期刊文献+
共找到849篇文章
< 1 2 43 >
每页显示 20 50 100
Trusted Certified Auditor Using Cryptography for Secure Data Outsourcing and Privacy Preservation in Fog-Enabled VANETs
1
作者 Nagaraju Pacharla K.Srinivasa Reddy 《Computers, Materials & Continua》 SCIE EI 2024年第5期3089-3110,共22页
With the recent technological developments,massive vehicular ad hoc networks(VANETs)have been established,enabling numerous vehicles and their respective Road Side Unit(RSU)components to communicate with oneanother.Th... With the recent technological developments,massive vehicular ad hoc networks(VANETs)have been established,enabling numerous vehicles and their respective Road Side Unit(RSU)components to communicate with oneanother.The best way to enhance traffic flow for vehicles and traffic management departments is to share thedata they receive.There needs to be more protection for the VANET systems.An effective and safe methodof outsourcing is suggested,which reduces computation costs by achieving data security using a homomorphicmapping based on the conjugate operation of matrices.This research proposes a VANET-based data outsourcingsystem to fix the issues.To keep data outsourcing secure,the suggested model takes cryptography models intoaccount.Fog will keep the generated keys for the purpose of vehicle authentication.For controlling and overseeingthe outsourced data while preserving privacy,the suggested approach considers the Trusted Certified Auditor(TCA).Using the secret key,TCA can identify the genuine identity of VANETs when harmful messages aredetected.The proposed model develops a TCA-based unique static vehicle labeling system using cryptography(TCA-USVLC)for secure data outsourcing and privacy preservation in VANETs.The proposed model calculatesthe trust of vehicles in 16 ms for an average of 180 vehicles and achieves 98.6%accuracy for data encryption toprovide security.The proposedmodel achieved 98.5%accuracy in data outsourcing and 98.6%accuracy in privacypreservation in fog-enabled VANETs.Elliptical curve cryptography models can be applied in the future for betterencryption and decryption rates with lightweight cryptography operations. 展开更多
关键词 Vehicular ad-hoc networks data outsourcing privacy preservation CRYPTOGRAPHY keys trusted certified auditors data security
下载PDF
A Cloud-Fog Enabled and Privacy-Preserving IoT Data Market Platform Based on Blockchain
2
作者 Yurong Luo Wei You +3 位作者 Chao Shang Xiongpeng Ren Jin Cao Hui Li 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第5期2237-2260,共24页
The dynamic landscape of the Internet of Things(IoT)is set to revolutionize the pace of interaction among entities,ushering in a proliferation of applications characterized by heightened quality and diversity.Among th... The dynamic landscape of the Internet of Things(IoT)is set to revolutionize the pace of interaction among entities,ushering in a proliferation of applications characterized by heightened quality and diversity.Among the pivotal applications within the realm of IoT,as a significant example,the Smart Grid(SG)evolves into intricate networks of energy deployment marked by data integration.This evolution concurrently entails data interchange with other IoT entities.However,there are also several challenges including data-sharing overheads and the intricate establishment of trusted centers in the IoT ecosystem.In this paper,we introduce a hierarchical secure data-sharing platform empowered by cloud-fog integration.Furthermore,we propose a novel non-interactive zero-knowledge proof-based group authentication and key agreement protocol that supports one-to-many sharing sets of IoT data,especially SG data.The security formal verification tool shows that the proposed scheme can achieve mutual authentication and secure data sharing while protecting the privacy of data providers.Compared with previous IoT data sharing schemes,the proposed scheme has advantages in both computational and transmission efficiency,and has more superiority with the increasing volume of shared data or increasing number of participants. 展开更多
关键词 IoT data sharing zero-knowledge proof authentication privacy preserving blockchain
下载PDF
Privacy-Preserving Healthcare and Medical Data Collaboration Service System Based on Blockchain and Federated Learning
3
作者 Fang Hu Siyi Qiu +3 位作者 Xiaolian Yang ChaoleiWu Miguel Baptista Nunes Hui Chen 《Computers, Materials & Continua》 SCIE EI 2024年第8期2897-2915,共19页
As the volume of healthcare and medical data increases from diverse sources,real-world scenarios involving data sharing and collaboration have certain challenges,including the risk of privacy leakage,difficulty in dat... As the volume of healthcare and medical data increases from diverse sources,real-world scenarios involving data sharing and collaboration have certain challenges,including the risk of privacy leakage,difficulty in data fusion,low reliability of data storage,low effectiveness of data sharing,etc.To guarantee the service quality of data collaboration,this paper presents a privacy-preserving Healthcare and Medical Data Collaboration Service System combining Blockchain with Federated Learning,termed FL-HMChain.This system is composed of three layers:Data extraction and storage,data management,and data application.Focusing on healthcare and medical data,a healthcare and medical blockchain is constructed to realize data storage,transfer,processing,and access with security,real-time,reliability,and integrity.An improved master node selection consensus mechanism is presented to detect and prevent dishonest behavior,ensuring the overall reliability and trustworthiness of the collaborative model training process.Furthermore,healthcare and medical data collaboration services in real-world scenarios have been discussed and developed.To further validate the performance of FL-HMChain,a Convolutional Neural Network-based Federated Learning(FL-CNN-HMChain)model is investigated for medical image identification.This model achieves better performance compared to the baseline Convolutional Neural Network(CNN),having an average improvement of 4.7%on Area Under Curve(AUC)and 7%on Accuracy(ACC),respectively.Furthermore,the probability of privacy leakage can be effectively reduced by the blockchain-based parameter transfer mechanism in federated learning between local and global models. 展开更多
关键词 Blockchain technique federated learning healthcare and medical data collaboration service privacy preservation
下载PDF
An Extensive Study and Review of Privacy Preservation Models for the Multi-Institutional Data
4
作者 Sagarkumar Patel Rachna Patel +1 位作者 Ashok Akbari Srinivasa Reddy Mukkala 《Journal of Information Security》 2023年第4期343-365,共23页
The deep learning models hold considerable potential for clinical applications, but there are many challenges to successfully training deep learning models. Large-scale data collection is required, which is frequently... The deep learning models hold considerable potential for clinical applications, but there are many challenges to successfully training deep learning models. Large-scale data collection is required, which is frequently only possible through multi-institutional cooperation. Building large central repositories is one strategy for multi-institution studies. However, this is hampered by issues regarding data sharing, including patient privacy, data de-identification, regulation, intellectual property, and data storage. These difficulties have lessened the impracticality of central data storage. In this survey, we will look at 24 research publications that concentrate on machine learning approaches linked to privacy preservation techniques for multi-institutional data, highlighting the multiple shortcomings of the existing methodologies. Researching different approaches will be made simpler in this case based on a number of factors, such as performance measures, year of publication and journals, achievements of the strategies in numerical assessments, and other factors. A technique analysis that considers the benefits and drawbacks of the strategies is additionally provided. The article also looks at some potential areas for future research as well as the challenges associated with increasing the accuracy of privacy protection techniques. The comparative evaluation of the approaches offers a thorough justification for the research’s purpose. 展开更多
关键词 Privacy preservation Models Multi Institutional data Bio Technologies Clinical Trial and Pharmaceutical Industry
下载PDF
Evolutionary privacy-preserving learning strategies for edge-based IoT data sharing schemes 被引量:5
5
作者 Yizhou Shen Shigen Shen +3 位作者 Qi Li Haiping Zhou Zongda Wu Youyang Qu 《Digital Communications and Networks》 SCIE CSCD 2023年第4期906-919,共14页
The fast proliferation of edge devices for the Internet of Things(IoT)has led to massive volumes of data explosion.The generated data is collected and shared using edge-based IoT structures at a considerably high freq... The fast proliferation of edge devices for the Internet of Things(IoT)has led to massive volumes of data explosion.The generated data is collected and shared using edge-based IoT structures at a considerably high frequency.Thus,the data-sharing privacy exposure issue is increasingly intimidating when IoT devices make malicious requests for filching sensitive information from a cloud storage system through edge nodes.To address the identified issue,we present evolutionary privacy preservation learning strategies for an edge computing-based IoT data sharing scheme.In particular,we introduce evolutionary game theory and construct a payoff matrix to symbolize intercommunication between IoT devices and edge nodes,where IoT devices and edge nodes are two parties of the game.IoT devices may make malicious requests to achieve their goals of stealing privacy.Accordingly,edge nodes should deny malicious IoT device requests to prevent IoT data from being disclosed.They dynamically adjust their own strategies according to the opponent's strategy and finally maximize the payoffs.Built upon a developed application framework to illustrate the concrete data sharing architecture,a novel algorithm is proposed that can derive the optimal evolutionary learning strategy.Furthermore,we numerically simulate evolutionarily stable strategies,and the final results experimentally verify the correctness of the IoT data sharing privacy preservation scheme.Therefore,the proposed model can effectively defeat malicious invasion and protect sensitive information from leaking when IoT data is shared. 展开更多
关键词 Privacy preservation Internet of things Evolutionary game data sharing Edge computing
下载PDF
A Novel Approach to Design Distribution Preserving Framework for Big Data
6
作者 Mini Prince P.M.Joe Prathap 《Intelligent Automation & Soft Computing》 SCIE 2023年第3期2789-2803,共15页
In several fields like financial dealing,industry,business,medicine,et cetera,Big Data(BD)has been utilized extensively,which is nothing but a collection of a huge amount of data.However,it is highly complicated alon... In several fields like financial dealing,industry,business,medicine,et cetera,Big Data(BD)has been utilized extensively,which is nothing but a collection of a huge amount of data.However,it is highly complicated along with time-consuming to process a massive amount of data.Thus,to design the Distribution Preserving Framework for BD,a novel methodology has been proposed utilizing Manhattan Distance(MD)-centered Partition Around Medoid(MD–PAM)along with Conjugate Gradient Artificial Neural Network(CG-ANN),which undergoes various steps to reduce the complications of BD.Firstly,the data are processed in the pre-processing phase by mitigating the data repetition utilizing the map-reduce function;subsequently,the missing data are handled by substituting or by ignoring the missed values.After that,the data are transmuted into a normalized form.Next,to enhance the classification performance,the data’s dimensionalities are minimized by employing Gaussian Kernel(GK)-Fisher Discriminant Analysis(GK-FDA).Afterwards,the processed data is submitted to the partitioning phase after transmuting it into a structured format.In the partition phase,by utilizing the MD-PAM,the data are partitioned along with grouped into a cluster.Lastly,by employing CG-ANN,the data are classified in the classification phase so that the needed data can be effortlessly retrieved by the user.To analogize the outcomes of the CG-ANN with the prevailing methodologies,the NSL-KDD openly accessible datasets are utilized.The experiential outcomes displayed that an efficient result along with a reduced computation cost was shown by the proposed CG-ANN.The proposed work outperforms well in terms of accuracy,sensitivity and specificity than the existing systems. 展开更多
关键词 Big data artificial neural network fisher discriminant analysis distribution preserving framework manhattan distance
下载PDF
Research of Privacy Preservation Method Based on Data Coloring 被引量:1
7
作者 Bilin Shao Genqing Bian +1 位作者 Xirui Quan Zhixian Wang 《China Communications》 SCIE CSCD 2016年第10期181-197,共17页
In the cloud computing environment, outsourcing service mode of data storage causes the security problem, the reliability of data cannot be guaranteed, and the privacy preservation problem has aroused wide concern. In... In the cloud computing environment, outsourcing service mode of data storage causes the security problem, the reliability of data cannot be guaranteed, and the privacy preservation problem has aroused wide concern. In order to solve the problem of inefficiency and high-complexity caused by traditional privacy preservation methods such as data encryption and access control technology, a privacy preservation method based on data coloring is proposed. The data coloring model is established and the coloring mechanism is adopted to deal with the sensitive data of numerical attributes, and the cloud model similarity measurement based on arithmetic average least-approximability is adopted to authenticate the ownership of privacy data. On the premise of high availability of data, the method strengthens the security of the privacy information. Then, the performance, validity and the parameter errors of the algorithm are quantitatively analyzed by the experiments using the UCI dataset. Under the same conditions of privacy preservation requirements, the proposed method can track privacy leakage efficiently and reduce privacy leakage risks. Compared with the k-anonymity approach, the proposed method enhances the computational time efficiency by 18.5%. 展开更多
关键词 data coloring privacy preservation cloud model cloud similarity
下载PDF
Multi-source data-based 3D digital preservation of large scale ancient chinese architecture:A case report 被引量:1
8
作者 Xiang GAO Hainan CUI +2 位作者 Lingjie ZHU Tianxin SHI Shuhan SHEN 《Virtual Reality & Intelligent Hardware》 2019年第5期525-541,共17页
The 3D digitalization and documentation of ancient Chinese architecture is challenging because of architectural complexity and structural delicacy.To generate complete and detailed models of this architecture,it is be... The 3D digitalization and documentation of ancient Chinese architecture is challenging because of architectural complexity and structural delicacy.To generate complete and detailed models of this architecture,it is better to acquire,process,and fuse multi-source data instead of single-source data.In this paper,we describe our work on 3D digital preservation of ancient Chinese architecture based on multi source data.We first briefly introduce two surveyed ancient Chinese temples,Foguang Temple and Nanchan Temple.Then,we report the data acquisition equipment we used and the multi-source data we acquired.Finally,we provide an overview of several applications we conducted based on the acquired data,including ground and aerial image fusion,image and LiDAR(light detection and ranging)data fusion,and architectural scene surface reconstruction and semantic modeling.We believe that it is necessary to involve multi-source data for the 3D digital preservation of ancient Chinese architecture,and that the work in this paper will serve as a heuristic guideline for the related research communities. 展开更多
关键词 Ancient Chinese architecture 3D digital preservation Multi-source data acquisition Architectural scene modeling
下载PDF
An investigative report on current long-term digital preservation situation among major Chinese libraries
9
作者 ZHANG Mei LI Lin +1 位作者 ZHANG Xiaolin LIU Xiwen 《Chinese Journal of Library and Information Science》 2008年第Z1期1-15,共15页
The paper reports a survey on the attitudes,arrangements,and operational model of more than 40 major Chinese libraries(CL)on long-term digital preservation.It reveals that digital preservation becomes an urgent concer... The paper reports a survey on the attitudes,arrangements,and operational model of more than 40 major Chinese libraries(CL)on long-term digital preservation.It reveals that digital preservation becomes an urgent concern for these libraries in our survey.Most of these libraries take a pro-active approach to the issue and most of them are in favor of participation in a certain collaborative preservation system,though a few still remain in a wait-and-see posture. 展开更多
关键词 Digital resources long-term preservation LIBRARIES
下载PDF
Design of Low-Power Data Logger of Deep Sea for Long-Term Field Observation 被引量:1
10
作者 赵伟 陈鹰 +2 位作者 杨灿军 曹建伟 顾临怡 《China Ocean Engineering》 SCIE EI 2009年第1期133-144,共12页
This paper describes the implementation of a data logger for the real-time in-situ monitoring of hydrothermal systems. A compact mechanical structure ensures the security and reliability of data logger when used under... This paper describes the implementation of a data logger for the real-time in-situ monitoring of hydrothermal systems. A compact mechanical structure ensures the security and reliability of data logger when used under deep sea. The data logger is a battery powered instrument, which can connect chemical sensors (pH electrode, H2S electrode, H2 electrode) and temperature sensors. In order to achieve major energy savings, dynamic power management is implemented in hardware design and software design. The working current of the data logger in idle mode and active mode is 15 μA and 1.44 mA respectively, which greatly extends the working time of battery. The data logger has been successftdly tested in the first Sino-American Cooperative Deep Submergence Project from August 13 to September 3, 2005. 展开更多
关键词 data logger low-power design deep sea long-term monitoring
下载PDF
NLDA non-linear regression model for preserving data privacy in wireless sensor networks 被引量:1
11
作者 A.L.Sreenivasulu P.Chenna Reddy 《Digital Communications and Networks》 SCIE 2020年第1期101-107,共7页
Recently,the application of Wireless Sensor Networks(WSNs)has been increasing rapidly.It requires privacy preserving data aggregation protocols to secure the data from compromises.Preserving privacy of the sensor data... Recently,the application of Wireless Sensor Networks(WSNs)has been increasing rapidly.It requires privacy preserving data aggregation protocols to secure the data from compromises.Preserving privacy of the sensor data is a challenging task.This paper presents a non-linear regression-based data aggregation protocol for preserving privacy of the sensor data.The proposed protocol uses non-linear regression functions to represent the sensor data collected from the sensor nodes.Instead of sending the complete data to the cluster head,the sensor nodes only send the coefficients of the non-linear function.This will reduce the communication overhead of the network.The data aggregation is performed on the masked coefficients and the sink node is able to retrieve the approximated results over the aggregated data.The analysis of experiment results shows that the proposed protocol is able to minimize communication overhead,enhance data aggregation accuracy,and preserve data privacy. 展开更多
关键词 Sensor nodes data accuracy Wireless sensor networks data aggregation Privacy preserving
下载PDF
A Survey on the Privacy-Preserving Data Aggregation in Wireless Sensor Networks 被引量:4
12
作者 XU Jian YANG Geng +1 位作者 CHEN Zhengyu WANG Qianqian 《China Communications》 SCIE CSCD 2015年第5期162-180,共19页
Wireless sensor networks(WSNs)consist of a great deal of sensor nodes with limited power,computation,storage,sensing and communication capabilities.Data aggregation is a very important technique,which is designed to s... Wireless sensor networks(WSNs)consist of a great deal of sensor nodes with limited power,computation,storage,sensing and communication capabilities.Data aggregation is a very important technique,which is designed to substantially reduce the communication overhead and energy expenditure of sensor node during the process of data collection in a WSNs.However,privacy-preservation is more challenging especially in data aggregation,where the aggregators need to perform some aggregation operations on sensing data it received.We present a state-of-the art survey of privacy-preserving data aggregation in WSNs.At first,we classify the existing privacy-preserving data aggregation schemes into different categories by the core privacy-preserving techniques used in each scheme.And then compare and contrast different algorithms on the basis of performance measures such as the privacy protection ability,communication consumption,power consumption and data accuracy etc.Furthermore,based on the existing work,we also discuss a number of open issues which may intrigue the interest of researchers for future work. 展开更多
关键词 无线传感器网络 隐私保护 数据融合 传感器节点 综述 数据聚合 电力消费 通信能力
下载PDF
A Retrievable Data Perturbation Method Used in Privacy-Preserving in Cloud Computing 被引量:3
13
作者 YANG Pan 《China Communications》 SCIE CSCD 2014年第8期73-84,共12页
With the increasing popularity of cloud computing,privacy has become one of the key problem in cloud security.When data is outsourced to the cloud,for data owners,they need to ensure the security of their privacy;for ... With the increasing popularity of cloud computing,privacy has become one of the key problem in cloud security.When data is outsourced to the cloud,for data owners,they need to ensure the security of their privacy;for cloud service providers,they need some information of the data to provide high QoS services;and for authorized users,they need to access to the true value of data.The existing privacy-preserving methods can't meet all the needs of the three parties at the same time.To address this issue,we propose a retrievable data perturbation method and use it in the privacy-preserving in data outsourcing in cloud computing.Our scheme comes in four steps.Firstly,an improved random generator is proposed to generate an accurate "noise".Next,a perturbation algorithm is introduced to add noise to the original data.By doing this,the privacy information is hidden,but the mean and covariance of data which the service providers may need remain unchanged.Then,a retrieval algorithm is proposed to get the original data back from the perturbed data.Finally,we combine the retrievable perturbation with the access control process to ensure only the authorized users can retrieve the original data.The experiments show that our scheme perturbs date correctly,efficiently,and securely. 展开更多
关键词 隐私保护 扰动方法 可回收 计算 隐私安全 原始数据 检索算法 服务供应商
下载PDF
SOME SHAPE-PRESERVING QUASI-INTERPOLANTS TO NON-UNIFORMLY DISTRIBUTED DATA BY MQ-B-SPLINES 被引量:8
14
作者 ZhangWeixiang WuZongmin 《Applied Mathematics(A Journal of Chinese Universities)》 SCIE CSCD 2004年第2期191-202,共12页
Based on the definition of MQ-B-Splines,this article constructs five types of univariate quasi-interpolants to non-uniformly distributed data. The error estimates and the shape-preserving properties are shown in detai... Based on the definition of MQ-B-Splines,this article constructs five types of univariate quasi-interpolants to non-uniformly distributed data. The error estimates and the shape-preserving properties are shown in details.And examples are shown to demonstrate the capacity of the quasi-interpolants for curve representation. 展开更多
关键词 scattered data fitting QUASI-INTERPOLATION shape-preserving approximation radial basis function MQ-B-Splines.
下载PDF
Scientific Data:Preserving, Archiving and Sharing
15
作者 MENG Xianxue YANG Congke 《Journal of Northeast Agricultural University(English Edition)》 CAS 2006年第2期174-177,共4页
Scientific data refers to the data or data sets generated from scientific research process through observations, experiments, calculations and analyses. These data are fundamental components for developing new knowled... Scientific data refers to the data or data sets generated from scientific research process through observations, experiments, calculations and analyses. These data are fundamental components for developing new knowledge, advancing technological progress, and creating wealth. In recent years, scientific data has been attracting more and more attention for its preserving, archiving and sharing. 展开更多
关键词 scientific data preservING archiving and sharing
下载PDF
Attacks on Anonymization-Based Privacy-Preserving: A Survey for Data Mining and Data Publishing 被引量:1
16
作者 Abou-el-ela Abdou Hussien Nermin Hamza Hesham A. Hefny 《Journal of Information Security》 2013年第2期101-112,共12页
Data mining is the extraction of vast interesting patterns or knowledge from huge amount of data. The initial idea of privacy-preserving data mining PPDM was to extend traditional data mining techniques to work with t... Data mining is the extraction of vast interesting patterns or knowledge from huge amount of data. The initial idea of privacy-preserving data mining PPDM was to extend traditional data mining techniques to work with the data modified to mask sensitive information. The key issues were how to modify the data and how to recover the data mining result from the modified data. Privacy-preserving data mining considers the problem of running data mining algorithms on confidential data that is not supposed to be revealed even to the party running the algorithm. In contrast, privacy-preserving data publishing (PPDP) may not necessarily be tied to a specific data mining task, and the data mining task may be unknown at the time of data publishing. PPDP studies how to transform raw data into a version that is immunized against privacy attacks but that still supports effective data mining tasks. Privacy-preserving for both data mining (PPDM) and data publishing (PPDP) has become increasingly popular because it allows sharing of privacy sensitive data for analysis purposes. One well studied approach is the k-anonymity model [1] which in turn led to other models such as confidence bounding, l-diversity, t-closeness, (α,k)-anonymity, etc. In particular, all known mechanisms try to minimize information loss and such an attempt provides a loophole for attacks. The aim of this paper is to present a survey for most of the common attacks techniques for anonymization-based PPDM & PPDP and explain their effects on Data Privacy. 展开更多
关键词 Privacy K-ANONYMITY data MINING PRIVACY-preservING data PUBLISHING PRIVACY-preservING data MINING
下载PDF
Slicing-Based Enhanced Method for Privacy-Preserving in Publishing Big Data
17
作者 Mohammed BinJubier Mohd Arfian Ismail +1 位作者 Abdulghani Ali Ahmed Ali Safaa Sadiq 《Computers, Materials & Continua》 SCIE EI 2022年第8期3665-3686,共22页
Publishing big data and making it accessible to researchers is important for knowledge building as it helps in applying highly efficient methods to plan,conduct,and assess scientific research.However,publishing and pr... Publishing big data and making it accessible to researchers is important for knowledge building as it helps in applying highly efficient methods to plan,conduct,and assess scientific research.However,publishing and processing big data poses a privacy concern related to protecting individuals’sensitive information while maintaining the usability of the published data.Several anonymization methods,such as slicing and merging,have been designed as solutions to the privacy concerns for publishing big data.However,the major drawback of merging and slicing is the random permutation procedure,which does not always guarantee complete protection against attribute or membership disclosure.Moreover,merging procedures may generatemany fake tuples,leading to a loss of data utility and subsequent erroneous knowledge extraction.This study therefore proposes a slicingbased enhanced method for privacy-preserving big data publishing while maintaining the data utility.In particular,the proposed method distributes the data into horizontal and vertical partitions.The lower and upper protection levels are then used to identify the unique and identical attributes’values.The unique and identical attributes are swapped to ensure the published big data is protected from disclosure risks.The outcome of the experiments demonstrates that the proposed method could maintain data utility and provide stronger privacy preservation. 展开更多
关键词 Big data big data privacy preservation ANONYMIZATION data publishing
下载PDF
Research on Privacy Preserving Data Mining
18
作者 Pingshui Wang Tao Chen Zecheng Wang 《Journal of Information Hiding and Privacy Protection》 2019年第2期61-68,共8页
In recent years,with the explosive development in Internet,data storage and data processing technologies,privacy preservation has been one of the greater concerns in data mining.A number of methods and techniques have... In recent years,with the explosive development in Internet,data storage and data processing technologies,privacy preservation has been one of the greater concerns in data mining.A number of methods and techniques have been developed for privacy preserving data mining.This paper provided a wide survey of different privacy preserving data mining algorithms and analyzed the representative techniques for privacy preservation.The existing problems and directions for future research are also discussed. 展开更多
关键词 Privacy preserving data mining RANDOMIZATION ANONYMIZATION secure multiparty computation
下载PDF
Achieving privacy-preserving big data aggregation with fault tolerance in smart grid 被引量:1
19
作者 Zhitao Guan Guanlin Si 《Digital Communications and Networks》 SCIE 2017年第4期242-249,共8页
下载PDF
An Information-Aware Privacy-Preserving Accelerometer Data Sharing
20
作者 Mingming Lu Yihan Guo +2 位作者 Dan Meng Cuncai Li Yin Zhao 《国际计算机前沿大会会议论文集》 2017年第1期107-109,共3页
In the age of big data,plenty of valuable data have been shared to enhance scientific innovation,which,however,may disclose unexpected privacy leakage.Although numerous privacy preservation techniques have been propos... In the age of big data,plenty of valuable data have been shared to enhance scientific innovation,which,however,may disclose unexpected privacy leakage.Although numerous privacy preservation techniques have been proposed to conceal sensitive information,it is usually at the cost of the application utility reduction.In this paper,we present a data sharing scheme,which balances the application utility and privacy leakage for specific data sharing.To illustrate our scheme,smartphones’acceleration data have been adopted as an illustrative example.Experimental study has shown that sampling frequency play dominant roles in reducing privacy leakage with much less reduction on utility. 展开更多
关键词 data SHARING PRIVACY preservation Activity recognition IDENTITY PRIVACY Mutual information Visualization
下载PDF
上一页 1 2 43 下一页 到第
使用帮助 返回顶部