Investigation of Network-based Approaches for Privacy
نویسندگان
چکیده
We first provide an overview of the better known network approaches for assuring anonymity and privacy over networks. We then analyze possible attacks to these network based on traffic analysis techniques and discuss their implementation and design issues for network privacy. In the conclusion we discuss the results, indicating research opportunities in this domain.
منابع مشابه
Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...
متن کاملAn Effective Method for Utility Preserving Social Network Graph Anonymization Based on Mathematical Modeling
In recent years, privacy concerns about social network graph data publishing has increased due to the widespread use of such data for research purposes. This paper addresses the problem of identity disclosure risk of a node assuming that the adversary identifies one of its immediate neighbors in the published data. The related anonymity level of a graph is formulated and a mathematical model is...
متن کاملAssessment of privacy using the meaning structure method: case of Mashhad social housings
The present study is an attempt to find out processual and functional aspects of privacy regulation in a dialectical investigation. For this purpose, 180 samples are selected from among mothers of families in Mashhad, Iran using random sampling. In this study, "meaning structure" method has been applied. Samples participated in Laddering Interview. Analyses are set in Content-Goal Table. Based ...
متن کاملRisk Analysis and Economic Load Dispatch Evaluation of Network with High Wind Power Penetration
This study based on investigation for integration wind power into conventional power system with its impact on fossil fuel generators and their generation management. Wind power as environmental friendly energy source can reduce the operational cost of the system due to considering no cost for energizing the generator in comparing with fossil fuel generators. However due to unpredictable nature...
متن کاملAnalyzing Tools and Algorithms for Privacy Protection and Data Security in Social Networks
The purpose of this research, is to study factors influencing privacy concerns about data security and protection on social network sites and its’ influence on self-disclosure. 100 articles about privacy protection, data security, information disclosure and Information leakage on social networks were studied. Models and algorithms types and their repetition in articles have been distinguished a...
متن کامل