Although the existing legal norms and judicial practic-es can provide basic guidance for the right to personal data portabili-ty, it can be concluded that there are obstacles to the realization of this right through e...Although the existing legal norms and judicial practic-es can provide basic guidance for the right to personal data portabili-ty, it can be concluded that there are obstacles to the realization of this right through empirical research of the privacy policies of 66 mobile apps, such as whether they have stipulations on the right to personal data portability, whether they are able to derive copies of personal in-formation automatically, whether there are textual examples, whether ID verification is required, whether the copied documents are encrypt-ed, and whether the scope of personal information involved is consis-tent. This gap in practice, on the one hand, reflects the misunderstand-ing of the right to personal data portability, and on the other hand, is a result of the negative externalities, practical costs and technical lim-itations of the right to personal data portability. Based on rethinking the right to data portability, we can somehow solve practical problems concerning the right to personal data portability through multiple measures such as promoting the fulfillment of this right by legislation, optimizing technology-oriented operations, refining response process mechanisms, and enhancing system interoperability.展开更多
With the development of information technology,the online retrieval of remote electronic data has become an important method for investigative agencies to collect evidence.In the current normative documents,the online...With the development of information technology,the online retrieval of remote electronic data has become an important method for investigative agencies to collect evidence.In the current normative documents,the online retrieval of electronic data is positioned as a new type of arbitrary investigative measure.However,study of its actual operation has found that the online retrieval of electronic data does not fully comply with the characteristics of arbitrary investigative measures.The root cause is its inaccurately defined nature due to analogy errors,an emphasis on the authenticity of electronic data at the cost of rights protection,insufficient effectiveness of normative documents to break through the boundaries of law,and superficial inconsistency found in the mechanical comparison with the nature of existing investigative measures causes.The nature of electronic data retrieved online should be defined according to different circumstances.The retrieval of electronic data disclosed on the Internet is an arbitrary investigative measure,and following procedural specifications should be sufficient.When investigators conceal their true identities and enter the cyberspace of the suspected crime through a registered account to extract dynamic electronic data for criminal activities,it is essentially a covert investigation in cyberspace,and they should follow the normative requirements for covert investigations.The retrieval of dynamic electronic data from private spaces is a technical investigative measure and should be implemented in accordance with the technical investigative procedures.Retrieval of remote“non-public electronic data involving privacy”is a mandatory investigative measure,and is essentially a search in the virtual space.Therefore,procedural specifications should be set in accordance with the standards of searching.展开更多
Advances in technology require upgrades in the law. One such area involves data brokers, which have thus far gone unregulated. Data brokers use artificial intelligence to aggregate information into data profiles about...Advances in technology require upgrades in the law. One such area involves data brokers, which have thus far gone unregulated. Data brokers use artificial intelligence to aggregate information into data profiles about individual Americans derived from consumer use of the internet and connected devices. Data profiles are then sold for profit. Government investigators use a legal loophole to purchase this data instead of obtaining a search warrant, which the Fourth Amendment would otherwise require. Consumers have lacked a reasonable means to fight or correct the information data brokers collect. Americans may not even be aware of the risks of data aggregation, which upends the test of reasonable expectations used in a search warrant analysis. Data aggregation should be controlled and regulated, which is the direction some privacy laws take. Legislatures must step forward to safeguard against shadowy data-profiling practices, whether abroad or at home. In the meantime, courts can modify their search warrant analysis by including data privacy principles.展开更多
The development of the technology of network had been of great convenience to get access to information. However, it was undeniable that a bad phenomenon had become even more and more serious that others' information...The development of the technology of network had been of great convenience to get access to information. However, it was undeniable that a bad phenomenon had become even more and more serious that others' information would be obtained by illegal means, and the research on the protection of privacy had increasingly aroused people's concern. The right of privacy not only had the usually outside personality characteristics, but also had a certain characteristics of property. This paper had attempted to study the right of privacy from the perspective of law and economics by interpreting the property in the right of privacy, in order to perfect the protection system of privacy in our country.展开更多
For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and all...For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and allows privacy information to be preserved.Data owners can tightly manage their data with efficient revocation and only grant one-time adaptive access for the fulfillment of the requester.We prove that our protocol is semanticallly secure,blind,and secure against oblivious requesters and malicious file keepers.We also provide security analysis in the context of four typical attacks.展开更多
This paper highlights the work of collaborating European journalists, who in a series of articles, under the heading "Security for Sale-the Price we pay to protect Europeans", problematise the European Union Funding...This paper highlights the work of collaborating European journalists, who in a series of articles, under the heading "Security for Sale-the Price we pay to protect Europeans", problematise the European Union Funding framework for security technology research, which unfortunately may enhance business opportunities for mass surveillance systems in non-democratic states. Based on a case, involving a research project in which I participated as an ethical adviser, the paper illustrates how a lack of global perspectives constitutes a weakness inherent in methodologies within design ethics, such as Privacy professional idealism (Mitcham 2003), by Design and value sensitive the paper concludes by arguing outlook, which goes beyond the walled gardens oft^e European Union design. Finally, drawing on the notion of in favour of moral activism from a global展开更多
The development of China's medical industry is very fast, which has provided a great help for people, but in the process, there are also a lot of problems violating the privacy of the patients. Based on these circums...The development of China's medical industry is very fast, which has provided a great help for people, but in the process, there are also a lot of problems violating the privacy of the patients. Based on these circumstances, we must offer the maximum protection of the privacy of the patients. From the point of view of the civil law, the medical institutions or the medical professionals must respect the patients, and protect the patients' privacy, so as to build a more harmonious relationship between the doctors and the patients.展开更多
As one of the basic human rights, and one confirmed in the Universal Declaration of Human Rights and the International Covenant on Civil and Political Rights, the right to privacy has been written into China’s Genera...As one of the basic human rights, and one confirmed in the Universal Declaration of Human Rights and the International Covenant on Civil and Political Rights, the right to privacy has been written into China’s General Principles of Civil Law and Tort Law. However, in judicial practice, there has been no unified standard in defining a tort of privacy, especially a tort of internet privacy. With the increasing popularity of the internet, torts of internet privacy are becoming more and more rampant and severe. Focusing on "internet hunts", a common tort of internet privacy, this paper examines how to affirm a tortious act of internet privacy, as well as forms of liability. It also expounds the practical judicial issues such as the object of prosecution trials.展开更多
The Internet of things has particularly novel implications in the area of public health. This is due to (1) The rapid and widespread adoption of powerful contemporary Smartphone’s;(2) The increasing availability and ...The Internet of things has particularly novel implications in the area of public health. This is due to (1) The rapid and widespread adoption of powerful contemporary Smartphone’s;(2) The increasing availability and use of health and fitness sensors, wearable sensor patches, smart watches, wireless-enabled digital tattoos and ambient sensors;and (3) The nature of public health to implicitly involve connectivity with and the acquisition of data in relation to large numbers of individuals up to population scale. Of particular relevance in relation to the Internet of Things (IoT) and public health is the need for privacy and anonymity of users. It should be noted that IoT capabilities are not inconsistent with maintaining privacy, due to the focus of public health on aggregate data not individual data and broad public health interventions. In addition, public health information systems utilizing IoT capabilities can be constructed to specifically ensure privacy, security and anonymity, as has been developed and evaluated in this work. In this paper we describe the particular characteristics of the IoT that can play a role in enabling emerging public health capabilities;we describe a privacy-preserving IoT-based public health information system architecture;and provide a privacy evaluation.展开更多
China has established a two-level normative structure AIDS notification system with the AIDS Prevention and control Regulations as the core and local regulations as the supplement The problem is that the local legisla...China has established a two-level normative structure AIDS notification system with the AIDS Prevention and control Regulations as the core and local regulations as the supplement The problem is that the local legislations have different provisions with regard to the subject of notification and whether to adopt mandatory notification, which confronts the implementation of the AIDS notification system and the prevention of AIDS transmission with real difficulties The different attitudes of local legislations to the mandatory notification system for AIDS essentially reflects the dilemma of legislators in balancing the right to privacy of HIV-infected patients and the right to health of their sexual partners from the perspective of rights limitations, this paper aims to conducts interest balance analysis in the aspects of social urgency, public interest, substantive damage and the right to know of others and holds the view that when these two rights conflict with each other, priority should be given to the right to health of HIV-infected patients and their sexual partner as well as public health In terms of specific systems, the AIDS Prevention and control Regulations should establish a mandatory notification system and local legislation should take into consideration of local conditions to make specific provisions on issues of notification subject, notification procedures and confidentiality obligations after notification.展开更多
HIV screening can be used to detect,control and prevent the spread of HIV/AIDS.The attitude towards HIV screening relates to the general trend of human rights protection of AIDS sufferers and infectors.HIV exceptional...HIV screening can be used to detect,control and prevent the spread of HIV/AIDS.The attitude towards HIV screening relates to the general trend of human rights protection of AIDS sufferers and infectors.HIV exceptionalism has been adopted in traditional international practice.That means the specific notified,voluntary consent shall be obtained from examinees before they are screened.However,there is move to abandon HIV exceptionalism in order to detect more infectors and treat AIDS the same as another infectious disease.This has resulted in 'compulsory screening' and 'consent after notification'.In China, 'voluntary' screening, 'real-name detection' and 'compulsory screening' exist in different regions.Thus,it is crucial to identify the legal regulation principle of HIV screening from the perspective of human rights.展开更多
The problem of data island hinders the application of big data in artificial intelligence model training,so researchers propose a federated learning framework.It enables model training without having to centralize all...The problem of data island hinders the application of big data in artificial intelligence model training,so researchers propose a federated learning framework.It enables model training without having to centralize all data in a central storage point.In the current horizontal federated learning scheme,each participant gets the final jointly trained model.No solution is proposed for scenarios where participants only provide training data in exchange for benefits,but do not care about the final jointly trained model.Therefore,this paper proposes a newboosted tree algorithm,calledRPBT(the originator Rights Protected federated Boosted Tree algorithm).Compared with the current horizontal federal learning algorithm,each participant will obtain the final jointly trained model.RPBT can guarantee that the local data of the participants will not be leaked,while the final jointly trained model cannot be obtained.It is worth mentioning that,from the perspective of the participants,the scheme uses the batch idea to make the participants participate in the training in random batches.Therefore,this scheme is more suitable for scenarios where a large number of participants are jointly modeling.Furthermore,a small number of participants will not actually participate in the joint training process.Therefore,the proposed scheme is more secure.Theoretical analysis and experimental evaluations show that RPBT is secure,accurate and efficient.展开更多
With the rapid development of cloud computing technology,cloud services have now become a new business model for information services.The cloud server provides the IT resources required by customers in a selfservice m...With the rapid development of cloud computing technology,cloud services have now become a new business model for information services.The cloud server provides the IT resources required by customers in a selfservice manner through the network,realizing business expansion and rapid innovation.However,due to the insufficient protection of data privacy,the problem of data privacy leakage in cloud storage is threatening cloud computing.To address the problem,we propose BC-PECK,a data protection scheme based on blockchain and public key searchable encryption.Firstly,all the data is protected by the encryption algorithm.The privacy data is encrypted and stored in a cloud server,while the ciphertext index is established by a public key searchable encryption scheme and stored on the blockchain.Secondly,based on the characteristics of trusted execution of smart contract technology,a control mechanism for data accessing and sharing is given.Data transaction is automatically recorded on the blockchain,which is fairer under the premise of ensuring the privacy and security of the data sharing process.Finally,we analyzed the security and fairness of the current scheme.Through the comparison with similar schemes,we have shown the advantages of the proposed scheme.展开更多
There are growing concerns surrounding the data security of social networks because large amount of user information and sensitive data are collected. Differential privacy is an effective method for privacy protection...There are growing concerns surrounding the data security of social networks because large amount of user information and sensitive data are collected. Differential privacy is an effective method for privacy protection that can provide rigorous and quantitative protection. Concerning the application of differential privacy in social networks,this paper analyzes current trends of research and provides some background information including privacy protection standards and noise mechanisms.Focusing on the privacy protection of social network data publishing,a graph-publishing model is designed to provide differential privacy in social networks via three steps: Firstly,according to the features of social network where two nodes that possess certain common properties are associated with a higher probability,a raw graph is divided into several disconnected sub-graphs,and correspondingly dense adjacent matrixes and the number of bridges are obtained. Secondly,taking the advantage of quad-trees,dense region exploration of the adjacent matrixes is conducted. Finally,using an exponential mechanism and leaf nodes of quad-trees,an adjacent matrix of the sanitized graph is reconstructed. In addition,a set of experiments is conducted to evaluate its feasibility,availability and strengths using three analysis techniques: degree distribution,shortest path,and clustering coefficients.展开更多
These years have witnessed the rapid growing of internet,and we are stepping into a new age-Internet Age.But the privacy on human rights that followed has become the hot issue.This essay tries to expose the privacy fo...These years have witnessed the rapid growing of internet,and we are stepping into a new age-Internet Age.But the privacy on human rights that followed has become the hot issue.This essay tries to expose the privacy focusing on the human rights under the internet age.It illuminates the right of privacy in internet age through the origin of privacy.By the comparison of traditional understanding of privacy and expedition of privacy under internet age,the essay concludes that the right of privacy will be transmitted by internet and will influence the development of internet as well.展开更多
Continuous response of range query on steaming data provides useful information for many practical applications as well as the risk of privacy disclosure.The existing research on differential privacy streaming data pu...Continuous response of range query on steaming data provides useful information for many practical applications as well as the risk of privacy disclosure.The existing research on differential privacy streaming data publication mostly pay close attention to boosting query accuracy,but pay less attention to query efficiency,and ignore the effect of timeliness on data weight.In this paper,we propose an effective algorithm of differential privacy streaming data publication under exponential decay mode.Firstly,by introducing the Fenwick tree to divide and reorganize data items in the stream,we achieve a constant time complexity for inserting a new item and getting the prefix sum.Meanwhile,we achieve time complicity linear to the number of data item for building a tree.After that,we use the advantage of matrix mechanism to deal with relevant queries and reduce the global sensitivity.In addition,we choose proper diagonal matrix further improve the range query accuracy.Finally,considering about exponential decay,every data item is weighted by the decay factor.By putting the Fenwick tree and matrix optimization together,we present complete algorithm for differentiate private real-time streaming data publication.The experiment is designed to compare the algorithm in this paper with similar algorithms for streaming data release in exponential decay.Experimental results show that the algorithm in this paper effectively improve the query efficiency while ensuring the quality of the query.展开更多
While users enjoy the convenience of data outsourcing in the cloud,they also face the risks of data modification and private information leakage.Searchable encryption technology can perform keyword searches over encry...While users enjoy the convenience of data outsourcing in the cloud,they also face the risks of data modification and private information leakage.Searchable encryption technology can perform keyword searches over encrypted data while protecting their privacy and guaranteeing the integrity of the data by verifying the search results.However,some associated problems are still encountered,such as the low efficiency of verification and uncontrollable query results.Accordingly,this paper proposes a Privacy-Preserving Searchable Encryption(PPSE)scheme based on public and private blockchains.First,we store an encrypted index in a private blockchain while outsourcing corresponding encrypted documents to a public blockchain.The encrypted documents are located through the encrypted index.This method can reduce the storage overhead on the blockchains,and improve the efficiency of transaction execution and the security of stored data.Moreover,we adopt a smart contract to introduce a secondary verification access control mechanism and restrict data users’access to the private blockchain through authorization for the purpose of guaranteeing data privacy and the correctness of access control verification.Finally,the security analysis and experimental results indicate that compared with existing schemes,the proposed scheme can not only improve the security of encrypted data but also guarantee the efficiency of the query.展开更多
Graph data publication has been considered as an important step for data analysis and mining.Graph data,which provide knowledge on interactions among entities,can be locally generated and held by distributed data owne...Graph data publication has been considered as an important step for data analysis and mining.Graph data,which provide knowledge on interactions among entities,can be locally generated and held by distributed data owners.These data are usually sensitive and private,because they may be related to owners’personal activities and can be hijacked by adversaries to conduct inference attacks.Current solutions either consider private graph data as centralized contents or disregard the overlapping of graphs in distributed manners.Therefore,this work proposes a novel framework for distributed graph publication.In this framework,differential privacy is applied to justify the safety of the published contents.It includes four phases,i.e.,graph combination,plan construction sharing,data perturbation,and graph reconstruction.The published graph selection is guided by one data coordinator,and each graph is perturbed carefully with the Laplace mechanism.The problem of graph selection is formulated and proven to be NP-complete.Then,a heuristic algorithm is proposed for selection.The correctness of the combined graph and the differential privacy on all edges are analyzed.This study also discusses a scenario without a data coordinator and proposes some insights into graph publication.展开更多
With introducing Global Positioning System(GPS),one of position determination technologies,into non-military area from military locating utilities in United States,it brings both positive and negative effect into our ...With introducing Global Positioning System(GPS),one of position determination technologies,into non-military area from military locating utilities in United States,it brings both positive and negative effect into our society simultaneously.On the one hand,the location data from these new tracking and positioning system are becoming universally available for commercial,government,educational,scientific and non-profit purposes to improve people’s daily life.On the other hand,the application of GPS also raises some impact to personal location privacy,like everything else in this world which would bring us goodness invariably carries the ability to cause harm.In this article,I will briefly talk about the advantages of GPS tracking technology firstly.Then,I will analysis the problems raised by the application of GPS technology in details,such as the concerns about personal location privacy,the moral dilemma and the right dispute when using GPS tracking children or automobile.Finally,I will introduce some safeguards which can minimize the conflicts between the applications of GPS and location privacy information protection.展开更多
As an emerging technology,blockchain provides a range of advantages,such as decentralized and transparent data storage,secure access control,and enhanced data traceability.However,it is rarely applied in the field of ...As an emerging technology,blockchain provides a range of advantages,such as decentralized and transparent data storage,secure access control,and enhanced data traceability.However,it is rarely applied in the field of public safety.This paper presents an in-depth survey of blockchain technology,focusing on its potential applications and implications within the field of public safety research.We explore the practical needs of multi-party data collaboration in emergency management and discusses the applicability and value of blockchain technology in this context.Additionally,this paper introduces and compares several popular blockchain platforms.By providing a comprehensive examination of blockchain technology and its potential benefits for public safety,this paper seeks to enhance understanding of the technology’s capabilities,encourage further research,and inspire innovation in this domain.展开更多
基金the current result of the “research on the basic category system of contemporary Chinese digital law” (23&ZD154), a major project of the National Social Science Fund of China.
文摘Although the existing legal norms and judicial practic-es can provide basic guidance for the right to personal data portabili-ty, it can be concluded that there are obstacles to the realization of this right through empirical research of the privacy policies of 66 mobile apps, such as whether they have stipulations on the right to personal data portability, whether they are able to derive copies of personal in-formation automatically, whether there are textual examples, whether ID verification is required, whether the copied documents are encrypt-ed, and whether the scope of personal information involved is consis-tent. This gap in practice, on the one hand, reflects the misunderstand-ing of the right to personal data portability, and on the other hand, is a result of the negative externalities, practical costs and technical lim-itations of the right to personal data portability. Based on rethinking the right to data portability, we can somehow solve practical problems concerning the right to personal data portability through multiple measures such as promoting the fulfillment of this right by legislation, optimizing technology-oriented operations, refining response process mechanisms, and enhancing system interoperability.
基金the phased research result of the Supreme People’s Procuratorate’s procuratorial theory research program“Research on the Governance Problems of the Crime of Aiding Information Network Criminal Activities”(Project Approval Number GJ2023D28)。
文摘With the development of information technology,the online retrieval of remote electronic data has become an important method for investigative agencies to collect evidence.In the current normative documents,the online retrieval of electronic data is positioned as a new type of arbitrary investigative measure.However,study of its actual operation has found that the online retrieval of electronic data does not fully comply with the characteristics of arbitrary investigative measures.The root cause is its inaccurately defined nature due to analogy errors,an emphasis on the authenticity of electronic data at the cost of rights protection,insufficient effectiveness of normative documents to break through the boundaries of law,and superficial inconsistency found in the mechanical comparison with the nature of existing investigative measures causes.The nature of electronic data retrieved online should be defined according to different circumstances.The retrieval of electronic data disclosed on the Internet is an arbitrary investigative measure,and following procedural specifications should be sufficient.When investigators conceal their true identities and enter the cyberspace of the suspected crime through a registered account to extract dynamic electronic data for criminal activities,it is essentially a covert investigation in cyberspace,and they should follow the normative requirements for covert investigations.The retrieval of dynamic electronic data from private spaces is a technical investigative measure and should be implemented in accordance with the technical investigative procedures.Retrieval of remote“non-public electronic data involving privacy”is a mandatory investigative measure,and is essentially a search in the virtual space.Therefore,procedural specifications should be set in accordance with the standards of searching.
文摘Advances in technology require upgrades in the law. One such area involves data brokers, which have thus far gone unregulated. Data brokers use artificial intelligence to aggregate information into data profiles about individual Americans derived from consumer use of the internet and connected devices. Data profiles are then sold for profit. Government investigators use a legal loophole to purchase this data instead of obtaining a search warrant, which the Fourth Amendment would otherwise require. Consumers have lacked a reasonable means to fight or correct the information data brokers collect. Americans may not even be aware of the risks of data aggregation, which upends the test of reasonable expectations used in a search warrant analysis. Data aggregation should be controlled and regulated, which is the direction some privacy laws take. Legislatures must step forward to safeguard against shadowy data-profiling practices, whether abroad or at home. In the meantime, courts can modify their search warrant analysis by including data privacy principles.
文摘The development of the technology of network had been of great convenience to get access to information. However, it was undeniable that a bad phenomenon had become even more and more serious that others' information would be obtained by illegal means, and the research on the protection of privacy had increasingly aroused people's concern. The right of privacy not only had the usually outside personality characteristics, but also had a certain characteristics of property. This paper had attempted to study the right of privacy from the perspective of law and economics by interpreting the property in the right of privacy, in order to perfect the protection system of privacy in our country.
基金partially supported by the National Natural Science Foundation of China under grant no.62372245the Foundation of Yunnan Key Laboratory of Blockchain Application Technology under Grant 202105AG070005+1 种基金in part by the Foundation of State Key Laboratory of Public Big Datain part by the Foundation of Key Laboratory of Computational Science and Application of Hainan Province under Grant JSKX202202。
文摘For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and allows privacy information to be preserved.Data owners can tightly manage their data with efficient revocation and only grant one-time adaptive access for the fulfillment of the requester.We prove that our protocol is semanticallly secure,blind,and secure against oblivious requesters and malicious file keepers.We also provide security analysis in the context of four typical attacks.
文摘This paper highlights the work of collaborating European journalists, who in a series of articles, under the heading "Security for Sale-the Price we pay to protect Europeans", problematise the European Union Funding framework for security technology research, which unfortunately may enhance business opportunities for mass surveillance systems in non-democratic states. Based on a case, involving a research project in which I participated as an ethical adviser, the paper illustrates how a lack of global perspectives constitutes a weakness inherent in methodologies within design ethics, such as Privacy professional idealism (Mitcham 2003), by Design and value sensitive the paper concludes by arguing outlook, which goes beyond the walled gardens oft^e European Union design. Finally, drawing on the notion of in favour of moral activism from a global
文摘The development of China's medical industry is very fast, which has provided a great help for people, but in the process, there are also a lot of problems violating the privacy of the patients. Based on these circumstances, we must offer the maximum protection of the privacy of the patients. From the point of view of the civil law, the medical institutions or the medical professionals must respect the patients, and protect the patients' privacy, so as to build a more harmonious relationship between the doctors and the patients.
文摘As one of the basic human rights, and one confirmed in the Universal Declaration of Human Rights and the International Covenant on Civil and Political Rights, the right to privacy has been written into China’s General Principles of Civil Law and Tort Law. However, in judicial practice, there has been no unified standard in defining a tort of privacy, especially a tort of internet privacy. With the increasing popularity of the internet, torts of internet privacy are becoming more and more rampant and severe. Focusing on "internet hunts", a common tort of internet privacy, this paper examines how to affirm a tortious act of internet privacy, as well as forms of liability. It also expounds the practical judicial issues such as the object of prosecution trials.
文摘The Internet of things has particularly novel implications in the area of public health. This is due to (1) The rapid and widespread adoption of powerful contemporary Smartphone’s;(2) The increasing availability and use of health and fitness sensors, wearable sensor patches, smart watches, wireless-enabled digital tattoos and ambient sensors;and (3) The nature of public health to implicitly involve connectivity with and the acquisition of data in relation to large numbers of individuals up to population scale. Of particular relevance in relation to the Internet of Things (IoT) and public health is the need for privacy and anonymity of users. It should be noted that IoT capabilities are not inconsistent with maintaining privacy, due to the focus of public health on aggregate data not individual data and broad public health interventions. In addition, public health information systems utilizing IoT capabilities can be constructed to specifically ensure privacy, security and anonymity, as has been developed and evaluated in this work. In this paper we describe the particular characteristics of the IoT that can play a role in enabling emerging public health capabilities;we describe a privacy-preserving IoT-based public health information system architecture;and provide a privacy evaluation.
基金Research on Legalization of Basic Medical Care Service(project approval No.14JZD025)as a key project of research on philosophy and social sciences of the Ministry of Education in 2014
文摘China has established a two-level normative structure AIDS notification system with the AIDS Prevention and control Regulations as the core and local regulations as the supplement The problem is that the local legislations have different provisions with regard to the subject of notification and whether to adopt mandatory notification, which confronts the implementation of the AIDS notification system and the prevention of AIDS transmission with real difficulties The different attitudes of local legislations to the mandatory notification system for AIDS essentially reflects the dilemma of legislators in balancing the right to privacy of HIV-infected patients and the right to health of their sexual partners from the perspective of rights limitations, this paper aims to conducts interest balance analysis in the aspects of social urgency, public interest, substantive damage and the right to know of others and holds the view that when these two rights conflict with each other, priority should be given to the right to health of HIV-infected patients and their sexual partner as well as public health In terms of specific systems, the AIDS Prevention and control Regulations should establish a mandatory notification system and local legislation should take into consideration of local conditions to make specific provisions on issues of notification subject, notification procedures and confidentiality obligations after notification.
文摘HIV screening can be used to detect,control and prevent the spread of HIV/AIDS.The attitude towards HIV screening relates to the general trend of human rights protection of AIDS sufferers and infectors.HIV exceptionalism has been adopted in traditional international practice.That means the specific notified,voluntary consent shall be obtained from examinees before they are screened.However,there is move to abandon HIV exceptionalism in order to detect more infectors and treat AIDS the same as another infectious disease.This has resulted in 'compulsory screening' and 'consent after notification'.In China, 'voluntary' screening, 'real-name detection' and 'compulsory screening' exist in different regions.Thus,it is crucial to identify the legal regulation principle of HIV screening from the perspective of human rights.
基金National Natural Science Foundation of China(Grant No.61976064)the National Natural Science Foundation of China(Grant No.62172123).
文摘The problem of data island hinders the application of big data in artificial intelligence model training,so researchers propose a federated learning framework.It enables model training without having to centralize all data in a central storage point.In the current horizontal federated learning scheme,each participant gets the final jointly trained model.No solution is proposed for scenarios where participants only provide training data in exchange for benefits,but do not care about the final jointly trained model.Therefore,this paper proposes a newboosted tree algorithm,calledRPBT(the originator Rights Protected federated Boosted Tree algorithm).Compared with the current horizontal federal learning algorithm,each participant will obtain the final jointly trained model.RPBT can guarantee that the local data of the participants will not be leaked,while the final jointly trained model cannot be obtained.It is worth mentioning that,from the perspective of the participants,the scheme uses the batch idea to make the participants participate in the training in random batches.Therefore,this scheme is more suitable for scenarios where a large number of participants are jointly modeling.Furthermore,a small number of participants will not actually participate in the joint training process.Therefore,the proposed scheme is more secure.Theoretical analysis and experimental evaluations show that RPBT is secure,accurate and efficient.
基金This work is supported by the NSFC(Grant Nos.92046001,61671087,61962009)the Fundamental Research Funds for the Central Universities(Grant No.2019XDA02)+7 种基金the Open Foundation of Guizhou Provincial Key Laboratory of Public Big Data(Grant Nos.2018BDKFJJ018,2019BDKFJJ010,2019BDKFJJ014)the High-quality and Cutting-edge Disciplines Construction Project for Universities in Beijing(Internet Information,Communication University of China),the Open Research Project of the State Key Laboratory of Media Convergence and Communication,Communication University of China,China(Grant No.SKLMCC2020KF006)Inner Mongolia Major science and technology projects(2019ZD025)Baotou Kundulun District Science and technology plan project(YF2020013)Inner Mongolia discipline inspection and supervision big data laboratory open project fund(IMDBD2020020)the Natural Science Foundation of Inner Mongolia(2021MS0602)Huawei Technologies Co.Ltd(No.YBN2020085019)the Scientific Research Foundation of North China University of Technology。
文摘With the rapid development of cloud computing technology,cloud services have now become a new business model for information services.The cloud server provides the IT resources required by customers in a selfservice manner through the network,realizing business expansion and rapid innovation.However,due to the insufficient protection of data privacy,the problem of data privacy leakage in cloud storage is threatening cloud computing.To address the problem,we propose BC-PECK,a data protection scheme based on blockchain and public key searchable encryption.Firstly,all the data is protected by the encryption algorithm.The privacy data is encrypted and stored in a cloud server,while the ciphertext index is established by a public key searchable encryption scheme and stored on the blockchain.Secondly,based on the characteristics of trusted execution of smart contract technology,a control mechanism for data accessing and sharing is given.Data transaction is automatically recorded on the blockchain,which is fairer under the premise of ensuring the privacy and security of the data sharing process.Finally,we analyzed the security and fairness of the current scheme.Through the comparison with similar schemes,we have shown the advantages of the proposed scheme.
基金Supported by the National Natural Science Foundation of China(No.61105047)the National High Technology Research and Development Program of China(No.2015IM030300)+1 种基金the Science and Technology Committee of Shanghai Support Project(No.14JC1405800)the Project of the Central Universities Fundamental Research of Tongji University
文摘There are growing concerns surrounding the data security of social networks because large amount of user information and sensitive data are collected. Differential privacy is an effective method for privacy protection that can provide rigorous and quantitative protection. Concerning the application of differential privacy in social networks,this paper analyzes current trends of research and provides some background information including privacy protection standards and noise mechanisms.Focusing on the privacy protection of social network data publishing,a graph-publishing model is designed to provide differential privacy in social networks via three steps: Firstly,according to the features of social network where two nodes that possess certain common properties are associated with a higher probability,a raw graph is divided into several disconnected sub-graphs,and correspondingly dense adjacent matrixes and the number of bridges are obtained. Secondly,taking the advantage of quad-trees,dense region exploration of the adjacent matrixes is conducted. Finally,using an exponential mechanism and leaf nodes of quad-trees,an adjacent matrix of the sanitized graph is reconstructed. In addition,a set of experiments is conducted to evaluate its feasibility,availability and strengths using three analysis techniques: degree distribution,shortest path,and clustering coefficients.
文摘These years have witnessed the rapid growing of internet,and we are stepping into a new age-Internet Age.But the privacy on human rights that followed has become the hot issue.This essay tries to expose the privacy focusing on the human rights under the internet age.It illuminates the right of privacy in internet age through the origin of privacy.By the comparison of traditional understanding of privacy and expedition of privacy under internet age,the essay concludes that the right of privacy will be transmitted by internet and will influence the development of internet as well.
基金This work is supported,in part,by the National Natural Science Foundation of China under grant numbers 61300026in part,by the Natural Science Foundation of Fujian Province under grant numbers 2017J01754, 2018J01797.
文摘Continuous response of range query on steaming data provides useful information for many practical applications as well as the risk of privacy disclosure.The existing research on differential privacy streaming data publication mostly pay close attention to boosting query accuracy,but pay less attention to query efficiency,and ignore the effect of timeliness on data weight.In this paper,we propose an effective algorithm of differential privacy streaming data publication under exponential decay mode.Firstly,by introducing the Fenwick tree to divide and reorganize data items in the stream,we achieve a constant time complexity for inserting a new item and getting the prefix sum.Meanwhile,we achieve time complicity linear to the number of data item for building a tree.After that,we use the advantage of matrix mechanism to deal with relevant queries and reduce the global sensitivity.In addition,we choose proper diagonal matrix further improve the range query accuracy.Finally,considering about exponential decay,every data item is weighted by the decay factor.By putting the Fenwick tree and matrix optimization together,we present complete algorithm for differentiate private real-time streaming data publication.The experiment is designed to compare the algorithm in this paper with similar algorithms for streaming data release in exponential decay.Experimental results show that the algorithm in this paper effectively improve the query efficiency while ensuring the quality of the query.
基金supported by the National Natural Science Foundation of China (No.61972073)the Key Program of Natural Science Foundation of Hebei Province of China (No.F2019201290)the Natural Science Foundation of Hebei Province of China (No.F2018201153).
文摘While users enjoy the convenience of data outsourcing in the cloud,they also face the risks of data modification and private information leakage.Searchable encryption technology can perform keyword searches over encrypted data while protecting their privacy and guaranteeing the integrity of the data by verifying the search results.However,some associated problems are still encountered,such as the low efficiency of verification and uncontrollable query results.Accordingly,this paper proposes a Privacy-Preserving Searchable Encryption(PPSE)scheme based on public and private blockchains.First,we store an encrypted index in a private blockchain while outsourcing corresponding encrypted documents to a public blockchain.The encrypted documents are located through the encrypted index.This method can reduce the storage overhead on the blockchains,and improve the efficiency of transaction execution and the security of stored data.Moreover,we adopt a smart contract to introduce a secondary verification access control mechanism and restrict data users’access to the private blockchain through authorization for the purpose of guaranteeing data privacy and the correctness of access control verification.Finally,the security analysis and experimental results indicate that compared with existing schemes,the proposed scheme can not only improve the security of encrypted data but also guarantee the efficiency of the query.
基金supported by the National Natural Science Foundation of China(Nos.U19A2059 and 61802050)Ministry of Science and Technology of Sichuan Province Program(Nos.2021YFG0018 and 20ZDYF0343)。
文摘Graph data publication has been considered as an important step for data analysis and mining.Graph data,which provide knowledge on interactions among entities,can be locally generated and held by distributed data owners.These data are usually sensitive and private,because they may be related to owners’personal activities and can be hijacked by adversaries to conduct inference attacks.Current solutions either consider private graph data as centralized contents or disregard the overlapping of graphs in distributed manners.Therefore,this work proposes a novel framework for distributed graph publication.In this framework,differential privacy is applied to justify the safety of the published contents.It includes four phases,i.e.,graph combination,plan construction sharing,data perturbation,and graph reconstruction.The published graph selection is guided by one data coordinator,and each graph is perturbed carefully with the Laplace mechanism.The problem of graph selection is formulated and proven to be NP-complete.Then,a heuristic algorithm is proposed for selection.The correctness of the combined graph and the differential privacy on all edges are analyzed.This study also discusses a scenario without a data coordinator and proposes some insights into graph publication.
文摘With introducing Global Positioning System(GPS),one of position determination technologies,into non-military area from military locating utilities in United States,it brings both positive and negative effect into our society simultaneously.On the one hand,the location data from these new tracking and positioning system are becoming universally available for commercial,government,educational,scientific and non-profit purposes to improve people’s daily life.On the other hand,the application of GPS also raises some impact to personal location privacy,like everything else in this world which would bring us goodness invariably carries the ability to cause harm.In this article,I will briefly talk about the advantages of GPS tracking technology firstly.Then,I will analysis the problems raised by the application of GPS technology in details,such as the concerns about personal location privacy,the moral dilemma and the right dispute when using GPS tracking children or automobile.Finally,I will introduce some safeguards which can minimize the conflicts between the applications of GPS and location privacy information protection.
基金Funded by National Key R&D Program of China(No.2022YFC2602400)National Natural Science Foundation of China(No.72174102,No.72334003)High-tech Discipline Construction Fundings for Universities in Beijing(Safety Science and Engineering).
文摘As an emerging technology,blockchain provides a range of advantages,such as decentralized and transparent data storage,secure access control,and enhanced data traceability.However,it is rarely applied in the field of public safety.This paper presents an in-depth survey of blockchain technology,focusing on its potential applications and implications within the field of public safety research.We explore the practical needs of multi-party data collaboration in emergency management and discusses the applicability and value of blockchain technology in this context.Additionally,this paper introduces and compares several popular blockchain platforms.By providing a comprehensive examination of blockchain technology and its potential benefits for public safety,this paper seeks to enhance understanding of the technology’s capabilities,encourage further research,and inspire innovation in this domain.