Filters








83 Hits in 4.4 sec

Using secure coprocessors for privacy preserving collaborative data mining and analysis

Bishwaranjan Bhattacharjee, Naoki Abe, Kenneth Goldman, Bianca Zadrozny, Vamsavardhana R. Chillakuru, Marysabel del Carpio, Chid Apte
2006 Proceedings of the 2nd international workshop on Data management on new hardware - DaMoN '06  
This paper describes a solution for privacy preserving data sharing and mining using cryptographically secure but resource limited coprocessors.  ...  It uses memory light data mining methodologies along with a light weight database engine with federation capability, running on a coprocessor.  ...  In this paper, we present a solution for privacy preserving data sharing and mining for such application areas.  ... 
doi:10.1145/1140402.1140404 dblp:conf/damon/BhattacharjeeAGZCCA06 fatcat:552wfsrczfcuhjvv266d2lckxy

Privacy Preserving Joins

Yaping Li, Minghua Chen
2008 2008 IEEE 24th International Conference on Data Engineering  
In this paper, we design a system to perform privacy preserving joins of data from mutually distrustful organizations, leveraging the power of a secure coprocessor.  ...  The only trusted component is the secure coprocessor. Under this setting, we critique a questionable assumption in a previous privacy definition [2] that leads to unnecessary information leakage.  ...  Also using secure coprocessors in [6] , light weight data mining algorithms were developed for privacy preserving collaborative data mining and analysis. Our work is complementary to this approach.  ... 
doi:10.1109/icde.2008.4497553 dblp:conf/icde/LiC08 fatcat:fmkylcgikneqbje6dz7jvq25fi

Enhanced Batch Generation based Multilevel Trust Privacy Preserving in Data Mining

B. Anitha, B. Hanmanthu, B. Raghu Ram
2013 International Journal of Computer Applications  
The motivation of Privacy Preserving Data Mining (PPDM) is to obtain valid data mining results without access to the original sensitive information.  ...  This proposed work is based on perturbation based privacy preserving data mining. Here random perturbation approach is applied to provide privacy on the data set.  ...  In this paper, a solution is presented for privacy preserving data sharing and mining for such various application areas.  ... 
doi:10.5120/14144-1907 fatcat:pho6r3p3azcmlmpj5mkhyffome

A hybrid approach of homomorphic encryption and differential privacy for privacy preserving classification

Ezgi ZORARPACI, Selma Ayşe ÖZEL
2020 International Journal of Applied Mathematics Electronics and Computers  
Privacy preserving data mining is a substantial research area that aims at protecting the privacy of individuals while enabling to perform data mining techniques.  ...  Therefore, both of security and privacy of the individuals in the training dataset for classification are provided thanks to our proposed method; since neither the parties, nor the researcher attain any  ...  Differential Privacy For Privacy Preserving Classification".  ... 
doi:10.18100/ijamec.801157 fatcat:vaph7vpc5vgr5cvpe7xlm73v7y

ObliviAd: Provably Secure and Practical Online Behavioral Advertising

Michael Backes, Aniket Kate, Matteo Maffei, Kim Pecina
2012 2012 IEEE Symposium on Security and Privacy  
We present the first formal security definitions for OBA systems (namely, profile privacy, profile unlinkability, and billing correctness) and conduct a formal security analysis of ObliviAd using ProVerif  ...  In this paper, we propose ObliviAd, 1 a provably secure architecture for privacy preserving OBA.  ...  This work was partially supported by the initiative for excellence and the Emmy Noether program of the German federal government, and the Center for IT-Security, Privacy and Accountability (CISPA).  ... 
doi:10.1109/sp.2012.25 dblp:conf/sp/BackesKMP12 fatcat:xyd5nkcswrhyzaszvdx6wnudcq

Security and Privacy in Wireless Sensor Networks [chapter]

Arijit Ukil
2010 Smart Wireless Sensor Networks  
The research of PPDM is aimed at bridging the gap between collaborative data mining and data privacy.  ...  Researches in this area are mostly concentrated in applying data mining techniques to preserve the privacy content of the data.  ... 
doi:10.5772/14272 fatcat:s5wa6jb7w5ecpflygiumgxflqm

User-Side Personalization Considering Privacy Preserving in Cloud Systems

L. Sharifi, M. H. Beisafar
2013 2013 27th International Conference on Advanced Information Networking and Applications Workshops  
the hosts to access their personal data for personalization purposes.  ...  To solve this controversy, in this paper we introduce a new personalization framework and architecture conveys privacy issues.  ...  [9] presents a model named PaaS (Privacy as a Service). PaaS provides the secure storage and processing of user data by means of cryptographic coprocessors.  ... 
doi:10.1109/waina.2013.193 dblp:conf/aina/SharifiB13 fatcat:ldtkjy7is5bfzl2oazgfpndosm

Security Issues for Cloud Computing

Kevin Hamlen, Murat Kantarcioglu, Latifur Khan, Bhavani Thuraisingham
2010 International Journal of Information Security and Privacy  
In this paper, the authors discuss security issues for cloud computing and present a layered framework for secure clouds and then focus on two of the layers, i.e., the storage layer and the data layer.  ...  Next, the paper will converse secure federated query processing with map Reduce and Hadoop, and discuss the use of secure co-processors for cloud computing.  ...  For example, SCPs can be used for privacy preserving information integration which is important for assured information sharing.  ... 
doi:10.4018/jisp.2010040103 fatcat:ihul67zmk5hilgs7obtqxwtqwa

Enabling Multilevel Trust in Privacy Preserving Data Mining

Yaping Li, Minghua Chen, Qiwei Li, Wei Zhang
2012 IEEE Transactions on Knowledge and Data Engineering  
Privacy Preserving Data Mining (PPDM) addresses the problem of developing accurate models about aggregated data without access to precise information in individual data record.  ...  A widely studied perturbation-based PPDM approach introduces random perturbation to individual values to preserve privacy before data are published.  ...  Xiaokui Xiao for discussions related to the time complexity analysis.  ... 
doi:10.1109/tkde.2011.124 fatcat:ounh3dxpsnfwrciduvxedm2ozu

2014 Index IEEE Transactions on Parallel and Distributed Systems Vol. 25

2015 IEEE Transactions on Parallel and Distributed Systems  
., +, TPDS July 2014 1681-1690 Data analysis Design Exploration of Geometric Biclustering for Microarray Data Analysis in Data Mining.  ...  ., +, TPDS Oct. 2014 2760-2761 Data mining Collaborative Policy Administration.  ...  ., +, TPDS June 2014 1533 -1542 Optimal Load Balancing and Energy Cost Management for Internet Data Centers in Deregulated Electricity Markets.  ... 
doi:10.1109/tpds.2014.2371591 fatcat:qxyljogalrbfficryqjowgv3je

Online Privacy Protection: Privacy Seals, Government Regulations and Technological Solutions

Dr. Madan Lal Bhasin
2016 Zenodo  
Accountability for privacy and personal data protection needs to be a joint effort among governments, privacy commissioners, organizations and individuals themselves.  ...  For corporations that collect and use personal information, now ignoring privacy legislative and regulatory warning signs can prove to be a costly mistake.  ...  Secure coprocessors: Another approach is to use a secure coprocessor-a tamper-resistant device designed so that any physical tampering will clear its memory.  ... 
doi:10.5281/zenodo.3464813 fatcat:iyvylquuj5fwlfauzffmxbh7yu

A Privacy-Protecting Business-Analytics Service for On-Line Transactions

Bettina Berendt, Sören Preibusch, Maximilian Teltzrow
2008 International Journal of Electronic Commerce  
Analysis of consumer-related and consumer-generated data is a very important way to measure the success of on-line retailing.  ...  The first aspect can be addressed with standardized developer software for Web services, but the second must consider privacy legislation, privacy specifications on Web sites (P3P), and data reidentification  ...  A hardware-based approach to encryption has been described that uses a secure coprocessor [5] .  ... 
doi:10.2753/jec1086-4415120306 fatcat:mftwqphsszfitke2t5uaf4dpgq

Privacy in Targeted Advertising: A Survey [article]

Imdad Ullah, Roksana Boreli, Salil S. Kanhere
2021 arXiv   pre-print
Subsequently, we present various techniques for preserving user privacy and a comprehensive analysis of the proposals based on such techniques; we compare the proposals based on the underlying architectures  ...  based on user's interests and profiling context and the ads delivery process, for both in-app and in-browser targeted ads; we also include an overview of data sharing and tracking technologies.  ...  Retrieval (PIR) on a secure coprocessor hardware.  ... 
arXiv:2009.06861v3 fatcat:exocmcbupbhq5nc3gnicg3zg2i

Enabling Multi-level Trust in Privacy Preserving Data Mining [article]

Yaping Li, Minghua Chen, Qiwei Li, Wei Zhang
2011 arXiv   pre-print
Privacy Preserving Data Mining (PPDM) addresses the problem of developing accurate models about aggregated data without access to precise information in individual data record.  ...  A widely studied perturbation-based PPDM approach introduces random perturbation to individual values to preserve privacy before data is published.  ...  Xiaokui Xiao for discussions related to the time complexity analysis.  ... 
arXiv:1104.0459v2 fatcat:2zuaotkanngatflzuniyptsmee

Security and Privacy in Location-Based Services for Vehicular and Mobile Communications: An Overview, Challenges and Countermeasures

Philip Asuquo, Haitham Cruickshank, Jeremy Morley, Chibueze P. Anyigor Ogah, Ao Lei, Waleed Hathal, Shihan Bao, Zhili Sun
2018 IEEE Internet of Things Journal  
Location privacy is one of the major challenges in vehicular and mobile networks. In this article, we analyse the security and privacy requirements for LBS in vehicular and mobile networks.  ...  Specifically, this paper covers privacy enhancing technologies and cryptographic approaches that provide location privacy in vehicular and mobile networks.  ...  We specifically provide a detailed analysis of existing privacy enhancing schemes, cryptographic approaches and privacy-preserving authentication schemes proposed for location privacy in vehicular and  ... 
doi:10.1109/jiot.2018.2820039 fatcat:y2gdcllac5fbpdd2nnxn4tib2i
« Previous Showing results 1 — 15 out of 83 results