High Performance Privacy Protection Hardware
نویسندگان
چکیده
As more and more person-specific data like health information becomes available, increasing attention is being paid to confidentiality and privacy protection. One proposed measure of confidentiality is k-anonymity, where a dataset is k-anonymous if each record is identical to at least (k-1) others in the dataset. All known algorithms for k-anonymization or even checking the degree of k-anonymity of a dataset are too expensive in both running time and memory accesses required for terabyte-sized datasets. In this paper, we present a novel solution that uses both algorithm parallelism and reconfigurable hardware to achieve acceptable performance on both counts.
منابع مشابه
Analyzing Tools and Algorithms for Privacy Protection and Data Security in Social Networks
The purpose of this research, is to study factors influencing privacy concerns about data security and protection on social network sites and its’ influence on self-disclosure. 100 articles about privacy protection, data security, information disclosure and Information leakage on social networks were studied. Models and algorithms types and their repetition in articles have been distinguished a...
متن کاملMARP: Mobile Agent for RFID Privacy Protection
Recently many researchers in various fields has noticed RFID system. RFID system has many advantages more than other automatic identification system. However, it has some consumer privacy problems, such as location tracking and disclosure of personal information. Most of related works have focused on the cryptographic scheme for the RFID tag and the reader. In this paper, a proxy agent scheme u...
متن کاملSupporting flexible streaming media protection through privacy-aware secure processors
Due to the explosion of Internet technology in the last decade, there is an increasing demand for secure and effective streaming media protection (SMP) in the new computing environment. Since end users usually have the full control of their machines, pure software based approaches such as user/password validation and group key based content encryption, are not sufficient to defend many attacks,...
متن کاملAdvanced Technologies Driving “ Dynamic Collaboration ” — Featuring Hardware Platforms
Introduction to Special Issue on Advanced Technologies Driving “Dynamic Collaboration” — Featuring Hardware Platforms By Kazuhiko KOBAYASHI* As hardware platforms to support “Dynamic Collaboration” age, NEC provides computer products into which we have greatly invested the world’s highest standards of technologies acquired from experience with mainframes and supercomputers, as well as storage p...
متن کاملASEV - Automatic situation assessment for event-driven video analysis
Many complex maneuvers involving aircraft, vehicles and persons are carried out at airport aprons. Manual video surveillance used for safety and security purposes is inefficient and privacy protection must be guaranteed. In this paper, we propose a system named ASEV that automatically assesses situations for airport surveillance. It combines four main components: a low-level image processing un...
متن کامل