PPM: Privacy Protection Method for Outsourcing Data Entry
نویسندگان
چکیده
منابع مشابه
Analyzing Tools and Algorithms for Privacy Protection and Data Security in Social Networks
The purpose of this research, is to study factors influencing privacy concerns about data security and protection on social network sites and its’ influence on self-disclosure. 100 articles about privacy protection, data security, information disclosure and Information leakage on social networks were studied. Models and algorithms types and their repetition in articles have been distinguished a...
متن کاملSelective data outsourcing for enforcing privacy
Existing approaches for protecting sensitive information outsourced at external “honest-but-curious” servers are typically based on an overlying layer of encryption applied to the whole database, or on the combined use of fragmentation and encryption. In this paper, we put forward a novel paradigm for preserving privacy in data outsourcing, which departs from encryption. The basic idea is to in...
متن کاملData Anonymization for Privacy Protection
Social networks have become the universal consumer phenomena and have emerged with increasing popularity nowadays. The amount of network data grows enormously due to the increase of networking websites. The development of social networks has led to the increasing demand for the protection of privacy in publishing the social network data as the social network sites are accumulated with large amo...
متن کاملA User Privacy Protection Technique for Executing SQL over Encrypted Data in Database Outsourcing Service
The fact that the data owners outsource their data to external service providers introduces many security and privacy issues. Among them, the most significant research questions relate to data confidentiality and user privacy. Encryption was regarded as a solution for data confidentiality. The privacy of a user is characterized by the query he poses to the server and its result. We explore the ...
متن کاملPrivacy enhanced data outsourcing in the cloud
How to secure outsourcing data in cloud computing is a challenging problem, since a cloud environment cannot been considered to be trusted. The situation becomes even more challenging when outsourced data sources in a cloud environment are managed by multiple outsourcers who hold different access rights. In this paper, we introduce an efficient and novel tree-based key management scheme that al...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2019
ISSN: 2169-3536
DOI: 10.1109/access.2019.2902011