نتایج جستجو برای: privacy preservation
تعداد نتایج: 116916 فیلتر نتایج به سال:
The disclosure of sensitive information has become prominent nowadays; privacy preservation has become a research hotspot in the field of data security. Among all the algorithms of privacy preservation in data mining, K-anonymity is a kind of common and valid algorithm in privacy preservation, which can effectively prevent the loss of sensitive information under linking attacks, and it is widel...
As a serious concern in data publishing and analysis, privacy preserving data processing has received a lot of attention. Privacy preservation often leads to information loss. Consequently, we want to minimize utility loss as long as the privacy is preserved. In this chapter, we survey the utility-based privacy preservation methods systematically. We first briefly discuss the privacy models and...
Vehicle to grid (V2G) network is a crucial part of smart grid. An electric vehicle (EV) in a V2G network uses electricity instead of gasoline, and this benefits the environment and helps mitigate the energy crisis. By using its battery capacity, the vehicle can serve temporarily as a distributed energy storage system to mitigate peak load of the power grid. However, the two-way communication an...
Social networks have received dramatic interest in research and development. In this chapter, we survey the very recent research development on privacy-preserving publishing of graphs and social network data. We categorize the state-of-the-art anonymization methods on simple graphs in three main categories: K-anonymity based privacy preservation via edge modification, probabilistic privacy pres...
Privacy preservation is a crucial issue for smart grid security. With more and more group applications, data and appliances proliferated in smart grid, electricity customers are faced with extended privacy risks. Meanwhile, the natures of smart grid—such as limitation in computation power of smart meters, requirement to be highly reliable, and transformation from a private system to an open one...
Sensitive records stored in the cloud such as healthcare records, private conversation and credit card information are targets of hackers privacy abuse. Current record management systems have difficulties achieving protection sensitive a secure, transparent, decentralized trustless environment. The Blockchain technology is nascent promising that facilitates data sharing access enables use smart...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید