A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Data Security and Privacy in Cloud Computing: Concepts and Emerging Trends
[article]
2021
arXiv
pre-print
Millions of users across the world leverages data processing and sharing benefits from cloud environment. Data security and privacy are inevitable requirement of cloud environment. ...
This paper envisages a discussion of cloud environment, its utilities, challenges, and emerging research trends confined to secure processing and sharing of data. ...
Phong and Phuong [39] proposed two systems, namely the Server-aided Network Topology (SNT) system and the Fully-connected Network Topology (FNT) system based on the connection with SNT and FNT server ...
arXiv:2108.09508v1
fatcat:4g57h5g3erdf5l4nnhfvpndc3u
Table of Contents
2022
IEEE Internet of Things Journal
Hafid 2999 Ensemble Strategy Utilizing a Broad Learning System for Indoor Fingerprint Localization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...
Zhang 2734 REGULAR ISSUE PAPERS Efficient and Privacy-Preserving Infection Control System for Covid-19-Like Pandemics Using Blockchain . . . . . . . . . . . . . . . . . . . . . . . . . . S. A. ...
doi:10.1109/jiot.2022.3145222
fatcat:nj3gbnzw6vdqfbt43goja5xcoq
Collaborative Inference for AI-Empowered IoT Devices
[article]
2022
arXiv
pre-print
Artificial intelligence (AI) technologies, and particularly deep learning systems, are traditionally the domain of large-scale cloud servers, which have access to high computational and energy resources ...
The conventional approach to provide AI processing to data collected by edge devices involves sending samples to the cloud, at the cost of latency, communication, connectivity, and privacy concerns. ...
Thus, sharing the data over the communication network, as done in cloud inference, does not preserve privacy. ...
arXiv:2207.11664v1
fatcat:fqkcbpqutrfili24slezn7uccu
Privacy Preservation in Data Centric Environment: Analysis and Segregation
2017
International Journal of Engineering Research and
Accumulation of advanced information data by different governments, corporates, and people has made expansive extension of the data and learning based on choice making. ...
The electronic advances are picking up ubiquity every day and the same number of associations keeping up an extensive volume of information about people or different organizations under cloud computing ...
AIDS
Fever
Fever
Tumor
AIDS
Fever
Fever
Tumor
Tumor
Tumor
Tumor
There are still numerous open issues in private SVM order and learning. ...
doi:10.17577/ijertv6is050071
fatcat:t4esvrnd6rh3teq2l33g3wyg4i
An Effective and Efficient Framework for Fast Privacy-Preserving Keyword Search on Encrypted Outsourced Cloud Data
2021
Journal of Ubiquitous Systems and Pervasive Networks
The results show the effectiveness of our privacy-preserving keyword search on encrypted outsourced data. ...
However, sensitive data should be encrypted before storing on the cloud server to avoid privacy concerns. ...
Privacy Preserving Our proposed scheme is designed in a way that cloud server does not learn additional information about the stored documents, search-able tree index and query but only learn about search ...
doi:10.5383/juspn.15.02.006
fatcat:pzc7ofi5rzd57ayvn6dnwpmcta
2020 Index IEEE Internet of Things Journal Vol. 7
2020
IEEE Internet of Things Journal
Zheng, D., +, JIoT July 2020 6035-6045 Toward Secure and Privacy-Preserving Distributed Deep Learning in Fog-Cloud Computing. ...
., +, JIoT April 2020 2553-2562 Privacy-Preserving Federated Learning in Fog Computing. ...
., +, JIoT Jan. 2020 33-52 Laser radar New Frontiers in IoT: Networking, Systems, Reliability, and Security Challenges. ...
doi:10.1109/jiot.2020.3046055
fatcat:wpyblbhkrbcyxpnajhiz5pj74a
MSCryptoNet: Multi-Scheme privacy-preserving deep learning in cloud computing
2019
IEEE Access
We also prove that the MSCryptoNet as a privacy-preserving deep learning scheme over the aggregated encrypted data is secured. ...
Privacy in the Internet of Things is a fundamental challenge for the Ubiquitous healthcare systems that depend on the data aggregated and collaborative deep learning among different parties. ...
PRIVACY-PRESERVING DEEP LEARNING With the advancement in cloud computing, there has been numerous existing works considering the problems confronting the security of the cloud architecture [36] , [37 ...
doi:10.1109/access.2019.2901219
fatcat:gjlplklyfvgofkxlubd6crvgua
Trustworthy AI Inference Systems: An Industry Research View
[article]
2023
arXiv
pre-print
Additionally, such systems should also use Privacy-Enhancing Technologies (PETs) to protect customers' data at any time. ...
Such systems provide customers with timely, informed, and customized inferences to aid their decision, while at the same time utilizing appropriate security protection mechanisms for AI models. ...
of the AI system components and to ensure privacy preserving requirements are met [119, 132] . ...
arXiv:2008.04449v2
fatcat:q7ojrec62jd5laeyx2pczq3y5q
Federated Learning and Its Role in the Privacy Preservation of IoT Devices
2022
Future Internet
Compared with other review articles, our goal is to provide a more comprehensive explanation of the best procedure systems and authentic FL software to enable scientists to create the best privacy preservation ...
As researchers in the field promote ML configurations containing a large amount of private data, systems and infrastructure must be developed to improve the effectiveness of advanced learning systems. ...
Our research aims to investigate FL data privacy characteristics, which may aid in explaining the relationship between collective AI models and the privacy-preserving vision [23] . ...
doi:10.3390/fi14090246
fatcat:gf6h3rry7ncylopuohhrbge6te
Koi: A Location-Privacy Platform for Smartphone Apps
2012
Symposium on Networked Systems Design and Implementation
Koi's privacy-preserving protocol prevents the cloud service from tracking users. ...
Our Koi platform, comprising a privacy-preserving matching service in the cloud and a phone-based agent, realizes this primitive across multiple phone and browser platforms. ...
Privacy-Preserving Matching Service The operation of the Koi cloud service is best illustrated through an example. ...
dblp:conf/nsdi/GuhaJP12
fatcat:7iguou7l55b6be2l3i5ioen5vu
Recent trends towards privacy‐preservation in Internet of Things, its challenges and future directions
2022
Zenodo
It means privacy-preserving is necessary for the operation of systems. ...
Privacy preservation in cloud environments (internal layers) includes two aspects: data processing security and data storage security (Database). ...
Machine learning for diagnosis and therapy raises concerns about data privacy. ...
doi:10.5281/zenodo.7503222
fatcat:schwtuw535h2zjfkqhhzdlbjxi
Encrypted Big Data with Data Deduplication in Cloud
2017
International Journal of Computer Applications
Cloud computing is a service by re-arranging resources in the Internet. Cloud service is popular for data storage. The data holder's privacy is the data stored in cloud and in the encrypted form. ...
In this paper, the characterization issue over encoded information in system concentrates on fathoming. System proposes a safe k-NN classifier over scrambled information in the cloud. ...
System proposed an efficient and flexible protocol, called EFPA, for privacy-preserving association rule mining in cloud. ...
doi:10.5120/ijca2017915414
fatcat:apg2vybogbbrtb4zail3l4gzz4
Digital Forensics Challenges in Cyberspace: Overcoming Legitimacy and Privacy Issues Through Modularisation
2023
Cloud Computing and Data Science
As investigators analyse digital evidence to unearth crucial information, they must also traverse an intricate network of privacy rules and regulations. ...
The significance of the cloud environment is growing in the current digital world. ...
The modular system can also perform cloud and singlehost system searches for evidence filtering and reporting, aiding investigators in searching for anonymous data sources related to the case, such as ...
doi:10.37256/ccds.5120233845
fatcat:han66h333vhfxho2srfdl2adde
Smart Speakers, the Next Frontier in Computational Health
[article]
2021
arXiv
pre-print
Each of these different modalities have specific clinical use cases, all of which need to be balanced against potential privacy concerns, equity related to system access and regulatory frameworks which ...
There are 3 broad mechanisms for how a smart speaker can interact with a person to improve health. ...
The increasing computational horsepower of embedded platforms coupled with advances in machine learning have enabled on-device capabilities that removes the need to transmit audio to the cloud. ...
arXiv:2103.04209v1
fatcat:jabbnxt43zds5pwloppsfwkal4
Deep Learning and Fog Computing: A Review
2021
Zenodo
Fog computing (FC) is a new architecture that aims to reduce network pressures throughout the core network as well as the cloud computing (CC) by bringing resource-intensive functions like computation, ...
In their operations, FC systems can make use of intelligence features to reap the benefits of data that is readily accessible with computing resources to be able to resolve the problem of excessive energy ...
., 2019) showed that to prevent bottlenecks in Cloud-based architectures, a Fog-embedded privacy-preserving DL (FPPDL) architecture is proposed. ...
doi:10.5281/zenodo.5222646
fatcat:wevh4azi6za2hh74g2c66icaye
« Previous
Showing results 1 — 15 out of 9,799 results