Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








9,799 Hits in 4.9 sec

Data Security and Privacy in Cloud Computing: Concepts and Emerging Trends [article]

Rishabh Gupta, Deepika Saxena, Ashutosh Kumar Singh
2021 arXiv   pre-print
Millions of users across the world leverages data processing and sharing benefits from cloud environment. Data security and privacy are inevitable requirement of cloud environment.  ...  This paper envisages a discussion of cloud environment, its utilities, challenges, and emerging research trends confined to secure processing and sharing of data.  ...  Phong and Phuong [39] proposed two systems, namely the Server-aided Network Topology (SNT) system and the Fully-connected Network Topology (FNT) system based on the connection with SNT and FNT server  ... 
arXiv:2108.09508v1 fatcat:4g57h5g3erdf5l4nnhfvpndc3u

Table of Contents

2022 IEEE Internet of Things Journal  
Hafid 2999 Ensemble Strategy Utilizing a Broad Learning System for Indoor Fingerprint Localization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  ...  Zhang 2734 REGULAR ISSUE PAPERS Efficient and Privacy-Preserving Infection Control System for Covid-19-Like Pandemics Using Blockchain . . . . . . . . . . . . . . . . . . . . . . . . . . S. A.  ... 
doi:10.1109/jiot.2022.3145222 fatcat:nj3gbnzw6vdqfbt43goja5xcoq

Collaborative Inference for AI-Empowered IoT Devices [article]

Nir Shlezinger, Ivan V. Bajic
2022 arXiv   pre-print
Artificial intelligence (AI) technologies, and particularly deep learning systems, are traditionally the domain of large-scale cloud servers, which have access to high computational and energy resources  ...  The conventional approach to provide AI processing to data collected by edge devices involves sending samples to the cloud, at the cost of latency, communication, connectivity, and privacy concerns.  ...  Thus, sharing the data over the communication network, as done in cloud inference, does not preserve privacy.  ... 
arXiv:2207.11664v1 fatcat:fqkcbpqutrfili24slezn7uccu

Privacy Preservation in Data Centric Environment: Analysis and Segregation

Jyotir Moy Chatterjee
2017 International Journal of Engineering Research and  
Accumulation of advanced information data by different governments, corporates, and people has made expansive extension of the data and learning based on choice making.  ...  The electronic advances are picking up ubiquity every day and the same number of associations keeping up an extensive volume of information about people or different organizations under cloud computing  ...  AIDS Fever Fever Tumor AIDS Fever Fever Tumor Tumor Tumor Tumor There are still numerous open issues in private SVM order and learning.  ... 
doi:10.17577/ijertv6is050071 fatcat:t4esvrnd6rh3teq2l33g3wyg4i

An Effective and Efficient Framework for Fast Privacy-Preserving Keyword Search on Encrypted Outsourced Cloud Data

2021 Journal of Ubiquitous Systems and Pervasive Networks  
The results show the effectiveness of our privacy-preserving keyword search on encrypted outsourced data.  ...  However, sensitive data should be encrypted before storing on the cloud server to avoid privacy concerns.  ...  Privacy Preserving Our proposed scheme is designed in a way that cloud server does not learn additional information about the stored documents, search-able tree index and query but only learn about search  ... 
doi:10.5383/juspn.15.02.006 fatcat:pzc7ofi5rzd57ayvn6dnwpmcta

2020 Index IEEE Internet of Things Journal Vol. 7

2020 IEEE Internet of Things Journal  
Zheng, D., +, JIoT July 2020 6035-6045 Toward Secure and Privacy-Preserving Distributed Deep Learning in Fog-Cloud Computing.  ...  ., +, JIoT April 2020 2553-2562 Privacy-Preserving Federated Learning in Fog Computing.  ...  ., +, JIoT Jan. 2020 33-52 Laser radar New Frontiers in IoT: Networking, Systems, Reliability, and Security Challenges.  ... 
doi:10.1109/jiot.2020.3046055 fatcat:wpyblbhkrbcyxpnajhiz5pj74a

MSCryptoNet: Multi-Scheme privacy-preserving deep learning in cloud computing

Owusu-Agyemeng Kwabena, Zhen Qin, Tianming Zhuang, Zhiguang Qin
2019 IEEE Access  
We also prove that the MSCryptoNet as a privacy-preserving deep learning scheme over the aggregated encrypted data is secured.  ...  Privacy in the Internet of Things is a fundamental challenge for the Ubiquitous healthcare systems that depend on the data aggregated and collaborative deep learning among different parties.  ...  PRIVACY-PRESERVING DEEP LEARNING With the advancement in cloud computing, there has been numerous existing works considering the problems confronting the security of the cloud architecture [36] , [37  ... 
doi:10.1109/access.2019.2901219 fatcat:gjlplklyfvgofkxlubd6crvgua

Trustworthy AI Inference Systems: An Industry Research View [article]

Rosario Cammarota, Matthias Schunter, Anand Rajan, Fabian Boemer, Ágnes Kiss, Amos Treiber, Christian Weinert, Thomas Schneider, Emmanuel Stapf, Ahmad-Reza Sadeghi, Daniel Demmler, Joshua Stock (+17 others)
2023 arXiv   pre-print
Additionally, such systems should also use Privacy-Enhancing Technologies (PETs) to protect customers' data at any time.  ...  Such systems provide customers with timely, informed, and customized inferences to aid their decision, while at the same time utilizing appropriate security protection mechanisms for AI models.  ...  of the AI system components and to ensure privacy preserving requirements are met [119, 132] .  ... 
arXiv:2008.04449v2 fatcat:q7ojrec62jd5laeyx2pczq3y5q

Federated Learning and Its Role in the Privacy Preservation of IoT Devices

Tanweer Alam, Ruchi Gupta
2022 Future Internet  
Compared with other review articles, our goal is to provide a more comprehensive explanation of the best procedure systems and authentic FL software to enable scientists to create the best privacy preservation  ...  As researchers in the field promote ML configurations containing a large amount of private data, systems and infrastructure must be developed to improve the effectiveness of advanced learning systems.  ...  Our research aims to investigate FL data privacy characteristics, which may aid in explaining the relationship between collective AI models and the privacy-preserving vision [23] .  ... 
doi:10.3390/fi14090246 fatcat:gf6h3rry7ncylopuohhrbge6te

Koi: A Location-Privacy Platform for Smartphone Apps

Saikat Guha, Mudit Jain, Venkata N. Padmanabhan
2012 Symposium on Networked Systems Design and Implementation  
Koi's privacy-preserving protocol prevents the cloud service from tracking users.  ...  Our Koi platform, comprising a privacy-preserving matching service in the cloud and a phone-based agent, realizes this primitive across multiple phone and browser platforms.  ...  Privacy-Preserving Matching Service The operation of the Koi cloud service is best illustrated through an example.  ... 
dblp:conf/nsdi/GuhaJP12 fatcat:7iguou7l55b6be2l3i5ioen5vu

Recent trends towards privacy‐preservation in Internet of Things, its challenges and future directions

Mahdi Safaei Yaraziz, Ahmad Jalili, Mehdi Gheisari, Yang Liu
2022 Zenodo  
It means privacy-preserving is necessary for the operation of systems.  ...  Privacy preservation in cloud environments (internal layers) includes two aspects: data processing security and data storage security (Database).  ...  Machine learning for diagnosis and therapy raises concerns about data privacy.  ... 
doi:10.5281/zenodo.7503222 fatcat:schwtuw535h2zjfkqhhzdlbjxi

Encrypted Big Data with Data Deduplication in Cloud

Priyanka G., B. M.
2017 International Journal of Computer Applications  
Cloud computing is a service by re-arranging resources in the Internet. Cloud service is popular for data storage. The data holder's privacy is the data stored in cloud and in the encrypted form.  ...  In this paper, the characterization issue over encoded information in system concentrates on fathoming. System proposes a safe k-NN classifier over scrambled information in the cloud.  ...  System proposed an efficient and flexible protocol, called EFPA, for privacy-preserving association rule mining in cloud.  ... 
doi:10.5120/ijca2017915414 fatcat:apg2vybogbbrtb4zail3l4gzz4

Digital Forensics Challenges in Cyberspace: Overcoming Legitimacy and Privacy Issues Through Modularisation

Moses Ashawa, Ali Mansour, Jackie Riley, Jude Osamor, Nsikak Pius Owoh
2023 Cloud Computing and Data Science  
As investigators analyse digital evidence to unearth crucial information, they must also traverse an intricate network of privacy rules and regulations.  ...  The significance of the cloud environment is growing in the current digital world.  ...  The modular system can also perform cloud and singlehost system searches for evidence filtering and reporting, aiding investigators in searching for anonymous data sources related to the case, such as  ... 
doi:10.37256/ccds.5120233845 fatcat:han66h333vhfxho2srfdl2adde

Smart Speakers, the Next Frontier in Computational Health [article]

Jacob Sunshine
2021 arXiv   pre-print
Each of these different modalities have specific clinical use cases, all of which need to be balanced against potential privacy concerns, equity related to system access and regulatory frameworks which  ...  There are 3 broad mechanisms for how a smart speaker can interact with a person to improve health.  ...  The increasing computational horsepower of embedded platforms coupled with advances in machine learning have enabled on-device capabilities that removes the need to transmit audio to the cloud.  ... 
arXiv:2103.04209v1 fatcat:jabbnxt43zds5pwloppsfwkal4

Deep Learning and Fog Computing: A Review

Shavan Askar, Zhala Jameel Hamad, Shahab Wahhab Kareem
2021 Zenodo  
Fog computing (FC) is a new architecture that aims to reduce network pressures throughout the core network as well as the cloud computing (CC) by bringing resource-intensive functions like computation,  ...  In their operations, FC systems can make use of intelligence features to reap the benefits of data that is readily accessible with computing resources to be able to resolve the problem of excessive energy  ...  ., 2019) showed that to prevent bottlenecks in Cloud-based architectures, a Fog-embedded privacy-preserving DL (FPPDL) architecture is proposed.  ... 
doi:10.5281/zenodo.5222646 fatcat:wevh4azi6za2hh74g2c66icaye
« Previous Showing results 1 — 15 out of 9,799 results