نتایج جستجو برای: privacy preservation
تعداد نتایج: 116916 فیلتر نتایج به سال:
Privacy preservation in data mining demands protecting both input and output privacy. The former refers to sanitizing the raw data itself before performing mining. The latter refers to preventing the mining output (model/pattern) from malicious pattern-based inference attacks. The preservation of input privacy does not necessarily lead to that of output privacy. This work studies the problem of...
We introduce the novel concept of coprivacy or co-operative privacy to make privacy preservation attractive. A protocol is coprivate if the best option for a player to preserve her privacy is to help another player in preserving his privacy. Coprivacy makes an individual’s privacy preservation a goal that rationally interests other individuals: it is a matter of helping oneself by helping someo...
Data stream can be conceived as a continuous and changing sequence of data that continuously arrive at a system to store or process. Examples of data streams include computer network traffic, phone conversations, web searches and sensor data etc. These data sets need to be analyzed for identifying trends and patterns, which help us in isolating anomalies and predicting future behavior. However,...
In emerging information networks, having a privacy preserving index (or PPI) is critically important for locating information of interest for data sharing across autonomous providers while preserving privacy. An understudied problem for PPI techniques is how to provide controllable privacy preservation, given the innate difference of privacy concerns regarding different data owners. In this pap...
This paper represents a review of privacy preserving techniques in wireless sensor network. Wireless sensor networks are not secure. To preserve privacy of wireless sensor network various techniques are discovered. A lot of work has been done to address challenges faced to preserve privacy of wireless sensor network. In this paper we represent a research on privacy preserving techniques used in...
Blockchain and smart contracts have seen significant application over the last decade, revolutionising many industries, including cryptocurrency, finance banking, supply chain management. In cases, however, transparency provided potentially comes at cost of privacy. does potential uses to increase privacy-preservation. This paper outlines current state privacy preservation utilising Smart Contr...
This paper discusses the techniques that support the extraction, sharing, and utilization of knowledge for collaborative problem solving applications. A system framework is proposed for secure knowledge management, called PPKM, which in addition to provide standard security mechanisms such as access control, will possess crucial feature, namely privacy-preservation, where privacy-preservation m...
Personalized Web Search (PWS) is a search technique for providing better search results, viewing user history, and has been enticing much responsiveness recently. However, effective personalized search requires gathering and accumulating user data, which often raise severe concerns of privacy intrusion for many users. These concerns have become one of the key barriers for organizing personalize...
Current research in location-based services (LBSs) highlights the importance of cryptographic primitives in privacy preservation for LBSs, and presents solutions that attempt to support the (apparently) mutually exclusive requirements for access control and context privacy (i.e., identity and/or location), while at the same time adopting more conservative assumptions in order to reduce or compl...
A Dynamic Cloud with Data Privacy Preservation
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید