Filters








34,172 Hits in 4.3 sec

Towards Privacy-Aware Location-Based Database Servers

M.F. Mokbel
2006 22nd International Conference on Data Engineering Workshops (ICDEW'06)  
The wide spread of location-based services results in a strong market for location-detection devices (e.g., GPS-like devices, RFIDs, handheld devices, and cellular phones).  ...  The location-based database server is equipped with additional functionalities that support spatio-temporal queries based on the spatial region received from the location anonymizer rather than the exact  ...  In this case, the location-based database server does not have the exact location information of the person who issued the query while the exact location information of the target objects (i.e., gas stations  ... 
doi:10.1109/icdew.2006.152 dblp:conf/icde/Mokbel06 fatcat:tao4akgmkrgmjnei34qgwua6bm

Towards a Common Notion of Privacy Leakage on Public Database

Shinsaku Kiyomoto, Keith M. Martin
2010 2010 International Conference on Broadband, Wireless Computing, Communication and Applications  
In particular, this model applies the notion of differential privacy to data sets that satisfy k-anonymity. We demonstrate this approach through a simple case study.  ...  If personal private information is leaked from the data, the service will be regarded as unacceptable by the original owners of the data.  ...  the value for sensitive information in the worst case, where the adversary has background knowledge about a quasiidentifier of a target person.  ... 
doi:10.1109/bwcca.2010.69 dblp:conf/bwcca/KiyomotoM10 fatcat:pvlbnmv2n5ezbakrzklb4wha4u

Towards privacy-preserving integration of distributed heterogeneous data

Pawel Jurczyk, Li Xiong
2008 Proceeding of the 2nd PhD workshop on Information and knowledge management - PIKM '08  
And most importantly, the results should not contain individually identifiable information and institutions should not reveal their databases to each other apart from the query results.  ...  In this paper, we propose a distributed anonymization protocol that allows independent data providers to build a virtual anonymized database from horizontally partitioned databases, and a secure query  ...  We would like to thank Kristen Lefevre for providing the implementation of Mondrian algorithm and the anonymous reviewers for their valuable comments.  ... 
doi:10.1145/1458550.1458562 dblp:conf/cikm/JurczykX08a fatcat:csteu32az5ekxkib66cpl5va3i

Privacy enhancing identity management

Sebastian Clauβ, Dogan Kesdogan, Tobias Kölsch
2005 Proceedings of the 2005 workshop on Digital identity management - DIM '05  
Especially we present the current state of research and mechanisms useful to protect the user's privacy.  ...  However, designing such systems is a complex task, as the expectations of the different parties involved in electronic transactions have to be met.  ...  This is done by queries which are more general than the intended one. With combination of the results one can construct the result of the target query.  ... 
doi:10.1145/1102486.1102501 dblp:conf/dim/ClaubetaKK05 fatcat:hbcwsliu5zeihhv2cnxdse2chm

The New Casper: A Privacy-Aware Location-Based Database Server

Mohamed F. Mokbel, Chi-Yin Chow, Walid G. Aref
2007 2007 IEEE 23rd International Conference on Data Engineering  
While the location anonymizer is implemented as a stand alone application, the privacy-aware query processor is embedded into PLACE; a research prototype for location-based database servers.  ...  Casper consists of two main components; the location anonymizer that blurs the users' exact location into cloaked spatial regions and the privacy-aware query processor that is responsible on providing  ...  For example, an employer may check on her employee behavior by knowing the places she visits or the personal medical records can be inferred by knowing which clinic a person visits.  ... 
doi:10.1109/icde.2007.369052 dblp:conf/icde/MokbelCA07 fatcat:zxcvv5pynjeg7djovrapug7gae

Privacy-Preservation for Publishing Sample Availability Data with Personal Identifiers

Ali Gholami, Erwin Laure, Peter Somogyi, Ola Spjuth, Salman Niazi, Jim Dowling
2015 Journal of Medical and Bioengineering  
We realize our solution by having a two-level anonymiziation mechanism, where our toolkit for publishing availability data first pseudonymizes personal identifiers and then anonymizes sensitive attributes  ...  We believe that our toolkit contributes a first step to support the privacy preserving publication of data containing personal identifiers.   ...  ACKNOWLEDGMENT The authors would like to thank Jan-Eric Litton from Karolinska Institutet for his support and Matthias Templ from Vienna University of Technology for helping with the sdcMicro package.  ... 
doi:10.12720/jomb.4.2.117-125 fatcat:6avm66qjfnhyfl4rsv6xq4lzby

Hippocratic PostgreSQL

Jalaja Padma, Yasin N. Silva, Muhammad U. Arshad, Walid G. Aref
2009 Proceedings / International Conference on Data Engineering  
In many cases this requirement is imposed by laws that recognize the right of data owners to control whom their information is shared with and the purposes for which it can be shared.  ...  Several interesting problems emerge as a result and their solutions are presented in the context of this demo.  ...  The idea of Sensitive Attribute Generalization [9] adds the notion of personalized privacy to the concept of k-anonymity.  ... 
doi:10.1109/icde.2009.126 dblp:conf/icde/PadmaSAA09 fatcat:lp3hqdsmoreljpqxzjtc5hylte

On Preserving Sensitive Information of Multiple Aspect Trajectories In-House

Spyros Giotakis, Nikos Pelekis
2019 Zenodo  
This paper provides the blueprint of a semantic-aware Moving Object Database (MOD) engine for privacy-aware sharing of such enriched mobility data and introduces an attack prevention mechanism where all  ...  Towards enhancing the user-friendliness of our approach, we propose a mechanism whose objective is to modify the user queries that cannot be answered due to possible privacy violation, to 'similar' queries  ...  ACKNOWLEDGMENTS This work was partially supported by project MASTER (Marie Sklowdoska-Curie agreement N. 777695) that has received funding from the EU Horizon 2020 Program.  ... 
doi:10.5281/zenodo.2759477 fatcat:kkiydjlufnhdbb56yngduve77u

DObjects+: Enabling Privacy-Preserving Data Federation Services

Pawel Jurczyk, Li Xiong, Slawomir Goryczka
2012 2012 IEEE 28th International Conference on Data Engineering  
The framework is built on top of a distributed mediatorwrapper architecture where nodes can form collaborative groups for secure anonymization and secure query processing when private data need to be accessed  ...  The emergence of cloud computing implies and facilitates managing large collections of highly distributed, autonomous, and possibly private databases.  ...  The authors would like to thank the anonymous reviewers for their suggestions that helped improve this demo.  ... 
doi:10.1109/icde.2012.138 dblp:conf/icde/JurczykXG12 fatcat:vjcrdqr3ebgbpafpupf5ymyx5u

Non-interactive differential privacy

David Leoni
2012 Proceedings of the First International Workshop on Open Data - WOD '12  
Differential privacy stands out as a model that provides strong formal guarantees about the anonymity of the participants in a sanitized database.  ...  This paper covers such breakthrough discoveries, by reviewing applications of differential privacy for non-interactive publication of anonymized real-life datasets.  ...  The goal is to optimize the results of range queries, where the analyst asks for the number of people lying under a given query area, usually expressed as an hyperrectangle.  ... 
doi:10.1145/2422604.2422611 dblp:conf/wod/Leoni12 fatcat:tdfnvwiqybe7pos2z4sc4unk7q

Non-Interactive Differential Privacy: a Survey [article]

David Leoni
2012 arXiv   pre-print
Differential privacy stands out as a model that provides strong formal guarantees about the anonymity of the participants in a sanitized database.  ...  This paper covers such breakthrough discoveries, by reviewing applications of differential privacy for non-interactive publication of anonymized real-life datasets.  ...  The goal is to optimize the results of range queries, where the analyst asks for the number of people lying under a given query area, usually expressed as an hyperrectangle.  ... 
arXiv:1205.2726v1 fatcat:shps24vi2jg3fibknsmltsziky

Homomorphic encryption embedded engine v1

Waqar Asif
2020 Zenodo  
A pseudo-anonymized version of the network traffic is returned to the user, with added capability of deanonymizing the data for latter use.  ...  The tool also provides the feature for searching in each other's database, given that prior permission is already granted.  ...  In case the search query does not exist in the database, the tool returns a null message stating that the search content does not exist.  ... 
doi:10.5281/zenodo.4010598 fatcat:nyg7d3tusfahth3pt4x2bolyxi

Privacy Preserving Data Mining [chapter]

Esma Ergüner Özkoç
2021 Artificial Intelligence  
collection and sharing of personal data.  ...  for processed data (output of the data mining algorithms).  ...  For this reason, differential privacy approach has been proposed by Dwork to protect the privacy of database query results [37] .  ... 
doi:10.5772/intechopen.99224 fatcat:sc7i4i5be5eitjkelwlqjl6pky

AnoniMME: bringing anonymity to the Matchmaker Exchange platform for rare disease gene discovery

Bristena Oprisanu, Emiliano De Cristofaro
2018 Bioinformatics  
, anonymously in a public database.  ...  Among these, the Global Alliance for Genomics and Health runs a popular platform, called Matchmaker Exchange, that allows researchers to perform queries for rare genetic disease discovery over multiple  ...  We thank Christophe Dessimoz for valuable feedback provided, as well as insights from users of the platform.  ... 
doi:10.1093/bioinformatics/bty269 pmid:29949992 pmcid:PMC6022625 fatcat:df4plh2tqfau7k66mv7u7bxk6a

Inference Detection and Database Security for a Business Environment

Traian Popeea, Anca Constantinescu, Laura Gheorghe, Nicolae Tapus
2012 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems  
The number of data collections of person-specific information is increasing exponentially.  ...  Security models, developed for databases, differ in many aspects because they focus on different features of the problem, leading to incomplete implementations of the organizational security strategy.  ...  For a single user case, when a user poses a query, the detection system will examine the user's query log and determine the probability of inferring sensitive information.  ... 
doi:10.1109/incos.2012.95 dblp:conf/incos/PopeeaCGT12 fatcat:zb4edwsjbfah5mxklfd2dldbxe
« Previous Showing results 1 — 15 out of 34,172 results