Local privacy protection classification based on human-centric computing
نویسندگان
چکیده
منابع مشابه
Medical privacy protection based on granular computing
Based on granular computing methodology, we propose two criteria to quantitatively measure privacy invasion. The total cost criterion measures the effort needed for a data recipient to find private information. The average benefit criterion measures the benefit a data recipient obtains when he received the released data. These two criteria remedy the inadequacy of the deterministic privacy form...
متن کاملPrivacy Protection Based on Oblivious Transfer in Content-Centric Networking
We present the method of user privacy protection in Content-Centric Networking (CCN) based on Oblivious Transfer (OT). Content-Centric Networking (CCN) is new network architecture to match the modern Internet usage by switching host-to-host model to content based model. Although the caching mechanism in CCN has made full use of bandwidth resource, there are certain risks that critical user data...
متن کاملA Threshold-based Model for Privacy Protection in Cloud Computing
Privacy for cloud computing has become an important issue in recent years. In this paper, we propose a threshold-based model for privacy protection in cloud computing with a particular (n +1, t +1) secret sharing scheme which is bases on the matrix and vector. We show how our (n +1, t +1) secret sharing scheme can be applied to protect privacy. First, we assign each row of the matrix as a key o...
متن کاملTrust Based Privacy Protection Method in Pervasive Computing
In pervasive computing environments, resources and services are usually provided by a variety of different suppliers with multiple computing devices and from heterogeneous networks. Accordingly, various privacy protection methods with lots of privacy policies were used. Before some meaningful interaction starts or services offers, a certain level of trust must be established, this trust establi...
متن کاملUser-Centric Protection and Privacy in Smart Surveillance Systems
During the last decades surveillance systems developed from analog one camera one monitor systems to highly complex distributed systems with heterogeneous sensors that can handle surveillance tasks autonomously. With raising power and complexity, ensuring privacy became a key challenge. An event-driven SOA architecture that follows the privacy by design principle is a promising approach to real...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Human-centric Computing and Information Sciences
سال: 2019
ISSN: 2192-1962
DOI: 10.1186/s13673-019-0195-4