Privacy Preserving and Incentive Compatible Protocols for Cooperation in Distributed Computations
نویسندگان
چکیده
PRIVACY PRESERVING AND INCENTIVE COMPATIBLE PROTOCOLS FOR COOPERATION IN DISTRIBUTED COMPUTATIONS
منابع مشابه
Effective Incentive Compatible Model for Privacy Preservation of Information in Secure Data Sharing and Publishing
Privacy preserving is one of the most important research topics in the data security field and it has become a serious concern in the secure transformation of personal data in recent years. For example, different credit card companies and disease control centers may try to build better data sharing or publishing models for privacy protection through privacy preserving data mining techniques (PP...
متن کاملA Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications
Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...
متن کاملPrivacy-Preserving Data Mining in Presence of Covert Adversaries
Disclosure of the original data sets is not acceptable due to privacy concerns in many distributed data mining settings. To address such concerns, privacy-preserving data mining has been an active research area in recent years. All the recent works on privacy-preserving data mining have considered either semi-honest or malicious adversarial models, whereby an adversary is assumed to follow or a...
متن کاملThird Party Privacy Preserving Protocol for Perturbation Based Classification of Vertically Fragmented Data Bases
Privacy is become major issue in distributed data mining. In the literature we can found many proposals of privacy preserving which can be divided into two major categories that is trusted third party and multiparty based privacy protocols. In case of trusted third party models the conventional asymmetric cryptographic based techniques will be used and in case of multi party based protocols dat...
متن کاملThird Party Privacy Preserving Protocol for Secure Web Services
Web services is become major issue in distributed data mining. In the literature we can found a number of proposals of privacy preserving which can be divided into two major categories that is trusted third party and multiparty based privacy protocols. In case of the trusted third party privacy protocol models the conventional asymmetric cryptographic based techniques or algorithms will be used...
متن کامل