A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Protecting privacy by sanitizing personal data
2013
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security - ASIA CCS '13
A user gets from the organization a signed document certifying personal data (e.g. name, address, studies, etc.) and plays the role of the sanitizer. ...
Anonymous credential systems allow users to obtain certified credentials from organizations and use them later without being traced. ...
We are also grateful to Amandine Jambert for helpful discussions on sanitizable signatures, to Sherman Chow for his help on this final version and to anonymous referees for their valuable comments. ...
doi:10.1145/2484313.2484363
dblp:conf/ccs/CanardL13
fatcat:av5sdmff4bcdzgdupzrmrxplve
Analytical Approach for Privacy Preserving of Medical Data
2015
International Journal of Engineering Research and
We describe the workflow for privacy aware data analysis in mental health research and develop a analytical approach for privacy preserving of medical data to address these concerns. ...
care, security controls and privacy protection of individual data. ...
Data Anonymization Data anonymization [9] is a process of information sanitization whose intent is privacy protection. ...
doi:10.17577/ijertv4is100466
fatcat:po5yirpcira4ferp4vfyi2u6dq
Data Privacy in Data Engineering, the Privacy Preserving Models and Techniques in Data Mining and Data Publishing: Contemporary Affirmation of the Recent Literature
2012
International Journal of Computer Applications
be one of the most important research areas of interest and has also triggered a serious issue of concern in accordance with the personal data usage in the recent times. ...
Privacy preserving for data engineering methods like mining and publishing etc., with the advancement of the rapid development of technologies like Internet and distributed computing has turned out to ...
Data can be put on anonymous mode by using the sanitization approach which is helpful in hiding the data's accurate values. ...
doi:10.5120/9676-4103
fatcat:obyi6o2tbbhxrhdzupqt3p4aia
A Study on Privacy Preserving Methodologies in Big Data
2016
Indian Journal of Science and Technology
The requirement to change the debate from big data and confidentiality to big data with confidentiality, implementing the confidentiality and data safeguarding schemes as a vital value of big data for ...
Methods/Statistical Analysis: In order to get the benefits of analytics without degrading confidentiality, it is necessary to include data protection techniques as core element of big data analytics. ...
A Study on Privacy Preserving Methodologies in Big Data
Streaming Data Data streams pose new risks to participants occupied in big data from privacy context. ...
doi:10.17485/ijst/2016/v9is1/104234
fatcat:o3irtlp4hrcxbnuhufjczebw7q
Privacy-preserving data outsourcing in the cloud via semantic data splitting
2017
Computer Communications
Several privacy-protection mechanisms based on a prior encryption of the data to be outsourced have been proposed. ...
Because both efficiency and functionality are crucial advantages of cloud computing, in this paper we aim at retaining them by proposing a privacy-protection mechanism that relies on splitting (clear) ...
Acknowledgements and disclaimer This work was partly supported by the European Commission (projects H2020-644024 "CLARUS" and H2020-700540 "CANVAS"), by the Spanish Government (projects TIN2014-57364-C2 ...
doi:10.1016/j.comcom.2017.06.012
fatcat:3fmwhsr6ijdb3m2zfmi6t5yrwi
Misusability Measure Based Sanitization of Big Data for Privacy Preserving MapReduce Programming
2018
International Journal of Electrical and Computer Engineering (IJECE)
We followed a hybrid approach that caters to the needs of privacy preserving MapReduce programming. ...
In this paper we proposed a comprehensive methodology for effective sanitization of data based on misusability measure for preserving privacy to get rid of data leakage and misuse. ...
The algorithm modifies transactions in order to achieve sanitation. Canard and Lescuyer [11] proposed a novel approach for sanitizing personal data that makes use of anonymous credentials. ...
doi:10.11591/ijece.v8i6.pp4524-4532
fatcat:duj3tpetrvhdverguqhyvrvcim
DAPriv: Decentralized architecture for preserving the privacy of medical data
[article]
2014
arXiv
pre-print
This is a complete architecture that provides patients with a good level of privacy, secure communication and more direct control. ...
The digitization of the medical data has been a sensitive topic. ...
The research is supported by the Estonian Science Foundation grants ETF9287 and PUT360, and the European Social Fund for Doctoral Studies and Internationalisation Programme DoRa. ...
arXiv:1410.5696v1
fatcat:z4xj4tmz6raaznoiowa2lxndbq
Big healthcare data: preserving security and privacy
2018
Journal of Big Data
However, deciding on the allowable uses of data while preserving security and patient's right to privacy is a difficult task. ...
Indeed, the concerns over the big healthcare data security and privacy are increased year-by-year. ...
Acknowledgements The author forwards his heartfelt gratitude to two anonymous reviewers for their careful reading of the manuscript and their helpful comments that improve the presentation of this work ...
doi:10.1186/s40537-017-0110-7
fatcat:jmon5tby4req7museetrt5zjjq
Anonymization in Social Ne tworks: A Survey on the issues of Data Privacy in Social Network Sites
2016
International Journal Of Engineering And Computer Science
the existing anonymization techniques for privacy preserving publishing of social net-work data. ...
We argue that the different privacy problems are entangled and that research on privacy in OSNs would benefit from a more holistic approach. ...
A method that is used to publish data and protect user privacy is called anonymization. ...
doi:10.18535/ijecs/v5i3.07
fatcat:oashkvfh6rgvrpfso2knjeb23e
Secure personal data servers
2010
Proceedings of the VLDB Endowment
By embedding a full-fledged Personal Data Server in such devices, user control of how her sensitive data is shared by others (by whom, for how long, according to which rule, for which purpose) can be fully ...
However, these benefits must be weighed against privacy risks incurred by centralization. This paper suggests a radically different way of considering the management of personal data. ...
Acknowledgments: The authors wish to thank Anne Canteaut and Philippe Bonnet for their helpful comments on this paper. ...
doi:10.14778/1920841.1920850
fatcat:tab7ustvajeqbgewqin4oaayzy
A General Survey of Privacy-Preserving Data Mining Models and Algorithms
[chapter]
2008
Privacy-Preserving Data Mining
We also discuss cases in which the output of data mining applications needs to be sanitized for privacy-preservation purposes. ...
We discuss methods for randomization, k-anonymization, and distributed privacy-preserving data mining. ...
In the credential validation approach [113] , an attempt is made to exploit the semantics associated with the social security number to determine whether the person presenting the SSN credential truly ...
doi:10.1007/978-0-387-70992-5_2
dblp:series/ads/AggarwalY08a
fatcat:awhpyh3d2ndrrcecfzryy653uy
Preventing Attacks on Anonymous Data Collection
[article]
2018
arXiv
pre-print
Anonymity, however, can be abused by malicious agents aiming to subvert or to sabotage the data collection, for instance by injecting fabricated data. ...
Anonymous data collection systems allow users to contribute the data necessary to build services and applications while preserving their privacy. ...
In an anonymous data collection setup the collector has no means to determine whether two records belong to the same person. ...
arXiv:1812.07927v1
fatcat:7wk4yw4ljzhddasv6kpgkmp7xe
A Classification of non-Cryptographic Anonymization Techniques Ensuring Privacy in Big Data
2022
International Journal of Communication Networks and Information Security
Therefore, in order to ensure privacy in big data, anonymization is suggested as one of the most efficient approaches. ...
However, this data often includes private personal information that arise new security and privacy concerns. ...
Pseudonymization Vs Anonymization Both pseudonymization and anonymization approaches protect the identity of a person. ...
doi:10.17762/ijcnis.v12i1.4401
fatcat:iafa6u4jojfibfuhpnciw2ya2y
Toward Owners' Control in Digital Data Markets
2020
IEEE Systems Journal
Data market platforms are often based on the cloud paradigm and can be managed by parties that may be not fully trusted, or even be malicious, thus introducing new data security and privacy issues. ...
A promising direction is the development of data market platforms where individuals can directly provide their own data and monetize them by making them selectively available to data consumers. ...
On the other hand, data sanitization approaches (e.g., k-anonymity [9], differential privacy [10] ) aim at providing an obfuscated version of the data or nonsensitive aggregates over them. ...
doi:10.1109/jsyst.2020.2970456
fatcat:htw7cfmkn5gytlxosbfgvq6kni
A roadmap for privacy-enhanced secure data provenance
2014
Journal of Intelligent Information Systems
The notion of data provenance was formally introduced a decade ago and has since been investigated, but mainly from a functional perspective, which follows the historical pattern of introducing new technologies ...
Along with these potential benefits, data provenance also poses a number of security and privacy challenges. ...
Acknowledgments The work reported in this paper has been partially supported by NSF under grant CNS-1111512. ...
doi:10.1007/s10844-014-0322-7
fatcat:mx7wajfmdjgstl3dgogrbjbms4
« Previous
Showing results 1 — 15 out of 901 results