901 Hits in 8.3 sec

Protecting privacy by sanitizing personal data

Sébastien Canard, Roch Lescuyer
2013 Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security - ASIA CCS '13  
A user gets from the organization a signed document certifying personal data (e.g. name, address, studies, etc.) and plays the role of the sanitizer.  ...  Anonymous credential systems allow users to obtain certified credentials from organizations and use them later without being traced.  ...  We are also grateful to Amandine Jambert for helpful discussions on sanitizable signatures, to Sherman Chow for his help on this final version and to anonymous referees for their valuable comments.  ... 
doi:10.1145/2484313.2484363 dblp:conf/ccs/CanardL13 fatcat:av5sdmff4bcdzgdupzrmrxplve

Analytical Approach for Privacy Preserving of Medical Data

Vaibhav Lawand, Prathik Sargar, Anand Bhalerao, Pradip Jadhav
2015 International Journal of Engineering Research and  
We describe the workflow for privacy aware data analysis in mental health research and develop a analytical approach for privacy preserving of medical data to address these concerns.  ...  care, security controls and privacy protection of individual data.  ...  Data Anonymization Data anonymization [9] is a process of information sanitization whose intent is privacy protection.  ... 
doi:10.17577/ijertv4is100466 fatcat:po5yirpcira4ferp4vfyi2u6dq

Data Privacy in Data Engineering, the Privacy Preserving Models and Techniques in Data Mining and Data Publishing: Contemporary Affirmation of the Recent Literature

Fuad AliMohammedAl-Yarimi, Sonajharia Minz
2012 International Journal of Computer Applications  
be one of the most important research areas of interest and has also triggered a serious issue of concern in accordance with the personal data usage in the recent times.  ...  Privacy preserving for data engineering methods like mining and publishing etc., with the advancement of the rapid development of technologies like Internet and distributed computing has turned out to  ...  Data can be put on anonymous mode by using the sanitization approach which is helpful in hiding the data's accurate values.  ... 
doi:10.5120/9676-4103 fatcat:obyi6o2tbbhxrhdzupqt3p4aia

A Study on Privacy Preserving Methodologies in Big Data

J. Vinothkumar, V. Santhi
2016 Indian Journal of Science and Technology  
The requirement to change the debate from big data and confidentiality to big data with confidentiality, implementing the confidentiality and data safeguarding schemes as a vital value of big data for  ...  Methods/Statistical Analysis: In order to get the benefits of analytics without degrading confidentiality, it is necessary to include data protection techniques as core element of big data analytics.  ...  A Study on Privacy Preserving Methodologies in Big Data Streaming Data Data streams pose new risks to participants occupied in big data from privacy context.  ... 
doi:10.17485/ijst/2016/v9is1/104234 fatcat:o3irtlp4hrcxbnuhufjczebw7q

Privacy-preserving data outsourcing in the cloud via semantic data splitting

David Sánchez, Montserrat Batet
2017 Computer Communications  
Several privacy-protection mechanisms based on a prior encryption of the data to be outsourced have been proposed.  ...  Because both efficiency and functionality are crucial advantages of cloud computing, in this paper we aim at retaining them by proposing a privacy-protection mechanism that relies on splitting (clear)  ...  Acknowledgements and disclaimer This work was partly supported by the European Commission (projects H2020-644024 "CLARUS" and H2020-700540 "CANVAS"), by the Spanish Government (projects TIN2014-57364-C2  ... 
doi:10.1016/j.comcom.2017.06.012 fatcat:3fmwhsr6ijdb3m2zfmi6t5yrwi

Misusability Measure Based Sanitization of Big Data for Privacy Preserving MapReduce Programming

D. Radhika, D. Aruna Kumari
2018 International Journal of Electrical and Computer Engineering (IJECE)  
We followed a hybrid approach that caters to the needs of privacy preserving MapReduce programming.  ...  In this paper we proposed a comprehensive methodology for effective sanitization of data based on misusability measure for preserving privacy to get rid of data leakage and misuse.  ...  The algorithm modifies transactions in order to achieve sanitation. Canard and Lescuyer [11] proposed a novel approach for sanitizing personal data that makes use of anonymous credentials.  ... 
doi:10.11591/ijece.v8i6.pp4524-4532 fatcat:duj3tpetrvhdverguqhyvrvcim

DAPriv: Decentralized architecture for preserving the privacy of medical data [article]

Rajesh Sharma, Deepak Subramanian, Satish N. Srirama
2014 arXiv   pre-print
This is a complete architecture that provides patients with a good level of privacy, secure communication and more direct control.  ...  The digitization of the medical data has been a sensitive topic.  ...  The research is supported by the Estonian Science Foundation grants ETF9287 and PUT360, and the European Social Fund for Doctoral Studies and Internationalisation Programme DoRa.  ... 
arXiv:1410.5696v1 fatcat:z4xj4tmz6raaznoiowa2lxndbq

Big healthcare data: preserving security and privacy

Karim Abouelmehdi, Abderrahim Beni-Hessane, Hayat Khaloufi
2018 Journal of Big Data  
However, deciding on the allowable uses of data while preserving security and patient's right to privacy is a difficult task.  ...  Indeed, the concerns over the big healthcare data security and privacy are increased year-by-year.  ...  Acknowledgements The author forwards his heartfelt gratitude to two anonymous reviewers for their careful reading of the manuscript and their helpful comments that improve the presentation of this work  ... 
doi:10.1186/s40537-017-0110-7 fatcat:jmon5tby4req7museetrt5zjjq

Anonymization in Social Ne tworks: A Survey on the issues of Data Privacy in Social Network Sites

A. Praveena, Dr.S. Smys
2016 International Journal Of Engineering And Computer Science  
the existing anonymization techniques for privacy preserving publishing of social net-work data.  ...  We argue that the different privacy problems are entangled and that research on privacy in OSNs would benefit from a more holistic approach.  ...  A method that is used to publish data and protect user privacy is called anonymization.  ... 
doi:10.18535/ijecs/v5i3.07 fatcat:oashkvfh6rgvrpfso2knjeb23e

Secure personal data servers

Tristan Allard, Shaoyi Yin, Nicolas Anciaux, Luc Bouganim, Yanli Guo, Lionel Le Folgoc, Benjamin Nguyen, Philippe Pucheral, Indrajit Ray, Indrakshi Ray
2010 Proceedings of the VLDB Endowment  
By embedding a full-fledged Personal Data Server in such devices, user control of how her sensitive data is shared by others (by whom, for how long, according to which rule, for which purpose) can be fully  ...  However, these benefits must be weighed against privacy risks incurred by centralization. This paper suggests a radically different way of considering the management of personal data.  ...  Acknowledgments: The authors wish to thank Anne Canteaut and Philippe Bonnet for their helpful comments on this paper.  ... 
doi:10.14778/1920841.1920850 fatcat:tab7ustvajeqbgewqin4oaayzy

A General Survey of Privacy-Preserving Data Mining Models and Algorithms [chapter]

Charu C. Aggarwal, Philip S. Yu
2008 Privacy-Preserving Data Mining  
We also discuss cases in which the output of data mining applications needs to be sanitized for privacy-preservation purposes.  ...  We discuss methods for randomization, k-anonymization, and distributed privacy-preserving data mining.  ...  In the credential validation approach [113] , an attempt is made to exploit the semantics associated with the social security number to determine whether the person presenting the SSN credential truly  ... 
doi:10.1007/978-0-387-70992-5_2 dblp:series/ads/AggarwalY08a fatcat:awhpyh3d2ndrrcecfzryy653uy

Preventing Attacks on Anonymous Data Collection [article]

Alex Catarineu, Philipp Claßen, Konark Modi, Josep M. Pujol
2018 arXiv   pre-print
Anonymity, however, can be abused by malicious agents aiming to subvert or to sabotage the data collection, for instance by injecting fabricated data.  ...  Anonymous data collection systems allow users to contribute the data necessary to build services and applications while preserving their privacy.  ...  In an anonymous data collection setup the collector has no means to determine whether two records belong to the same person.  ... 
arXiv:1812.07927v1 fatcat:7wk4yw4ljzhddasv6kpgkmp7xe

A Classification of non-Cryptographic Anonymization Techniques Ensuring Privacy in Big Data

2022 International Journal of Communication Networks and Information Security  
Therefore, in order to ensure privacy in big data, anonymization is suggested as one of the most efficient approaches.  ...  However, this data often includes private personal information that arise new security and privacy concerns.  ...  Pseudonymization Vs Anonymization Both pseudonymization and anonymization approaches protect the identity of a person.  ... 
doi:10.17762/ijcnis.v12i1.4401 fatcat:iafa6u4jojfibfuhpnciw2ya2y

Toward Owners' Control in Digital Data Markets

Sabrina De Capitani di Vimercati, Sara Foresti, Giovanni Livraga, Pierangela Samarati
2020 IEEE Systems Journal  
Data market platforms are often based on the cloud paradigm and can be managed by parties that may be not fully trusted, or even be malicious, thus introducing new data security and privacy issues.  ...  A promising direction is the development of data market platforms where individuals can directly provide their own data and monetize them by making them selectively available to data consumers.  ...  On the other hand, data sanitization approaches (e.g., k-anonymity [9], differential privacy [10] ) aim at providing an obfuscated version of the data or nonsensitive aggregates over them.  ... 
doi:10.1109/jsyst.2020.2970456 fatcat:htw7cfmkn5gytlxosbfgvq6kni

A roadmap for privacy-enhanced secure data provenance

Elisa Bertino, Gabriel Ghinita, Murat Kantarcioglu, Dang Nguyen, Jae Park, Ravi Sandhu, Salmin Sultana, Bhavani Thuraisingham, Shouhuai Xu
2014 Journal of Intelligent Information Systems  
The notion of data provenance was formally introduced a decade ago and has since been investigated, but mainly from a functional perspective, which follows the historical pattern of introducing new technologies  ...  Along with these potential benefits, data provenance also poses a number of security and privacy challenges.  ...  Acknowledgments The work reported in this paper has been partially supported by NSF under grant CNS-1111512.  ... 
doi:10.1007/s10844-014-0322-7 fatcat:mx7wajfmdjgstl3dgogrbjbms4
« Previous Showing results 1 — 15 out of 901 results