期刊文献+
共找到706篇文章
< 1 2 36 >
每页显示 20 50 100
The Intersection of Privacy by Design and Behavioral Economics: Nudging Users towards Privacy-Friendly Choices
1
作者 Vivek Kumar Agarwal 《Journal of Information Security》 2024年第4期557-563,共7页
This paper conducts a comprehensive review of existing research on Privacy by Design (PbD) and behavioral economics, explores the intersection of Privacy by Design (PbD) and behavioral economics, and how designers can... This paper conducts a comprehensive review of existing research on Privacy by Design (PbD) and behavioral economics, explores the intersection of Privacy by Design (PbD) and behavioral economics, and how designers can leverage “nudges” to encourage users towards privacy-friendly choices. We analyze the limitations of rational choice in the context of privacy decision-making and identify key opportunities for integrating behavioral economics into PbD. We propose a user-centered design framework for integrating behavioral economics into PbD, which includes strategies for simplifying complex choices, making privacy visible, providing feedback and control, and testing and iterating. Our analysis highlights the need for a more nuanced understanding of user behavior and decision-making in the context of privacy, and demonstrates the potential of behavioral economics to inform the design of more effective PbD solutions. 展开更多
关键词 privacy by Design Behavioral Economics Nudges user-Centric Design Data Protection Cognitive Biases HEURIsTICs
下载PDF
Frequent Itemset Mining of User’s Multi-Attribute under Local Differential Privacy 被引量:2
2
作者 Haijiang Liu Lianwei Cui +1 位作者 Xuebin Ma Celimuge Wu 《Computers, Materials & Continua》 SCIE EI 2020年第10期369-385,共17页
Frequent itemset mining is an essential problem in data mining and plays a key role in many data mining applications.However,users’personal privacy will be leaked in the mining process.In recent years,application of ... Frequent itemset mining is an essential problem in data mining and plays a key role in many data mining applications.However,users’personal privacy will be leaked in the mining process.In recent years,application of local differential privacy protection models to mine frequent itemsets is a relatively reliable and secure protection method.Local differential privacy means that users first perturb the original data and then send these data to the aggregator,preventing the aggregator from revealing the user’s private information.We propose a novel framework that implements frequent itemset mining under local differential privacy and is applicable to user’s multi-attribute.The main technique has bitmap encoding for converting the user’s original data into a binary string.It also includes how to choose the best perturbation algorithm for varying user attributes,and uses the frequent pattern tree(FP-tree)algorithm to mine frequent itemsets.Finally,we incorporate the threshold random response(TRR)algorithm in the framework and compare it with the existing algorithms,and demonstrate that the TRR algorithm has higher accuracy for mining frequent itemsets. 展开更多
关键词 Local differential privacy frequent itemset mining users multi-attribute
下载PDF
A Literature Review: Potential Effects That Health Apps on Mobile Devices May Have on Patient Privacy and Confidentiality
3
作者 Anna Sheri George Jomin George Judy Jenkins 《E-Health Telecommunication Systems and Networks》 2024年第3期23-44,共22页
Purpose: This research aims to evaluate the potential threats to patient privacy and confidentiality posed by mHealth applications on mobile devices. Methodology: A comprehensive literature review was conducted, selec... Purpose: This research aims to evaluate the potential threats to patient privacy and confidentiality posed by mHealth applications on mobile devices. Methodology: A comprehensive literature review was conducted, selecting eighty-eight articles published over the past fifteen years. The study assessed data gathering and storage practices, regulatory adherence, legal structures, consent procedures, user education, and strategies to mitigate risks. Results: The findings reveal significant advancements in technologies designed to safeguard privacy and facilitate the widespread use of mHealth apps. However, persistent ethical issues related to privacy remain largely unchanged despite these technological strides. 展开更多
关键词 Mobile Devices Patient privacy Confidentiality Breaches Data security Data Protection Regulatory Compliance user Consent Data Encryption Third-Party Integration user Awareness
下载PDF
Web Search Query Privacy, an End-User Perspective 被引量:1
4
作者 Kato Mivule 《Journal of Information Security》 2017年第1期56-74,共19页
While search engines have become vital tools for searching information on the Internet, privacy issues remain a growing concern due to the technological abilities of search engines to retain user search logs. Although... While search engines have become vital tools for searching information on the Internet, privacy issues remain a growing concern due to the technological abilities of search engines to retain user search logs. Although such capabilities might provide enhanced personalized search results, the confidentiality of user intent remains uncertain. Even with web search query obfuscation techniques, another challenge remains, namely, reusing the same obfuscation methods is problematic, given that search engines have enormous computation and storage resources for query disambiguation. A number of web search query privacy procedures involve the cooperation of the search engine, a non-trusted entity in such cases, making query obfuscation even more challenging. In this study, we provide a review on how search engines work in regards to web search queries and user intent. Secondly, this study reviews material in a manner accessible to those outside computer science with the intent to introduce knowledge of web search engines to enable non-computer scientists to approach web search query privacy innovatively. As a contribution, we identify and highlight areas open for further investigative and innovative research in regards to end-user personalized web search privacy—that is methods that can be executed on the user side without third party involvement such as, search engines. The goal is to motivate future web search obfuscation heuristics that give users control over their personal search privacy. 展开更多
关键词 WEB QUERIEs WEB search privacy user Profile privacy user INTENT privacy
下载PDF
Preserving Privacy of User Identity Based on Pseudonym Variable in 5G 被引量:1
5
作者 Mamoon M.Saeed Mohammad Kamrul Hasan +4 位作者 Rosilah Hassan Rania Mokhtar Rashid A.Saeed Elsadig Saeid Manoj Gupta 《Computers, Materials & Continua》 SCIE EI 2022年第3期5551-5568,共18页
The fifth generation(5G)system is the forthcoming generation of the mobile communication system.It has numerous additional features and offers an extensively high data rate,more capacity,and low latency.However,these ... The fifth generation(5G)system is the forthcoming generation of the mobile communication system.It has numerous additional features and offers an extensively high data rate,more capacity,and low latency.However,these features and applications have many problems and issues in terms of security,which has become a great challenge in the telecommunication industry.This paper aimed to propose a solution to preserve the user identity privacy in the 5G system that can identify permanent identity by using Variable Mobile Subscriber Identity,which randomly changes and does not use the permanent identity between the user equipment and home network.Through this mechanism,the user identity privacy would be secured and hidden.Moreover,it improves the synchronization between mobile users and home networks.Additionally,its compliance with the Authentication and Key Agreement(AKA)structure was adopted in the previous generations.It can be deployed efficiently in the preceding generations because the current architecture imposes minimal modifications on the network parties without changes in the authentication vector’s message size.Moreover,the addition of any hardware to the AKA carries minor adjustments on the network parties.In this paper,the ProVerif is used to verify the proposed scheme. 展开更多
关键词 5G privacy and security user identity IMsI authentication and key agreement(AKA)
下载PDF
On-Line Privacy Behavior: Using User Interfaces for Salient Factors
6
作者 Thomas Hughes-Roberts Elahe Kani-Zabihi 《Journal of Computer and Communications》 2014年第4期220-231,共12页
The problem of privacy in social networks is well documented within literature;users have pri- vacy concerns however, they consistently disclose their sensitive information and leave it open to unintended third partie... The problem of privacy in social networks is well documented within literature;users have pri- vacy concerns however, they consistently disclose their sensitive information and leave it open to unintended third parties. While numerous causes of poor behaviour have been suggested by re- search the role of the User Interface (UI) and the system itself is underexplored. The field of Per- suasive Technology would suggest that Social Network Systems persuade users to deviate from their normal or habitual behaviour. This paper makes the case that the UI can be used as the basis for user empowerment by informing them of their privacy at the point of interaction and remind- ing them of their privacy needs. The Theory of Planned Behaviour is introduced as a potential theoretical foundation for exploring the psychology behind privacy behaviour as it describes the salient factors that influence intention and action. Based on these factors of personal attitude, subjective norms and perceived control, a series of UIs are presented and implemented in con- trolled experiments examining their effect on personal information disclosure. This is combined with observations and interviews with the participants. Results from this initial, pilot experiment suggest groups with privacy salient information embedded exhibit less disclosure than the control group. This work reviews this approach as a method for exploring privacy behaviour and propos- es further work required. 展开更多
关键词 ON-LINE privacy social NETWORKING site user Interface users BEHAVIOR Theory of PLANNED BEHAVIOR
下载PDF
PUMTD:Privacy-Preserving User-Profile Matching Protocol in Social Networks
7
作者 Jianhong Zhang Haoting Han +2 位作者 Hongwei Su Zhengtao Jiang Changgen Peng 《China Communications》 SCIE CSCD 2022年第6期77-90,共14页
User profile matching can establish social relationships between different users in the social network.If the user profile is matched in plaintext,the user's privacy might face a security challenge.Although there ... User profile matching can establish social relationships between different users in the social network.If the user profile is matched in plaintext,the user's privacy might face a security challenge.Although there exist some schemes realizing privacypreserving user profile matching,the resource-limited users or social service providers in these schemes need to take higher computational complexity to ensure the privacy or matching of the data.To overcome the problems,a novel privacy-preserving user profile matching protocol in social networks is proposed by using t-out-of n servers and the bloom filter technique,in which the computational complexity of a user is reduced by applying the Chinese Remainder Theorem,the matching users can be found with the help of any t matching servers,and the privacy of the user profile is not compromised.Furthermore,if at most t-1 servers are allowed to collude,our scheme can still fulfill user profile privacy and user query privacy.Finally,the performance of the proposed scheme is compared with the other two schemes,and the results show that our scheme is superior to them. 展开更多
关键词 user profile matching Chinese remainder theorem privacy-PREsERVING query privacy
下载PDF
Pseudonym Mutable Based Privacy for 5G User Identity
8
作者 Rashid A.Saeed Mamoon M.Saeed +2 位作者 Rania A.Mokhtar Hesham Alhumyani S.Abdel-Khalek 《Computer Systems Science & Engineering》 SCIE EI 2021年第10期1-14,共14页
Privacy,identity preserving and integrity have become key problems for telecommunication standards.Significant privacy threats are expected in 5G networks considering the large number of devices that will be deployed.... Privacy,identity preserving and integrity have become key problems for telecommunication standards.Significant privacy threats are expected in 5G networks considering the large number of devices that will be deployed.As Internet of Things(IoT)and long-term evolution for machine type(LTE-m)are growing very fast with massive data traffic the risk of privacy attacks will be greatly increase.For all the above issues standards’bodies should ensure users’identity and privacy in order to gain the trust of service providers and industries.Against such threats,5G specifications require a rigid and robust privacy procedure.Many research studies have addressed user privacy in 5G networks.This paper proposes a method to enhance user identity privacy in 5G systems through a scheme to protect the international mobile subscriber identity(IMSI)using a mutable mobile subscriber identity(MMSI)that changes randomly and avoids the exchange of IMSIs.It maintains authentication and key agreement(AKA)structure compatibility with previous mobile generations and improves user equipment(UE)synchronization with home networks.The proposed algorithm adds no computation overhead to UE or the network except a small amount in the home subscriber server(HSS).The proposed pseudonym mutable uses the XOR function to send the MMSI from the HSS to the UE which is reducing the encryption overhead significantly.The proposed solution was verified by ProVerif. 展开更多
关键词 5G MMsI IMsI AKA privacy user identity
下载PDF
Reliable and Privacy-Preserving Federated Learning with Anomalous Users
9
作者 ZHANG Weiting LIANG Haotian +1 位作者 XU Yuhua ZHANG Chuan 《ZTE Communications》 2023年第1期15-24,共10页
Recently,various privacy-preserving schemes have been proposed to resolve privacy issues in federated learning(FL).However,most of them ignore the fact that anomalous users holding low-quality data may reduce the accu... Recently,various privacy-preserving schemes have been proposed to resolve privacy issues in federated learning(FL).However,most of them ignore the fact that anomalous users holding low-quality data may reduce the accuracy of trained models.Although some existing works manage to solve this problem,they either lack privacy protection for users’sensitive information or introduce a two-cloud model that is difficult to find in reality.A reliable and privacy-preserving FL scheme named reliable and privacy-preserving federated learning(RPPFL)based on a single-cloud model is proposed.Specifically,inspired by the truth discovery technique,we design an approach to identify the user’s reliability and thereby decrease the impact of anomalous users.In addition,an additively homomorphic cryptosystem is utilized to provide comprehensive privacy preservation(user’s local gradient privacy and reliability privacy).We give rigorous theoretical analysis to show the security of RPPFL.Based on open datasets,we conduct extensive experiments to demonstrate that RPPEL compares favorably with existing works in terms of efficiency and accuracy. 展开更多
关键词 federated learning anomalous user privacy preservation reliability homomorphic cryptosystem
下载PDF
Customization Product Design Based on User's Emotion and Needs 被引量:3
10
作者 金纯 张春林 刘文枝 《Defence Technology(防务技术)》 SCIE EI CAS 2005年第2期245-249,共5页
The paper presents a design method that ensures the ingenuity of the product form as well as the whole and exact expression of user’s needs. The key idea is to establish an automatic design system which can transform... The paper presents a design method that ensures the ingenuity of the product form as well as the whole and exact expression of user’s needs. The key idea is to establish an automatic design system which can transform the user’s language needs into the product features in real-time. A rifle was taken as a research instance and soldiers were chosen as evaluation customers. The theory of fuzzy set and semantic difference are adopted to evaluate the relationship between user’s needs and product features as well as their alternatives. FAHP (fuzzy analytic hierarchy process) is utilized to judge the user’s satisfactory forms. This method can also be applied to other product form designs. 展开更多
关键词 users needs product form CUsTOMIZATION fuzzy number
下载PDF
Use of methotrexate in inflammatory bowel disease in 2014: A User's Guide 被引量:4
11
作者 Arun Swaminath Raja Taunk Garrett Lawlor 《World Journal of Gastrointestinal Pharmacology and Therapeutics》 CAS 2014年第3期113-121,共9页
Methotrexate has been used an immunomodulator in many autoimmune diseases,including inflammatory bowel disease. However,many physicians are unfamiliar or uncomfortable with its use in the management of inflammatory bo... Methotrexate has been used an immunomodulator in many autoimmune diseases,including inflammatory bowel disease. However,many physicians are unfamiliar or uncomfortable with its use in the management of inflammatory bowel disease. We summarize the data for use of methotrexate in common clinical scenarios:(1) steroid dependant Crohn's disease(CD);(2) maintenance of remission in steroid free CD;(3) azathioprine failures in CD;(4) in combination therapy with Anti-TNF agents in CD;(5) decreasing antibody formation to Anti-TNF therapy in CD;(6) management of fistulizing disease in CD; and(7) as well as induction and maintenance of remission in ulcerative colitis. An easy to use algorithm is provided for the busy clinician to access and safely prescribe methotrexate for their inflammatory bowel disease patients. 展开更多
关键词 METHOTREXATE Inflammatory BOWEL DIsEAsE Crohn’s DIsEAsE ULCERATIVE colitis IMMUNOMODULATORs METHOTREXATE users GUIDE
下载PDF
User’s Relevance of PIR System Based on Cloud Models 被引量:1
12
作者 康海燕 樊孝忠 《Journal of Beijing Institute of Technology》 EI CAS 2006年第2期181-185,共5页
A new method to evaluate fuzzily user's relevance on the basis of cloud models has been proposed. All factors of personalized information retrieval system are taken into account in this method. So using this method f... A new method to evaluate fuzzily user's relevance on the basis of cloud models has been proposed. All factors of personalized information retrieval system are taken into account in this method. So using this method for personalized information retrieval (PIR) system can efficiently judge multi-value relevance, such as quite relevant, comparatively relevant, commonly relevant, basically relevant and completely non-relevant, and realize a kind of transform of qualitative concepts and quantity and improve accuracy of relevance judgements in PIR system. Experimental data showed that the method is practical and valid. Evaluation results are more accurate and approach to the fact better. 展开更多
关键词 personalized information retrieval (PIR) cloud model user's relevance fuzzy evaluation
下载PDF
车联网基于稀疏用户环境的LBS隐私保护方案
13
作者 门红蕾 曹利 +2 位作者 郑国莉 李原帅 马海英 《计算机应用研究》 CSCD 北大核心 2024年第9期2831-2838,共8页
针对车联网稀疏用户环境下LBS(location-based services)位置隐私保护能力降低的问题,提出一种基于同态加密的混合隐私保护方案。该方案利用同态加密性质,实现了车辆用户虚拟身份的按需生成和对外不可区分的认证,并通过将虚拟地址与车... 针对车联网稀疏用户环境下LBS(location-based services)位置隐私保护能力降低的问题,提出一种基于同态加密的混合隐私保护方案。该方案利用同态加密性质,实现了车辆用户虚拟身份的按需生成和对外不可区分的认证,并通过将虚拟地址与车辆真实位置混淆,进一步提供了基于车辆身份和位置的混合隐私保护。安全分析表明,该方案在服务隐私保护有效性的基础上,对恶意车辆身份具有可追溯性、有效抵御拒绝服务攻击和假名伪造攻击;性能分析的结果表明,与传统的假名生成办法以及k-匿名技术相比,随着隐私因子k增加到40后,该方案在动态假名生成上降低了25%的计算开销,具有91%以上的隐私保护度,弥补了k-匿名技术和假名技术在特殊环境下的缺陷,更适用于动态、低时延的车联网通信环境。 展开更多
关键词 车联网 位置隐私保护 同态加密 虚拟用户 虚拟地址 稀疏环境
下载PDF
Encryption with User Authentication Model for Internet of Medical Things Environment
14
作者 K.S.Riya R.Surendran +1 位作者 Carlos Andrés Tavera Romero M.Sadish Sendil 《Intelligent Automation & Soft Computing》 SCIE 2023年第1期507-520,共14页
Internet of Medical Things(IoMT)enabled e-healthcare has the potential to greately improve conventional healthcare services significantly.However,security and privacy become major issues of IoMT because of the restric... Internet of Medical Things(IoMT)enabled e-healthcare has the potential to greately improve conventional healthcare services significantly.However,security and privacy become major issues of IoMT because of the restricted processing abilities,storage,and energy constraints of the sensors.Therefore,it leads to infeasibility of developing traditional cryptographic solutions to the IoMT sensors.In order to ensure security on sensitive medical data,effective encryption and authentication techniques need to be designed to assure security of the patients and healthcare service providers.In this view,this study designs an effective metaheuristic optimization based encryption with user authentication(EMOE-UA)technique for IoMT environment.This work proposes an EMOE-UA technique aims to accomplish mutual authentication for addressing the security issues and reducing the computational complexity.Moreover,the EMOE-UA technique employs optimal multikey homomorphic encryption(OMKHE)technique to encrypt the IoMT data.Furthermore,the improved social spider optimization algorithm(ISSOA)was employed for the optimal multikey generation of the MKHE technique.The experimental result analysis of the EMOE-UA technique takes place using benchmark data and the results are examined under various aspects.The simulation results reported the considerably better performance of the EMOE-UA technique over the existing techniques. 展开更多
关键词 user authentication sECURITY privacy internet of medical things homomorphic encryption optimal key generation
下载PDF
A Dynamic Bandwidth Allocation Solution Based on User Behavior and Software Defined EPS
15
作者 Bo Zhu Hao Jiang +2 位作者 Lihua Wu Shuwen Yi Hai Wang 《China Communications》 SCIE CSCD 2016年第9期80-90,共11页
For telecommunication operators, how to improve the utilization of bandwidth resources is always a problem which worthy of study, nowadays, this issue has become more and more important, since the traffic load burstin... For telecommunication operators, how to improve the utilization of bandwidth resources is always a problem which worthy of study, nowadays, this issue has become more and more important, since the traffic load bursting in the mobile Internet. So the key to solving this problem is that we need to find a kind of traffic model to predict the traffic load that users need. According to the predicted traffic load to allocate bandwidth to each base station dynamically.But the traffic consumption behavior of a single base station is random, it is difficult to predict[ 1 ]. For this reason, we based on reality that, when the user moves, it may get traffic load from different base stations, therefore, there will have some kind of relationship between those base stations.We use this relationship to establish a kind of Spatial Collaborative Network.consequently, we make use of stability algorithm to divided those base station cluster into different communities, According to the traffic load usage rules which these communities indicated to us, we get a traffic model.At the same time, we studied bow to use this traffic model in the future networks to dynamically allocate bandwidth resources, then we propose a new kind of EPS architecture based on SDN, on this platform, we can deploy our strategy through it's programmable interface.Finally, we designed an experiment to test the performance of our dynamic strategy, and the result shows that our method enables bandwidth utilization has been greatly improved. 展开更多
关键词 bandwidth utilization user's behaviour traffic module sDN
下载PDF
Research on Federated Learning Data Sharing Scheme Based on Differential Privacy
16
作者 Lihong Guo 《Computers, Materials & Continua》 SCIE EI 2023年第3期5069-5085,共17页
To realize data sharing,and to fully use the data value,breaking the data island between institutions to realize data collaboration has become a new sharing mode.This paper proposed a distributed data security sharing... To realize data sharing,and to fully use the data value,breaking the data island between institutions to realize data collaboration has become a new sharing mode.This paper proposed a distributed data security sharing scheme based on C/S communication mode,and constructed a federated learning architecture that uses differential privacy technology to protect training parameters.Clients do not need to share local data,and they only need to upload the trained model parameters to achieve data sharing.In the process of training,a distributed parameter update mechanism is introduced.The server is mainly responsible for issuing training commands and parameters,and aggregating the local model parameters uploaded by the clients.The client mainly uses the stochastic gradient descent algorithm for gradient trimming,updates,and transmits the trained model parameters back to the server after differential processing.To test the performance of the scheme,in the application scenario where many medical institutions jointly train the disease detection system,the model is tested from multiple perspectives by taking medical data as an example.From the testing results,we can know that for this specific test dataset,when the parameters are properly configured,the lowest prediction accuracy rate is 90.261%and the highest accuracy rate is up to 94.352.It shows that the performance of the model is good.The results also show that this scheme realizes data sharing while protecting data privacy,completes accurate prediction of diseases,and has a good effect. 展开更多
关键词 Federated learning C/s mode differential privacy gradient descent prediction accuracy
下载PDF
Privacy Preserved Brain Disorder Diagnosis Using Federated Learning
17
作者 Ali Altalbe Abdul Rehman Javed 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期2187-2200,共14页
Federated learning has recently attracted significant attention as a cutting-edge technology that enables Artificial Intelligence(AI)algorithms to utilize global learning across the data of numerous individuals while ... Federated learning has recently attracted significant attention as a cutting-edge technology that enables Artificial Intelligence(AI)algorithms to utilize global learning across the data of numerous individuals while safeguarding user data privacy.Recent advanced healthcare technologies have enabled the early diagnosis of various cognitive ailments like Parkinson’s.Adequate user data is frequently used to train machine learning models for healthcare systems to track the health status of patients.The healthcare industry faces two significant challenges:security and privacy issues and the personalization of cloud-trained AI models.This paper proposes a Deep Neural Network(DNN)based approach embedded in a federated learning framework to detect and diagnose brain disorders.We extracted the data from the database of Kay Elemetrics voice disordered and divided the data into two windows to create training models for two clients,each with different data.To lessen the over-fitting aspect,every client reviewed the outcomes in three rounds.The proposed model identifies brain disorders without jeopardizing privacy and security.The results reveal that the global model achieves an accuracy of 82.82%for detecting brain disorders while preserving privacy. 展开更多
关键词 privacy preservation brain disorder detection Parkinson’s disease diagnosis federated learning healthcare machine learning
下载PDF
属性Logistic混沌映射下的物联网隐私数据安全共享 被引量:2
18
作者 黄杨杨 《现代电子技术》 北大核心 2024年第13期97-101,共5页
为加强物联网隐私数据保护,提高用户信任度与满意度,提出属性Logistic混沌映射下的物联网隐私数据安全共享。构建基于主从式结构的三层物联网隐私数据安全共享模型并设计数据访问机制,在此基础上,基于量子细胞神经网络和Logistic映射得... 为加强物联网隐私数据保护,提高用户信任度与满意度,提出属性Logistic混沌映射下的物联网隐私数据安全共享。构建基于主从式结构的三层物联网隐私数据安全共享模型并设计数据访问机制,在此基础上,基于量子细胞神经网络和Logistic映射得到矩阵A,对其分解后,得到矩阵B和序列C,由B矩阵构造混沌序列池,对C序列元素作映射处理,生成索引序列,并确定Logistic映射初始值,再对索引作Logistic映射后,从混沌序列池检索出CP-ABE加密算法的公钥、主密钥后,利用其与用户属性集合生成用户私钥,基于数据访问结构实现物联网隐私数据的加密。实验结果表明,该方法生成的密钥能够通过随机性验证,实现物联网隐私数据加密,且操作数量少,加密强度高。 展开更多
关键词 Logistic 混沌映射 物联网 隐私数据 主从式 访问机制 量子细胞神经网络 CP-ABE 用户属性
下载PDF
Fifty-Six Big Data V’s Characteristics and Proposed Strategies to Overcome Security and Privacy Challenges (BD2)
19
作者 Abou_el_ela Abdou Hussein 《Journal of Information Security》 2020年第4期304-328,共25页
The amount of data that is traveling across the internet today, including very large and complex set of raw facts that are not only large, but also, complex, noisy, heterogeneous, and longitudinal data as well. Compan... The amount of data that is traveling across the internet today, including very large and complex set of raw facts that are not only large, but also, complex, noisy, heterogeneous, and longitudinal data as well. Companies, institutions, healthcare system, mobile application capturing devices and sensors, traffic management, banking, retail, education etc., use piles of data which are further used for creating reports in order to ensure continuity regarding the services that they have to offer. Recently, Big data is one of the most important topics in IT industry. Managing Big data needs new techniques because traditional security and privacy mechanisms are inadequate and unable to manage complex distributed computing for different types of data. New types of data have different and new challenges also. A lot of researches treat with big data challenges starting from Doug Laney’s landmark paper</span><span style="font-family:Verdana;">,</span><span style="font-family:Verdana;"> during the previous two decades;the big challenge is how to operate a huge volume of data that has to be securely delivered through the internet and reach its destination intact. The present paper highlights important concepts of Fifty</span><span style="font-family:Verdana;">-</span><span style="font-family:Verdana;">six Big Data V’s characteristics. This paper also highlights the security and privacy Challenges that Big Data faces and solving this problem by proposed technological solutions that help us avoiding these challenging problems. 展开更多
关键词 Big Data Big Data V’s Characteristics security privacy CHALLENGEs Technological solutions
下载PDF
Changes in the Structure of China's Net Users
20
《China's Foreign Trade》 2000年第5期44-44,共1页
关键词 Changes in the structure of China’s Net users
下载PDF
上一页 1 2 36 下一页 到第
使用帮助 返回顶部