The Personal Information Protection Law,as the first law on personal information protection in China,hits the people’s most concerned,realistic and direct privacy and information security issues,and plays an extremel...The Personal Information Protection Law,as the first law on personal information protection in China,hits the people’s most concerned,realistic and direct privacy and information security issues,and plays an extremely important role in promoting the development of the digital economy,the legalization of socialism with Chinese characteristics and social public security,and marks a new historical development stage in the protection of personal information in China.However,the awareness of privacy protection and privacy protection behavior of the public in personal information privacy protection is weak.Based on the literature review and in-depth understanding of current legal regulations,this study integrates the relevant literature and theoretical knowledge of the Personal Protection Law to construct a conceptual model of“privacy information protection willingness-privacy information protection behavior”.Taking the residents of Foshan City as an example,this paper conducts a questionnaire survey on their attitudes toward the Personal Protection Law,analyzes the factors influencing their willingness to protect their privacy and their behaviors,and explores the mechanisms of their influencing variables,to provide advice and suggestions for promoting the protection of privacy information and building a security barrier for the high-quality development of public information security.展开更多
With the rapid development of the Internet of Things(IoT),Location-Based Services(LBS)are becoming more and more popular.However,for the users being served,how to protect their location privacy has become a growing co...With the rapid development of the Internet of Things(IoT),Location-Based Services(LBS)are becoming more and more popular.However,for the users being served,how to protect their location privacy has become a growing concern.This has led to great difficulty in establishing trust between the users and the service providers,hindering the development of LBS for more comprehensive functions.In this paper,we first establish a strong identity verification mechanism to ensure the authentication security of the system and then design a new location privacy protection mechanism based on the privacy proximity test problem.This mechanism not only guarantees the confidentiality of the user s information during the subsequent information interaction and dynamic data transmission,but also meets the service provider's requirements for related data.展开更多
With the rapid development of computer technology, cloud-based services have become a hot topic. They not only provide users with convenience, but also bring many security issues, such as data sharing and privacy issu...With the rapid development of computer technology, cloud-based services have become a hot topic. They not only provide users with convenience, but also bring many security issues, such as data sharing and privacy issue. In this paper, we present an access control system with privilege separation based on privacy protection(PS-ACS). In the PS-ACS scheme, we divide users into private domain(PRD) and public domain(PUD) logically. In PRD, to achieve read access permission and write access permission, we adopt the Key-Aggregate Encryption(KAE) and the Improved Attribute-based Signature(IABS) respectively. In PUD, we construct a new multi-authority ciphertext policy attribute-based encryption(CP-ABE) scheme with efficient decryption to avoid the issues of single point of failure and complicated key distribution, and design an efficient attribute revocation method for it. The analysis and simulation result show that our scheme is feasible and superior to protect users' privacy in cloud-based services.展开更多
Service-Oriented Architecture (SOA) is a computer systems design concept which aims to achieve reusability and integration in a distributed environment through the use of autonomous, loosely coupled, interoperable abs...Service-Oriented Architecture (SOA) is a computer systems design concept which aims to achieve reusability and integration in a distributed environment through the use of autonomous, loosely coupled, interoperable abstractions known as services. In order to interoperate, communication between services is very important due to their autonomous nature. This communication provides services with their functional strengths, but also creates the opportunity for the loss of privacy. In this paper, a Privacy Protection Framework for Service-Oriented Architecture (PPFSOA) is described. In this framework, a Privacy Service (PS) is used in combination with privacy policies to create privacy contracts that outline what can and cannot be done with a consumer’s personally identifiable information (PII). The privacy policy consists of one-to-many privacy rules, with each rule created from a set of six privacy elements: collector, what, purpose, retention, recipient and trust. The PS acts as an intermediary between the service consumer and service provider, to establish an unbiased contract before the two parties begin sending PII. It is shown how many Privacy Services work together to form the privacy protection framework. An examination of what current approaches to protecting privacy in an SOA environment is also presented. Finally, the operations the PS must perform in order to fulfill its tasks are outlined.展开更多
When the user getting location based services by the traditional technology,his location information of region is always be exposed.However,in modern mobile networks,even the current geographical region is a part of p...When the user getting location based services by the traditional technology,his location information of region is always be exposed.However,in modern mobile networks,even the current geographical region is a part of privacy information.To solve this problem,a new generalized k-anonymity location privacy protection scheme in location based services(LPPS-GKA)with the third trust servicer is proposed.And it can guarantee the users get good location-based services(LBS)without leaking the information of the geo-location region,which has protected the perfect privacy.Analysis shows that LPPS-GKA is more secure in protecting location privacy,including region information,and is more efficient than other similar schemes in computational and communicational aspects.It is suitable for dynamic environment for different user’s various privacy protection requests.展开更多
With the massive increase of digital resource based on the network,it becomes very important that how to help readers acquire the information needed according to the individualized requirement and interest in an accur...With the massive increase of digital resource based on the network,it becomes very important that how to help readers acquire the information needed according to the individualized requirement and interest in an accurate,convenient and prompt method. Therefore,it is very urgent to investigate individualized information service of library. In this paper,based on the development of the individualized information service for the reader in the college library,the individualized information service is clarified by using three perspectives,including establishment of individualized information demand model,integration of internal and external resource and protection of the reader privacy. Finally,the corresponding strategy and related measure are presented.展开更多
COVID-19 has swept the whole our country and the world in the beginning of 2020.31 provinces and municipalities across the country have launched the first-level response to major public health emergencies since Januar...COVID-19 has swept the whole our country and the world in the beginning of 2020.31 provinces and municipalities across the country have launched the first-level response to major public health emergencies since January 24,and China has carried out intensive epidemic control.It is critical for effectively responding to COVID-19 to collect,collate and analyze people’s personal data.What’s more,obtaining identity information,travel records and health information of confirmed cases,suspected cases and close contacts has become a crucial step in epidemic investigation.All regions have made full use of big data to carry out personnel screening,travel records analysis and other related work in epidemic prevention and control,effectively improving the efficiency of epidemic prevention and control.However,data leakage,personnel privacy data exposure,and personal attack frequently occurred in the process of personnel travel records analysis and epidemic prevention and control.It even happened in the WeChat group to forward a person’s name,phone number,address,ID number and other sensitive information.It brought discrimination,telephone and SMS harassment to the parties,which caused great harm to individuals.Based on these,lack of information security and data security awareness and other issues were exposed.Therefore,while big data has been widely concerned and applied,attention should be paid to protecting personal privacy.It is urgent to pay more attention to data privacy and information security in order to effectively protect the legitimate rights of the people.Therefore,measures can be taken to achieve this goal,such as improving the relevant legal system,strengthening technical means to enhance the supervision and management of information security and data protection.展开更多
<strong>Background:</strong> Multicentric prospective cohort investigation survey conducted between 1<sup>st</sup> of March and 1<sup>st</sup> of April 2021on SARS-CoV-2 occupationa...<strong>Background:</strong> Multicentric prospective cohort investigation survey conducted between 1<sup>st</sup> of March and 1<sup>st</sup> of April 2021on SARS-CoV-2 occupational risk for German Emergency Medical Services (EMS) personnel. <strong>Study Objectives: Primary:</strong> The objective is to take stock of the use and availability of Personal Protective Equipment (PPE) in German EMS, both at managerial and employee level, during the SARS-CoV-2 pandemic. <strong>Secondary:</strong> Generate additional data on individual perceptions of risk of infection and occurrence of infections at respective places of service. <strong>Methods:</strong> Multicentric prospective cohort investigation survey conducted online at two levels of German EMS personnel—EMS managers and EMS employees, both medical and paramedical—with questions adapted slightly to fit the respective study population. <strong>Results:</strong> A total of 34 responses were received in the managerial group;a total of 2389 responses were received in the group of employees. Self-reported PPE adherence of EMS employees for confirmed SARS-CoV-2 positive patients: use of gloves (99.8%), FFP2 or FFP3 masks (99.8%), gowns or coveralls (99.1%), goggles (89.7%), face shields (24.0%), surgical masks (0.0%). Self-reported PPE adherence of EMS employees for suspected SARS-CoV-2 positive patients: gloves (98.8%), FFP2 or FFP3 masks (total: 99.4%), gowns or coveralls (total: 95.9%), goggles (85.6%), face shields (19.2%), surgical masks (0.2%). <strong>Conclusions:</strong> Findings included an overall improved self-reported adherence to PPE compared to studies that were conducted before the pandemic. Self-reported general adherence to PPE recommendations when attending to confirmed SARS-CoV-2 positive patients was good, with the exception of goggles. Self-reported adherence to PPE recommendations dropped when attending to suspected SARS-CoV-2 positive patients.展开更多
Casper Cloak is a privacy protection method based on K-anonymity algorithm. To be anonymous, Casper Cloak needs to search regional sibling and parent node, which requires a complex process and huge expenditure. In add...Casper Cloak is a privacy protection method based on K-anonymity algorithm. To be anonymous, Casper Cloak needs to search regional sibling and parent node, which requires a complex process and huge expenditure. In addition,the anonymous area has space redundancy and it is not accurate enough to achieve high Location-Based Services (LBS) quality. To address these problems,this paper proposes an improved privacy protection method-NCC, based on the Casper Cloak. To reduce the unnecessary search, NCC introduced the concept of the first sibling node. NCC also improves the LBS quality by considering the characteristics of user mobility. Moreover, the improved method,NCC, which is incorporated with a redundancy optimization processing strategy,realizing more precise in the anonymous area and accurately guaranteeing the related degree of privacy. Adopting NCC verification experiments reflects varied advantages as bellow: (1) By reducing 80% searching time, NCC highly improved searching process. (2) The anonymous area produced in NCC not only meet users' anonymous demands, but the direction of the mobility which improves 4 times accuracy of services in comparison with Casper mode.(3) According to optimization strategy, NCC can reach minimum anonymous area index, increasing the rates of anonymous optimization in original algorithm.展开更多
Background: The fatality of adverse drug reactions (ADR) has become one of the major causes of the non-natural disease deaths globally, with the issue of drug safety emerging as a common topic of concern. Objective: T...Background: The fatality of adverse drug reactions (ADR) has become one of the major causes of the non-natural disease deaths globally, with the issue of drug safety emerging as a common topic of concern. Objective: The personalized ADR early warning method, based on contextual ontology and rule learning, proposed in this study aims to provide a reference method for personalized health and medical information services. Methods: First, the patient data is formalized, and the user contextual ontology is constructed, reflecting the characteristics of the patient population. The concept of ontology rule learning is then proposed, which is to mine the rules contained in the data set through machine learning to improve the efficiency and scientificity of ontology rule generation. Based on the contextual ontology of ADR, the high-level context information is identified and predicted by means of reasoning, so the occurrence of the specific adverse reaction in patients from different populations is extracted. Results: Finally, using diabetes drugs as an example, contextual information is identified and predicted through reasoning, to mine the occurrence of specific adverse reactions in different patient populations, and realize personalized medication decision-making and early warning of ADR.展开更多
文摘The Personal Information Protection Law,as the first law on personal information protection in China,hits the people’s most concerned,realistic and direct privacy and information security issues,and plays an extremely important role in promoting the development of the digital economy,the legalization of socialism with Chinese characteristics and social public security,and marks a new historical development stage in the protection of personal information in China.However,the awareness of privacy protection and privacy protection behavior of the public in personal information privacy protection is weak.Based on the literature review and in-depth understanding of current legal regulations,this study integrates the relevant literature and theoretical knowledge of the Personal Protection Law to construct a conceptual model of“privacy information protection willingness-privacy information protection behavior”.Taking the residents of Foshan City as an example,this paper conducts a questionnaire survey on their attitudes toward the Personal Protection Law,analyzes the factors influencing their willingness to protect their privacy and their behaviors,and explores the mechanisms of their influencing variables,to provide advice and suggestions for promoting the protection of privacy information and building a security barrier for the high-quality development of public information security.
基金This work has been partly supported by the National Natural Science Foundation of China under Grant No.61702212the Fundamental Research Funds for the Central Universities under Grand NO.CCNU19TS017.
文摘With the rapid development of the Internet of Things(IoT),Location-Based Services(LBS)are becoming more and more popular.However,for the users being served,how to protect their location privacy has become a growing concern.This has led to great difficulty in establishing trust between the users and the service providers,hindering the development of LBS for more comprehensive functions.In this paper,we first establish a strong identity verification mechanism to ensure the authentication security of the system and then design a new location privacy protection mechanism based on the privacy proximity test problem.This mechanism not only guarantees the confidentiality of the user s information during the subsequent information interaction and dynamic data transmission,but also meets the service provider's requirements for related data.
基金financially supported by the National Natural Science Foundation of China(No.61303216,No.61272457,No.U1401251,and No.61373172)the National High Technology Research and Development Program of China(863 Program)(No.2012AA013102)National 111 Program of China B16037 and B08038
文摘With the rapid development of computer technology, cloud-based services have become a hot topic. They not only provide users with convenience, but also bring many security issues, such as data sharing and privacy issue. In this paper, we present an access control system with privilege separation based on privacy protection(PS-ACS). In the PS-ACS scheme, we divide users into private domain(PRD) and public domain(PUD) logically. In PRD, to achieve read access permission and write access permission, we adopt the Key-Aggregate Encryption(KAE) and the Improved Attribute-based Signature(IABS) respectively. In PUD, we construct a new multi-authority ciphertext policy attribute-based encryption(CP-ABE) scheme with efficient decryption to avoid the issues of single point of failure and complicated key distribution, and design an efficient attribute revocation method for it. The analysis and simulation result show that our scheme is feasible and superior to protect users' privacy in cloud-based services.
文摘Service-Oriented Architecture (SOA) is a computer systems design concept which aims to achieve reusability and integration in a distributed environment through the use of autonomous, loosely coupled, interoperable abstractions known as services. In order to interoperate, communication between services is very important due to their autonomous nature. This communication provides services with their functional strengths, but also creates the opportunity for the loss of privacy. In this paper, a Privacy Protection Framework for Service-Oriented Architecture (PPFSOA) is described. In this framework, a Privacy Service (PS) is used in combination with privacy policies to create privacy contracts that outline what can and cannot be done with a consumer’s personally identifiable information (PII). The privacy policy consists of one-to-many privacy rules, with each rule created from a set of six privacy elements: collector, what, purpose, retention, recipient and trust. The PS acts as an intermediary between the service consumer and service provider, to establish an unbiased contract before the two parties begin sending PII. It is shown how many Privacy Services work together to form the privacy protection framework. An examination of what current approaches to protecting privacy in an SOA environment is also presented. Finally, the operations the PS must perform in order to fulfill its tasks are outlined.
基金This work was supported in part by the National Natural Science Foundation of China(Nos.61272492 and 61572521),Shaanxi Province Natural Science Foundation of China(No.2015JM6353)and the Basic Foundation of Engineering University of CAPF(No.WJY201521).
文摘When the user getting location based services by the traditional technology,his location information of region is always be exposed.However,in modern mobile networks,even the current geographical region is a part of privacy information.To solve this problem,a new generalized k-anonymity location privacy protection scheme in location based services(LPPS-GKA)with the third trust servicer is proposed.And it can guarantee the users get good location-based services(LBS)without leaking the information of the geo-location region,which has protected the perfect privacy.Analysis shows that LPPS-GKA is more secure in protecting location privacy,including region information,and is more efficient than other similar schemes in computational and communicational aspects.It is suitable for dynamic environment for different user’s various privacy protection requests.
文摘With the massive increase of digital resource based on the network,it becomes very important that how to help readers acquire the information needed according to the individualized requirement and interest in an accurate,convenient and prompt method. Therefore,it is very urgent to investigate individualized information service of library. In this paper,based on the development of the individualized information service for the reader in the college library,the individualized information service is clarified by using three perspectives,including establishment of individualized information demand model,integration of internal and external resource and protection of the reader privacy. Finally,the corresponding strategy and related measure are presented.
基金This paper is support by:In 2019,Liaoning Provincial Department of Education Project named“Study on the Path Selection of Rural Revitalization in Ethnic Autonomous Areas of Liaoning Province”The 3rd Azure Talent Project of Dalian Ocean University in 2018+1 种基金In 2019,Liaoning Province’s overseas training project“China-Canada Cooperation Research Plan on Marine Law and Policy”(2019GJWYB019)The Ministry of Education filed the 2017 National and Regional Research Center Project“Northeast Asia Research Center for Marine Law and Policy”(GQ17091).
文摘COVID-19 has swept the whole our country and the world in the beginning of 2020.31 provinces and municipalities across the country have launched the first-level response to major public health emergencies since January 24,and China has carried out intensive epidemic control.It is critical for effectively responding to COVID-19 to collect,collate and analyze people’s personal data.What’s more,obtaining identity information,travel records and health information of confirmed cases,suspected cases and close contacts has become a crucial step in epidemic investigation.All regions have made full use of big data to carry out personnel screening,travel records analysis and other related work in epidemic prevention and control,effectively improving the efficiency of epidemic prevention and control.However,data leakage,personnel privacy data exposure,and personal attack frequently occurred in the process of personnel travel records analysis and epidemic prevention and control.It even happened in the WeChat group to forward a person’s name,phone number,address,ID number and other sensitive information.It brought discrimination,telephone and SMS harassment to the parties,which caused great harm to individuals.Based on these,lack of information security and data security awareness and other issues were exposed.Therefore,while big data has been widely concerned and applied,attention should be paid to protecting personal privacy.It is urgent to pay more attention to data privacy and information security in order to effectively protect the legitimate rights of the people.Therefore,measures can be taken to achieve this goal,such as improving the relevant legal system,strengthening technical means to enhance the supervision and management of information security and data protection.
文摘<strong>Background:</strong> Multicentric prospective cohort investigation survey conducted between 1<sup>st</sup> of March and 1<sup>st</sup> of April 2021on SARS-CoV-2 occupational risk for German Emergency Medical Services (EMS) personnel. <strong>Study Objectives: Primary:</strong> The objective is to take stock of the use and availability of Personal Protective Equipment (PPE) in German EMS, both at managerial and employee level, during the SARS-CoV-2 pandemic. <strong>Secondary:</strong> Generate additional data on individual perceptions of risk of infection and occurrence of infections at respective places of service. <strong>Methods:</strong> Multicentric prospective cohort investigation survey conducted online at two levels of German EMS personnel—EMS managers and EMS employees, both medical and paramedical—with questions adapted slightly to fit the respective study population. <strong>Results:</strong> A total of 34 responses were received in the managerial group;a total of 2389 responses were received in the group of employees. Self-reported PPE adherence of EMS employees for confirmed SARS-CoV-2 positive patients: use of gloves (99.8%), FFP2 or FFP3 masks (99.8%), gowns or coveralls (99.1%), goggles (89.7%), face shields (24.0%), surgical masks (0.0%). Self-reported PPE adherence of EMS employees for suspected SARS-CoV-2 positive patients: gloves (98.8%), FFP2 or FFP3 masks (total: 99.4%), gowns or coveralls (total: 95.9%), goggles (85.6%), face shields (19.2%), surgical masks (0.2%). <strong>Conclusions:</strong> Findings included an overall improved self-reported adherence to PPE compared to studies that were conducted before the pandemic. Self-reported general adherence to PPE recommendations when attending to confirmed SARS-CoV-2 positive patients was good, with the exception of goggles. Self-reported adherence to PPE recommendations dropped when attending to suspected SARS-CoV-2 positive patients.
文摘Casper Cloak is a privacy protection method based on K-anonymity algorithm. To be anonymous, Casper Cloak needs to search regional sibling and parent node, which requires a complex process and huge expenditure. In addition,the anonymous area has space redundancy and it is not accurate enough to achieve high Location-Based Services (LBS) quality. To address these problems,this paper proposes an improved privacy protection method-NCC, based on the Casper Cloak. To reduce the unnecessary search, NCC introduced the concept of the first sibling node. NCC also improves the LBS quality by considering the characteristics of user mobility. Moreover, the improved method,NCC, which is incorporated with a redundancy optimization processing strategy,realizing more precise in the anonymous area and accurately guaranteeing the related degree of privacy. Adopting NCC verification experiments reflects varied advantages as bellow: (1) By reducing 80% searching time, NCC highly improved searching process. (2) The anonymous area produced in NCC not only meet users' anonymous demands, but the direction of the mobility which improves 4 times accuracy of services in comparison with Casper mode.(3) According to optimization strategy, NCC can reach minimum anonymous area index, increasing the rates of anonymous optimization in original algorithm.
文摘Background: The fatality of adverse drug reactions (ADR) has become one of the major causes of the non-natural disease deaths globally, with the issue of drug safety emerging as a common topic of concern. Objective: The personalized ADR early warning method, based on contextual ontology and rule learning, proposed in this study aims to provide a reference method for personalized health and medical information services. Methods: First, the patient data is formalized, and the user contextual ontology is constructed, reflecting the characteristics of the patient population. The concept of ontology rule learning is then proposed, which is to mine the rules contained in the data set through machine learning to improve the efficiency and scientificity of ontology rule generation. Based on the contextual ontology of ADR, the high-level context information is identified and predicted by means of reasoning, so the occurrence of the specific adverse reaction in patients from different populations is extracted. Results: Finally, using diabetes drugs as an example, contextual information is identified and predicted through reasoning, to mine the occurrence of specific adverse reactions in different patient populations, and realize personalized medication decision-making and early warning of ADR.