Trajectory data privacy protection based on differential privacy mechanism
نویسندگان
چکیده
منابع مشابه
User Privacy Protection from Trajectory Perspective in Location-based Applications
Under the help of information and communication technologies, our lives are becoming better than ever in such a way we have been spending. One of popular and worthy supports comes from mobile devices. Integrated with modern positioning-aware technologies like Assisted Global Positioning System (A-GPS), mobile devices nowadays can locate users’ position with acceptable accuracy. However, privacy...
متن کاملAnalyzing Tools and Algorithms for Privacy Protection and Data Security in Social Networks
The purpose of this research, is to study factors influencing privacy concerns about data security and protection on social network sites and its’ influence on self-disclosure. 100 articles about privacy protection, data security, information disclosure and Information leakage on social networks were studied. Models and algorithms types and their repetition in articles have been distinguished a...
متن کاملData Anonymization for Privacy Protection
Social networks have become the universal consumer phenomena and have emerged with increasing popularity nowadays. The amount of network data grows enormously due to the increase of networking websites. The development of social networks has led to the increasing demand for the protection of privacy in publishing the social network data as the social network sites are accumulated with large amo...
متن کاملPrivacy - DRM : Data Protection by Copy Protection ?
Protecting media contents and enforcing privacy policies seem to be related problems: mechanisms are needed to restrict data processing outside the copyright holder’s, respectively data subject’s, domain of control. A systematic analysis of requirements, properties, and experiences with digital rights management (DRM) reveals substantial differences between Content-DRM to protect media contents...
متن کاملPrivacy Protection Data Access Control
For some purposes, such as benefits, requirement-fitted services and management, enterprises regularly ask customers, employees, and business partner to provide relevance data including sensitive personal information. However, transparent information bring the infringement of privacy and threats of living security to the data providers. Recently, enterprises have suffered from the loss of poten...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IOP Conference Series: Materials Science and Engineering
سال: 2018
ISSN: 1757-8981,1757-899X
DOI: 10.1088/1757-899x/351/1/012017