High Performance Privacy Protection Hardware

نویسندگان

  • Rhonda Chaytor
  • Paul Gillard
  • Todd Wareham
چکیده

As more and more person-specific data like health information becomes available, increasing attention is being paid to confidentiality and privacy protection. One proposed measure of confidentiality is k-anonymity, where a dataset is k-anonymous if each record is identical to at least (k-1) others in the dataset. All known algorithms for k-anonymization or even checking the degree of k-anonymity of a dataset are too expensive in both running time and memory accesses required for terabyte-sized datasets. In this paper, we present a novel solution that uses both algorithm parallelism and reconfigurable hardware to achieve acceptable performance on both counts.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analyzing Tools and Algorithms for Privacy Protection and Data Security in Social Networks

The purpose of this research, is to study factors influencing privacy concerns about data security and protection on social network sites and its’ influence on self-disclosure. 100 articles about privacy protection, data security, information disclosure and Information leakage on social networks were studied. Models and algorithms types and their repetition in articles have been distinguished a...

متن کامل

MARP: Mobile Agent for RFID Privacy Protection

Recently many researchers in various fields has noticed RFID system. RFID system has many advantages more than other automatic identification system. However, it has some consumer privacy problems, such as location tracking and disclosure of personal information. Most of related works have focused on the cryptographic scheme for the RFID tag and the reader. In this paper, a proxy agent scheme u...

متن کامل

Supporting flexible streaming media protection through privacy-aware secure processors

Due to the explosion of Internet technology in the last decade, there is an increasing demand for secure and effective streaming media protection (SMP) in the new computing environment. Since end users usually have the full control of their machines, pure software based approaches such as user/password validation and group key based content encryption, are not sufficient to defend many attacks,...

متن کامل

Advanced Technologies Driving “ Dynamic Collaboration ” — Featuring Hardware Platforms

Introduction to Special Issue on Advanced Technologies Driving “Dynamic Collaboration” — Featuring Hardware Platforms By Kazuhiko KOBAYASHI* As hardware platforms to support “Dynamic Collaboration” age, NEC provides computer products into which we have greatly invested the world’s highest standards of technologies acquired from experience with mainframes and supercomputers, as well as storage p...

متن کامل

ASEV - Automatic situation assessment for event-driven video analysis

Many complex maneuvers involving aircraft, vehicles and persons are carried out at airport aprons. Manual video surveillance used for safety and security purposes is inefficient and privacy protection must be guaranteed. In this paper, we propose a system named ASEV that automatically assesses situations for airport surveillance. It combines four main components: a low-level image processing un...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007