A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
The Challenges of Privacy and Access Control as Key Perspectives for the Future Electric Smart Grid
2020
IEEE Open Journal of the Communications Society
This study presents a comprehensive overview of the latest privacy-preserving mechanisms and policies in the ESG, while promoting the employment of modern access control techniques towards preventing personal ...
Efficient categorization is provided regarding the proposed privacy preserving methods and characteristics, while focus is also given on the use of the Blockchain technology and the Multi Authority Access ...
ACKNOWLEDGMENT The research leading to these results has received funding from the European Unions Horizon 2020 research and innovation programme under grant agreement No 833955. ...
doi:10.1109/ojcoms.2020.3037517
fatcat:2qhvityrlrdjvawlkx54wmpkna
Security, Privacy, and Trustworthiness of Sensor Networks and Internet of Things
2020
Sensors
This editorial gives an overview of the papers included in the Special Issue on "Security, Privacy, and Trustworthiness of Sensor Networks and Internet of Things" of Sensors. ...
This is then followed by an outline of each paper that provides information on the problem addressed; the proposed solution/approach; and, where relevant, the results of the evaluation of the proposed ...
An analysis of the security and privacy features, as well as of the computational cost of the proposed framework indicates that it outperforms the state-of-the-art solutions in terms of privacy protection ...
doi:10.3390/s20143846
pmid:32664194
fatcat:4nofk6c6dzhfnpwvxxejefw2du
A Survey of Privacy Preserving Data Publishing using Generalization and Suppression
2014
Applied Mathematics & Information Sciences
The privacy preserving models for attack is introduced at first. An overview of several anonymity operations follow behind. ...
as strong guarantee to avoid information disclosure and protect individuals' privacy. ...
The authors are grateful to the anonymous referee for a careful checking of the details and for helpful comments that improved this paper. ...
doi:10.12785/amis/080321
fatcat:knofh4wnynd7zbpth6skdsgh2m
Attribute susceptibility and entropy based data anonymization to improve users community privacy and utility in publishing data
2020
Applied intelligence (Boston)
The proposed algorithm controls overgeneralization of the data to enhance anonymous data utility for the legitimate information consumers. ...
User attributes such as gender, age, and race, may allow an adversary to form users' communities based on their values, and launch sensitive information inference attack subsequently. ...
This algorithm not only protects privacy of the users' community privacy, it enhances anonymous data utility for legitimate information consumers by controlling over-generalization of less susceptible ...
doi:10.1007/s10489-020-01656-w
fatcat:4y5cfphryzbnxi32g577zfwwxi
Privacy Preservation for Wireless Sensor Networks in Healthcare: State of the Art, and Open Research Challenges
[article]
2020
arXiv
pre-print
healthcare, including threat analysis and assessment methodologies; it also offers classification trees for the multifaceted challenge of privacy protection in healthcare, and for privacy threats, attacks ...
of directions for future research towards unlocking the door onto privacy protection which is appropriate for healthcare in the twenty-first century. ...
a classification tree of both types of attacks and threats, and privacy protection mechanisms. ...
arXiv:2012.12958v1
fatcat:6bqeb3htibaypmbfckveiizxpm
Smart Grid Security and Privacy: From Conventional to Machine Learning Issues (Threats and Countermeasures)
2022
IEEE Access
ML models are currently the mainstream for attack detection and threat analysis. ...
power systems due to the development of ML-based applications. ...
The SG is responsible for protecting consumers' private information. ...
doi:10.1109/access.2022.3174259
fatcat:txuebjhpnre73cq5lbx77ugmhq
Security and Privacy in Big Data Life Cycle: A Survey and Open Challenges
2020
Sustainability
However, each phase of the life cycle presents data security and reliability issues, making the protection of personally identifiable information a critical objective. ...
In particular, user tendencies can be analyzed using various big data analytics, and this information leads to the invasion of personal privacy. ...
Privacy-Preserving Data Publishing One of the models for using privacy in a database while protecting the privacy of the information subject is PPDP. ...
doi:10.3390/su122410571
fatcat:thuxbjhjmrhmzbwjheh7dz6hcm
Location privacy and anonymity preserving routing for wireless sensor networks
2008
Computer Networks
A base level of privacy is provided for the data shared with semitrusted sink and a deeper level of privacy is provided against eavesdroppers. ...
Our analysis shows that the proposed method achieves the desired privacy levels with low information loss and with considerable energy saving. ...
However, they want to protect the privacy of their consumers or personnel during this information-sharing operation. ...
doi:10.1016/j.comnet.2008.09.005
fatcat:fpmhlzcnmbfgbjfjvhxuav45qy
Security and Privacy of performing Data Analytics in the cloud - A three-way handshake of Technology, Policy, and Management
[article]
2017
arXiv
pre-print
Despite these promising offerings, concerns around security and privacy of user information suppressed wider acceptance and an all-encompassing deployment of the cloud platform. ...
The service aspect of this technology has paved the road for a faster set up of infrastructure and related goals for both startups and established organizations. ...
If proper data protection is not guaranteed for users, loss and exposure will ensue even in a protected premise. 69 In light of the data privacy related attacks we discussed in the previous section, ...
arXiv:1701.06828v1
fatcat:sh5yskxoezdsppmyypbkw3cruy
Security Control and Privacy Preservation in RFID enabled Wine Supply Chain
[chapter]
2011
Designing and Deploying RFID Applications
Thus, ensuring privacy protection while dealing with cloning attacks is crucial. ...
Finally, the privacy module is useful to support the handling of security attacks such as cloning and fraud attacks. ...
The next sub-section will examine the RFID security taxonomy directed towards RFID security attacks. ...
doi:10.5772/17496
fatcat:crmhdxelxzg5hggzbtf2pxyiae
Cloud identity management security issues & solutions: a taxonomy
2014
Complex Adaptive Systems Modeling
In order to alleviate those attacks, we present a well-organized taxonomy tree covering the most desired features essential for any Cloud-based IDMSs. ...
We have further used the proposed taxonomy as an assessment criterion for the evaluation of Cloud based IDMSs. ...
Yumna Ghazi for proofreading the paper.
Author details ...
doi:10.1186/s40294-014-0005-9
fatcat:3s4gmdttqbfanmospfeq6ldk2u
Trustworthy AI: A Computational Perspective
[article]
2021
arXiv
pre-print
For each dimension, we review the recent related technologies according to a taxonomy and summarize their applications in real-world systems. ...
In this work, we focus on six of the most crucial dimensions in achieving trustworthy AI: (i) Safety & Robustness, (ii) Non-discrimination & Fairness, (iii) Explainability, (iv) Privacy, (v) Accountability ...
For instance, the California Consumer Privacy Act (CCPA) was signed into law in 2018 to enhance privacy rights and consumer protection in California by giving consumers more control over the personal information ...
arXiv:2107.06641v3
fatcat:ymqaxvzsoncqrcosj5mxcvgsuy
Applications in Security and Evasions in Machine Learning: A Survey
2020
Electronics
Moreover, we illustrate the adversarial attacks based on the attackers' knowledge about the model and addressed the point of the model at which possible attacks may be committed. ...
ML extensively supports the demanding requirements of the current scenario of security and privacy across a range of areas such as real-time decision-making, big data processing, reduced cycle time for ...
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/electronics9010097
fatcat:ttmpehdctjhbdk7arxgczl6224
Identification of K- Tuples using K-Anonymity Algorithm to the Watermarking of Social Network Database
2016
International Journal of Computer Applications
This provides additional advantage of copyright protection along with privacy preservation. ...
Many cases on piracy and privacy are registered for falsification, tampering or forgery on digital data like database, multimedia, document etc. And most important is to protect personal privacy. ...
height of taxonomy tree τ. ...
doi:10.5120/ijca2016909968
fatcat:cqx2w3mwtbdbjlt7l56lp5fzvm
Taxonomy towards Security using Encryption Algorithms in IOT-Based Healthcare System
2019
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
Due to that multiple attacks and threats arises, which creates number of solutions towards the same. ...
The author focuses on detail analysis of various algorithms, encryption techniques used for preventing and avoiding security threats in IOT-based healthcare systems. ...
These days the customers are forced to surrender their privacy for the sake of information. ...
doi:10.35940/ijitee.b7578.129219
fatcat:ikhizk4dffeldm4u6sqtzky5b4
« Previous
Showing results 1 — 15 out of 2,446 results