Project Proposal - Detecting Privacy Leakage

نویسنده

  • YounSun Cho
چکیده

The recent emergence of cloud computing has showed an enormous potential for a considerable impact on every aspect of our daily lives. This fad of technological advance, however, raises new privacy concerns which make people hesitate to adopt cloud computing. On the other hand, some new technologies give us a way to preserve privacy. Motivated by this dual role of privacy and the necessity of privacy preserving mechanism, I will investigate the problem of detecting privacy leakage in a cloud computing environment.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Proposal for the Attribution of Market Leakage to CDM Projects

Economic models suggest that in many cases, market leakage rates of greenhouse gas abatement reach the two-digit percentage range. Consequently, the Marrakesh Accords require Clean Development Mechanism (CDM) projects to account for leakage. Despite this, most project proponents neglect market leakage for their project, because the influence of an individual project on market prices seems to be...

متن کامل

Analysis, Improvement, and Simplification of Prêt à Voter with Paillier Encryption

In this paper, we analyse information leakage in Ryan’s Prêt à Voter with Paillier encryption scheme (PAVPaillier). Our analysis shows that although PAV-Paillier seems to achieve a high level of voter privacy at first glance, it might still leak voter’s choice information in some circumstances. Some threats are trivial and have appeared in the literature, but others are more complicated because...

متن کامل

On Privacy Leakage through Silence Suppression

Silence suppression, an essential feature of speech communications over the Internet, saves bandwidth by disabling voice packet transmission when silence is detected. On the other hand, silence suppression enables an adversary to recover talk patterns from packet timing. In this paper, we investigate privacy leakage through the silence suppression feature. More specifically, we propose a new cl...

متن کامل

Analyzing Tools and Algorithms for Privacy Protection and Data Security in Social Networks

The purpose of this research, is to study factors influencing privacy concerns about data security and protection on social network sites and its’ influence on self-disclosure. 100 articles about privacy protection, data security, information disclosure and Information leakage on social networks were studied. Models and algorithms types and their repetition in articles have been distinguished a...

متن کامل

A Proposal for a Privacy-preserving National Identity Card

In this paper, we propose to replace the national identity card, currently used in many countries, by a personal device that allows its user to prove some binary statements about him while minimizing personal information leakage. The privacy of the user is protected through the use of anonymous credentials that, allows him to prove binary statements about himself to another entity without havin...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010