in this context because assessing information trustworthiness should not come at the expense of privacy.  ... 
doi:10.1109/mic.2014.27 fatcat:lgv6jq7kybbbrcwx36m4dwgsdy

Editorial: Introduction to Data Security and Privacy

Elisa Bertino
2016 Data Science and Engineering  
The widespread and intensive use of data for many different tasks makes, however, data security, trustworthiness, and privacy increasingly critical requirements.  ...  Technological advances, such as sensors, smart mobile devices, Internet of things (IoTs), and novel systems, and applications, such as cloud systems, cyber-physical systems, social networks, and smart  ...  We need efficient privacy-preserving protocols to assure the confidentiality of data stored in the cloud.  ... 
doi:10.1007/s41019-016-0021-1 fatcat:pi7esz2rs5e2hkemmyvjsvpaeu

PRIVACY PRESERVING AND OBSCURE DELICATE DATA WITH COLLABORATIVE TAGGING

A Divya .
2014 International Journal of Research in Engineering and Technology  
In actual system provide taxonomy of tagging system and system web technologies help to specify labels and rate for that labels which assess the trustworthiness of resources to enforce web access personalization  ...  SVM is used for extraction of data and obscure delicate data. PET is achieved by using the technique Tag Suppression which has the role of providing the privacy for information.  ...  The devise mechanism is to assess the trustworthiness of web metadata with the availability of WBSN (Web Based Social Networks) providing their availability of specifying and sharing metadata.  ... 
doi:10.15623/ijret.2014.0310036 fatcat:s2535n7i3zfjxlyi2p7dhskt7i

Data Security – Challenges and Research Opportunities [chapter]

Elisa Bertino
2014 Lecture Notes in Computer Science  
The proliferation of web-based applications and information systems, and recent trends such as cloud computing and outsourced data management, have increased the exposure of data and made security more  ...  In this paper we briefly discuss open issues, such as data protection from insider threat and how to reconcile security and privacy, and outline research directions.  ...  models and mechanisms for social networks and mobile devices.  ... 
doi:10.1007/978-3-319-06811-4_2 fatcat:alb6rnpz6zgaroa3an63bpt2dy

User privacy and data trustworthiness in mobile crowd sensing

Daojing He, Sammy Chan, Mohsen Guizani
2015 IEEE wireless communications  
DATA TRUSTWORTHINESS Data trustworthiness and user privacy preservation are two conflicting objectives in an MCS application.  ...  Strong mechanisms for protecting privacy might influence data trustworthiness. On the other hand, protecting the data trustworthiness counteracts the mechanisms for preserving privacy.  ...  If participants are malicious, they would provide falsified data and it is difficult to identify them especially when different task actions are not linked due to privacy protection.  ... 
doi:10.1109/mwc.2015.7054716 fatcat:lpfgc3pwc5fd5hsy4gxw5hjvl4

IEEE Access Special Section Editorial: Trusted Computing

Zheng Yan, Venu Govindaraju, Qinghua Zheng, Yan Wang
2020 IEEE Access  
TRUSTWORTHY RECOMMENDATION In order to solve cold start problems and preserve data privacy, in the article ''A privacy-preserving framework for trust-oriented point-of-interest recommendation,'' Liu et  ...  al., proposed a framework to encourage data owners to share their data and realize privacy-preserving and trustworthy POI recommendations.  ... 
doi:10.1109/access.2020.2969768 fatcat:il5i7ofsbrdgho6m6roodlrqsy

TrustChain: A Privacy Preserving Blockchain with Edge Computing

Upul Jayasinghe, Gyu Myoung Lee, Áine MacDermott, Woo Seop Rhee
2019 Wireless Communications and Mobile Computing  
and to preserve the resources in IoT networks.  ...  Yet, this paradigm continuously suffers from numerous security and privacy concerns mainly due to its massive scale, distributed nature, and scarcity of resources towards the edge of IoT networks.  ...  generators, heterogeneity of the device resources, the scale of the network, and difficulty of assessing the trustworthiness of participating stakeholders [9] .  ... 
doi:10.1155/2019/2014697 fatcat:etuutda6sne2thmnbdtinujvqi

Trust Aware System for Social Networks: A Comprehensive Survey

Manasa S., Manjula S., Venugopal K.
2017 International Journal of Computer Applications  
Existing social networks have millions of users and the data generated by them are huge and it is difficult to differentiate the real users and the fake users.  ...  Users on social networks are authorised by providing the personal data.  ...  The main social networking services are: 1) Trustworthy Large Scale Social Networks Evaluation 2) Data Privacy Preserving 3) Friend Recommendation 4) Vote Trust In social Networking 5) Trust Based web  ... 
doi:10.5120/ijca2017913307 fatcat:2xc5xryfcfewhnf7hjg5jhqjaa

Privacy-Aware Trust-Based Recruitment in Social Participatory Sensing [chapter]

Haleh Amintoosi, Salil S. Kanhere
2014 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
The first factor is the level of trustworthiness of a route, which evaluates its reliability to ensure that the integrity of the message is preserved.  ...  The main idea behind social participatory sensing is to leverage social networks as the underlying infrastructure for recruiting social friends to participate in a sensing campaign.  ...  T rust(R i ) is in the range of [0,1]. Privacy Score of the Route When discussing about privacy in social networks, it is important to specify what defines failure to preserve privacy.  ... 
doi:10.1007/978-3-319-11569-6_21 fatcat:l5kphz6azfarvn6xb7mr7c4mdi

The Impact of Using Social Media with Political Purposes on the Intention of Political Participation of Social Media Users

Soobum Lee, 김동우
2012 Journal of Public Relations  
meta data, and e) longevity of data & retention of records.  ...  These critical factors are: a) information credibility, integrity, and accuracy, b) security, privacy, and confidentiality of information, c) ensuring information access and availability, and d) data sharing  ...  of privacy protection · Visibility · Preservation of interest 4.  ... 
doi:10.15814/jpr.2012.16.1.78 fatcat:jurwyikruffxfhskk5qv3a2j6y

Social media security and trustworthiness: Overview and new direction

Zhiyong Zhang, Brij B. Gupta
2018 Future generations computer systems  
To address the challenge, this paper firstly made a survey on the state-of-the-art of social media networks security and trustworthiness particularly for the increasingly growing sophistication and variety  ...  Unfortunately, there is a lack of investigating on effective and efficient evaluations and measurements for security and trustworthiness of various social media tools, platforms and applications, thus  ...  The study should focus on how to evaluate, measure, and increase (optimize) the trustworthiness and security to realize the goal of ''constructing a trustworthy, security-preserving social media ecosystem  ... 
doi:10.1016/j.future.2016.10.007 fatcat:jn7222u73fctncxcdsasi7umbq

Multi-Perspective Trust Management Framework for Crowdsourced IoT Services [article]

Mohammed Bahutair, Athman Bouguettaya, Azadeh Ghari Neiat
2021 arXiv   pre-print
We demonstrate the effectiveness of our approach by conducting experiments on real-world datasets.  ...  Each perspective is defined by a set of attributes that contribute to the perspective's influence on trust.  ...  The statements made herein are solely the responsibility of the authors.  ... 
arXiv:2101.04244v1 fatcat:fdhc5xva3bczpj6ypk3ro7pt4q

Guest Editorial Introduction to the Special Section on Blockchains in Emerging Vehicular Social Networks

Hongwei Li, Chao Zhang, Mohamed Mahmoud, Rongxing Lu
2020 IEEE Transactions on Vehicular Technology  
Security analysis proves that the proposed scheme can preserve the privacy of original data and the training intermediate values.  ...  In "Secure SVM Training Over Vertically-Partitioned Datasets Using Consortium Blockchain for Vehicular Social Networks," the authors propose a privacy-preserving SVM classifier training scheme over vertically-partitioned  ...  His research interests include applied cryptography, privacy enhancing technologies, and IoT-Big Data security and privacy.  ... 
doi:10.1109/tvt.2020.2991623 fatcat:rqjvbm3df5dpljevvlimyqd4ju
« Previous Showing results 1 — 15 out of 10,258 results