Filters








2,446 Hits in 9.4 sec

The Challenges of Privacy and Access Control as Key Perspectives for the Future Electric Smart Grid

Anna Triantafyllou, Jose Antonio Perez Jimenez, Alejandro del Real Torres, Thomas Lagkas, Konstantinos Rantos, Panagiotis Sarigiannidis
2020 IEEE Open Journal of the Communications Society  
This study presents a comprehensive overview of the latest privacy-preserving mechanisms and policies in the ESG, while promoting the employment of modern access control techniques towards preventing personal  ...  Efficient categorization is provided regarding the proposed privacy preserving methods and characteristics, while focus is also given on the use of the Blockchain technology and the Multi Authority Access  ...  ACKNOWLEDGMENT The research leading to these results has received funding from the European Unions Horizon 2020 research and innovation programme under grant agreement No 833955.  ... 
doi:10.1109/ojcoms.2020.3037517 fatcat:2qhvityrlrdjvawlkx54wmpkna

Security, Privacy, and Trustworthiness of Sensor Networks and Internet of Things

Sokratis Katsikas, Vasileios Gkioulos
2020 Sensors  
This editorial gives an overview of the papers included in the Special Issue on "Security, Privacy, and Trustworthiness of Sensor Networks and Internet of Things" of Sensors.  ...  This is then followed by an outline of each paper that provides information on the problem addressed; the proposed solution/approach; and, where relevant, the results of the evaluation of the proposed  ...  An analysis of the security and privacy features, as well as of the computational cost of the proposed framework indicates that it outperforms the state-of-the-art solutions in terms of privacy protection  ... 
doi:10.3390/s20143846 pmid:32664194 fatcat:4nofk6c6dzhfnpwvxxejefw2du

A Survey of Privacy Preserving Data Publishing using Generalization and Suppression

Yang Xu, Tinghuai Ma, Meili Tang, Wei Tian
2014 Applied Mathematics & Information Sciences  
The privacy preserving models for attack is introduced at first. An overview of several anonymity operations follow behind.  ...  as strong guarantee to avoid information disclosure and protect individuals' privacy.  ...  The authors are grateful to the anonymous referee for a careful checking of the details and for helpful comments that improved this paper.  ... 
doi:10.12785/amis/080321 fatcat:knofh4wnynd7zbpth6skdsgh2m

Attribute susceptibility and entropy based data anonymization to improve users community privacy and utility in publishing data

Abdul Majeed, Sungchang Lee
2020 Applied intelligence (Boston)  
The proposed algorithm controls overgeneralization of the data to enhance anonymous data utility for the legitimate information consumers.  ...  User attributes such as gender, age, and race, may allow an adversary to form users' communities based on their values, and launch sensitive information inference attack subsequently.  ...  This algorithm not only protects privacy of the users' community privacy, it enhances anonymous data utility for legitimate information consumers by controlling over-generalization of less susceptible  ... 
doi:10.1007/s10489-020-01656-w fatcat:4y5cfphryzbnxi32g577zfwwxi

Privacy Preservation for Wireless Sensor Networks in Healthcare: State of the Art, and Open Research Challenges [article]

Yasmine N. M. Saleh, Claude C. Chibelushi, Ayman A. Abdel-Hamid, Abdel-Hamid Soliman
2020 arXiv   pre-print
healthcare, including threat analysis and assessment methodologies; it also offers classification trees for the multifaceted challenge of privacy protection in healthcare, and for privacy threats, attacks  ...  of directions for future research towards unlocking the door onto privacy protection which is appropriate for healthcare in the twenty-first century.  ...  a classification tree of both types of attacks and threats, and privacy protection mechanisms.  ... 
arXiv:2012.12958v1 fatcat:6bqeb3htibaypmbfckveiizxpm

Smart Grid Security and Privacy: From Conventional to Machine Learning Issues (Threats and Countermeasures)

Parya Haji Mirzaee, Mohammad Shojafar, Haitham Cruickshank, Rahim Tafazolli
2022 IEEE Access  
ML models are currently the mainstream for attack detection and threat analysis.  ...  power systems due to the development of ML-based applications.  ...  The SG is responsible for protecting consumers' private information.  ... 
doi:10.1109/access.2022.3174259 fatcat:txuebjhpnre73cq5lbx77ugmhq

Security and Privacy in Big Data Life Cycle: A Survey and Open Challenges

Jahoon Koo, Giluk Kang, Young-Gab Kim
2020 Sustainability  
However, each phase of the life cycle presents data security and reliability issues, making the protection of personally identifiable information a critical objective.  ...  In particular, user tendencies can be analyzed using various big data analytics, and this information leads to the invasion of personal privacy.  ...  Privacy-Preserving Data Publishing One of the models for using privacy in a database while protecting the privacy of the information subject is PPDP.  ... 
doi:10.3390/su122410571 fatcat:thuxbjhjmrhmzbwjheh7dz6hcm

Location privacy and anonymity preserving routing for wireless sensor networks

Alireza A. Nezhad, Ali Miri, Dimitris Makrakis
2008 Computer Networks  
A base level of privacy is provided for the data shared with semitrusted sink and a deeper level of privacy is provided against eavesdroppers.  ...  Our analysis shows that the proposed method achieves the desired privacy levels with low information loss and with considerable energy saving.  ...  However, they want to protect the privacy of their consumers or personnel during this information-sharing operation.  ... 
doi:10.1016/j.comnet.2008.09.005 fatcat:fpmhlzcnmbfgbjfjvhxuav45qy

Security and Privacy of performing Data Analytics in the cloud - A three-way handshake of Technology, Policy, and Management [article]

Nidhi Rastogi, Marie Joan Kristine Gloria, James Hendler
2017 arXiv   pre-print
Despite these promising offerings, concerns around security and privacy of user information suppressed wider acceptance and an all-encompassing deployment of the cloud platform.  ...  The service aspect of this technology has paved the road for a faster set up of infrastructure and related goals for both startups and established organizations.  ...  If proper data protection is not guaranteed for users, loss and exposure will ensue even in a protected premise. 69 In light of the data privacy related attacks we discussed in the previous section,  ... 
arXiv:1701.06828v1 fatcat:sh5yskxoezdsppmyypbkw3cruy

Security Control and Privacy Preservation in RFID enabled Wine Supply Chain [chapter]

Manmeet Mahinderjit-Singh, Xue LI, Zhanhuai LI
2011 Designing and Deploying RFID Applications  
Thus, ensuring privacy protection while dealing with cloning attacks is crucial.  ...  Finally, the privacy module is useful to support the handling of security attacks such as cloning and fraud attacks.  ...  The next sub-section will examine the RFID security taxonomy directed towards RFID security attacks.  ... 
doi:10.5772/17496 fatcat:crmhdxelxzg5hggzbtf2pxyiae

Cloud identity management security issues & solutions: a taxonomy

Umme Habiba, Rahat Masood, Muhammad Awais Shibli, Muaz A Niazi
2014 Complex Adaptive Systems Modeling  
In order to alleviate those attacks, we present a well-organized taxonomy tree covering the most desired features essential for any Cloud-based IDMSs.  ...  We have further used the proposed taxonomy as an assessment criterion for the evaluation of Cloud based IDMSs.  ...  Yumna Ghazi for proofreading the paper. Author details  ... 
doi:10.1186/s40294-014-0005-9 fatcat:3s4gmdttqbfanmospfeq6ldk2u

Trustworthy AI: A Computational Perspective [article]

Haochen Liu, Yiqi Wang, Wenqi Fan, Xiaorui Liu, Yaxin Li, Shaili Jain, Yunhao Liu, Anil K. Jain, Jiliang Tang
2021 arXiv   pre-print
For each dimension, we review the recent related technologies according to a taxonomy and summarize their applications in real-world systems.  ...  In this work, we focus on six of the most crucial dimensions in achieving trustworthy AI: (i) Safety & Robustness, (ii) Non-discrimination & Fairness, (iii) Explainability, (iv) Privacy, (v) Accountability  ...  For instance, the California Consumer Privacy Act (CCPA) was signed into law in 2018 to enhance privacy rights and consumer protection in California by giving consumers more control over the personal information  ... 
arXiv:2107.06641v3 fatcat:ymqaxvzsoncqrcosj5mxcvgsuy

Applications in Security and Evasions in Machine Learning: A Survey

Ramani Sagar, Rutvij Jhaveri, Carlos Borrego
2020 Electronics  
Moreover, we illustrate the adversarial attacks based on the attackers' knowledge about the model and addressed the point of the model at which possible attacks may be committed.  ...  ML extensively supports the demanding requirements of the current scenario of security and privacy across a range of areas such as real-time decision-making, big data processing, reduced cycle time for  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/electronics9010097 fatcat:ttmpehdctjhbdk7arxgczl6224

Identification of K- Tuples using K-Anonymity Algorithm to the Watermarking of Social Network Database

Rajneeshkaur Bedi, Anjali Mahajan
2016 International Journal of Computer Applications  
This provides additional advantage of copyright protection along with privacy preservation.  ...  Many cases on piracy and privacy are registered for falsification, tampering or forgery on digital data like database, multimedia, document etc. And most important is to protect personal privacy.  ...  height of taxonomy tree τ.  ... 
doi:10.5120/ijca2016909968 fatcat:cqx2w3mwtbdbjlt7l56lp5fzvm

Taxonomy towards Security using Encryption Algorithms in IOT-Based Healthcare System

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
Due to that multiple attacks and threats arises, which creates number of solutions towards the same.  ...  The author focuses on detail analysis of various algorithms, encryption techniques used for preventing and avoiding security threats in IOT-based healthcare systems.  ...  These days the customers are forced to surrender their privacy for the sake of information.  ... 
doi:10.35940/ijitee.b7578.129219 fatcat:ikhizk4dffeldm4u6sqtzky5b4
« Previous Showing results 1 — 15 out of 2,446 results