Local privacy protection classification based on human-centric computing

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Medical privacy protection based on granular computing

Based on granular computing methodology, we propose two criteria to quantitatively measure privacy invasion. The total cost criterion measures the effort needed for a data recipient to find private information. The average benefit criterion measures the benefit a data recipient obtains when he received the released data. These two criteria remedy the inadequacy of the deterministic privacy form...

متن کامل

Privacy Protection Based on Oblivious Transfer in Content-Centric Networking

We present the method of user privacy protection in Content-Centric Networking (CCN) based on Oblivious Transfer (OT). Content-Centric Networking (CCN) is new network architecture to match the modern Internet usage by switching host-to-host model to content based model. Although the caching mechanism in CCN has made full use of bandwidth resource, there are certain risks that critical user data...

متن کامل

A Threshold-based Model for Privacy Protection in Cloud Computing

Privacy for cloud computing has become an important issue in recent years. In this paper, we propose a threshold-based model for privacy protection in cloud computing with a particular (n +1, t +1) secret sharing scheme which is bases on the matrix and vector. We show how our (n +1, t +1) secret sharing scheme can be applied to protect privacy. First, we assign each row of the matrix as a key o...

متن کامل

Trust Based Privacy Protection Method in Pervasive Computing

In pervasive computing environments, resources and services are usually provided by a variety of different suppliers with multiple computing devices and from heterogeneous networks. Accordingly, various privacy protection methods with lots of privacy policies were used. Before some meaningful interaction starts or services offers, a certain level of trust must be established, this trust establi...

متن کامل

User-Centric Protection and Privacy in Smart Surveillance Systems

During the last decades surveillance systems developed from analog one camera one monitor systems to highly complex distributed systems with heterogeneous sensors that can handle surveillance tasks autonomously. With raising power and complexity, ensuring privacy became a key challenge. An event-driven SOA architecture that follows the privacy by design principle is a promising approach to real...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Human-centric Computing and Information Sciences

سال: 2019

ISSN: 2192-1962

DOI: 10.1186/s13673-019-0195-4