A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Hierarchical Model for Preserving Privacy in Vertically Partitioned Distributed Databases
2013
International Journal of Computer Applications
Here we are proposed a novel method to provide privacy to the data if the data is vertically partitioned and distributed over sites. ...
The major advantage of proposed method is to reduce transmission load and to provide privacy using multidimensional distributed method that is similar to the most popular method Mondrian multidimensional ...
Privacy preserving data publishing for a single database has been extensively used in recent years. To provide privacy for a single database, various methods were proposed. ...
doi:10.5120/12341-8618
fatcat:77mcqcxvcnhx7ip3mowr5brlxy
Privacy-Preserving Computation with Trusted Computing via Scramble-then-Compute
2017
Proceedings on Privacy Enhancing Technologies
Simply ensuring that the data remains encrypted outside the trusted computing environment is insufficient to preserve data privacy, for data movement observed during computation could leak information. ...
We consider privacy-preserving computation of big data using trusted computing primitives with limited private memory. ...
The results indicate relatively low overheads over the baseline system that is less secure, and run-ning time speedup of up to 4.1× over data-oblivious alternatives with a similar level of privacy protection ...
doi:10.1515/popets-2017-0026
dblp:journals/popets/DangDCO17
fatcat:25kvpphyyjgolcsv5refjcp5y4
AMPPERE: A Universal Abstract Machine for Privacy-Preserving Entity Resolution Evaluation
[article]
2021
arXiv
pre-print
Specifically, we show that two parties can perform entity resolution over their data, without leaking sensitive information. ...
The AMPPERE system demonstrates the efficacy of privacy-preserving entity resolution for real-world data while providing a precise characterization of the induced cost of preventing information leakage ...
Privacy preservation adds significant challenges and computational overhead in solving ER as the data must be obfuscated to preserve privacy, making similarity comparisons difficult and costly. ...
arXiv:2108.09879v1
fatcat:twsrvccqsjhzxltu7o5kmsq5n4
Anonymization Privacy Security and Preserving Similarity Joins for Secured Data
2018
International Journal for Research in Applied Science and Engineering Technology
This project proposed a paper approach to share accommodating -specific lengthwise data that offers booming confidentiality guarantees, while preserving data utility for many biomedical investigations. ...
Privacy Preserving Similarity IV. CONCLUSION This work was motivated by the growing need to disseminate data specify long term data in a privacy-preserving manner. ...
Elmehdwi, Bharath K et al [3] describe a novel SkNN protocol to facilitate the k-nearest neighbor search over encrypted data in the cloud that preserves both the data privacy and query privacy. ...
doi:10.22214/ijraset.2018.4211
fatcat:vpw6hwp6nzd2xkzxxxw3k2hlqm
SPHN/PHRT - MedCo in Action: Empowering the Swiss Molecular Tumor Board with Privacy-Preserving and Real-Time Patient Discovery
2020
Studies in Health Technology and Informatics
MedCo is the first operational system that makes sensitive medical-data available for research in a simple, privacy-conscious and secure way. ...
It enables a consortium of clinical sites to collectively protect their data and to securely share them with investigators, without single points of failure. ...
To securely identify similar patients, MedCo will perform an encrypted search over all the oncology patients whose data is stored encrypted in the MedCo databases that are distributed across the five Swiss ...
doi:10.3233/shti200345
pmid:32570563
fatcat:reyg746l7feltb63xfsqsfr2u4
Toward privacy-assured and searchable cloud data storage services
2013
IEEE Network
effectively support flexible data utilization services such as search over the data in a privacy-preserving manner. ...
Thus, enabling similarity searches over encrypted graphs is another important functionality for outsourced graph-structured data. ...
doi:10.1109/mnet.2013.6574666
fatcat:mq2f4esfizemrkopan34m247ua
Two Round Searchable Encrypted Data using Multi-Keywords for Cloud Computing
IJARCCE - Computer and Communication Engineering
2015
IJARCCE
IJARCCE - Computer and Communication Engineering
Searchable Symmetric Encryption (SSE) use to secure and retrieve data from the cloud and it also focus on addressing data privacy issues. ...
We observe that server side ranking based on Order Preserving Encryption (OPE) certainly leaks data privacy.OPE use Boolean search technique. ...
We, thus, perform the first attempt to formulate the privacy issue in searchable encryption, and we show server-side ranking based on order-preserving encryption (OPE) inevitably violates data privacy. ...
doi:10.17148/ijarcce.2015.4338
fatcat:3yvwu7kjmvhslfjyazho4lof6q
A Privacy-preserving Community-based P2P OSNs Using Broadcast Encryption Supporting Recommendation Mechanism
[article]
2017
arXiv
pre-print
In this paper, we propose a novel scheme called a Privacy-preserving Community-based P2P OSNs Using Broadcast Encryption Supporting Recommendation Mechanism (PCBE) that supports cross-platform availability ...
We formulate the security requirements and design goals for privacy- preserving P2P based OSNs supporting recommendation mechanism. ...
Security Requirements For the first time, we formally define the security requirements in privacy-preserving P2P OSNs supporting recommendation mechanism as follows: Data privacy: encryption algorithms ...
arXiv:1706.01324v1
fatcat:i42ooltchrgo5gpsuxibvfylsq
Privacy Preserving Data Mining: A Comprehensive Survey
2017
International Journal of Computer Applications
Privacy preservation is classified into many categories like data modification, data distribution, data hiding and data encryption. ...
At last, most advanced, functional encryption concept in privacy preservation have been included. Functional encryption provides higher level of security as well as privacy to data. ...
PRIVACY PRESERVATION IN DISTRIBUTED DATA MINING Distributed data mining permits distributed sites owning individual datasets to perform mining by joining their data. ...
doi:10.5120/ijca2017913220
fatcat:spmy7qzntraebplqhpra33noiy
Privacy preservation for V2G networks in smart grid: A survey
2016
Computer Communications
, identification privacy, concealed data aggregation, privacy-preserving billing and payment, and privacy-preserving data publication. ...
In this paper, we will analyze and summarize privacy preservation approaches which achieve various privacy preservation goals. ...
Many other similar protests have taken place all over the world, including Canada, Germany, and other European Union countries [16] . ...
doi:10.1016/j.comcom.2016.06.006
fatcat:dsyptr4dyvdahadwhh2htll6zi
An Efficient Privacy-preserving Deep Learning Scheme for Medical Image Analysis
2020
Journal of Information Technology Management
Data providers morph the images without privacy information using image morphing component. ...
The performance of MpLe is compared with similar works such as GAZELLE and MiniONN and found that the MpLe attracts very less computational and data transmission overhead. ...
Homomorphic encryption system allows the RF to be trained on encrypted data thus it preserves the privacy of the data owners. ...
doi:10.22059/jitm.2020.79191
doaj:9a2565b20f8740b98d10c745c9cae1c9
fatcat:fqbifqdmeze7vgn35wj3clngde
Towards Practical Privacy-Preserving Collaborative Machine Learning at a Scale
2020
2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S)
In this paper, we present our approach to address this problem through PrivML, a framework for end-to-end outsourced privacy-preserving data classification over encrypted data. ...
Later on, we want to investigate the possibility of implementing poisoning detection mechanisms that operates over protected model updates via privacy-preservation mechanisms such as homomorphic encryption ...
doi:10.1109/dsn-s50200.2020.00037
dblp:conf/dsn/Talbi20
fatcat:m32g3oqhg5bvtdnz25erssfrey
cSELENE: Privacy Preserving Query Retrieval System on Heterogeneous Cloud Data
[article]
2018
arXiv
pre-print
Modeling is the Preserving Privacy Stage I, since by modeling the data is being symbolized. We implement encryption on the database as preserving privacy Stage II. ...
In this paper we discuss preserving-privacy system and threat model, the format of federated data, the parallel programming (GPU programming and shared/memory systems), the parallel and secure algorithm ...
Here we proposed efficient method, c-ParMDL, for processing k nearest neighbor for a specific user that made the query at the first place with privacy preserving parallel MDL model of database over encrypted ...
arXiv:1805.01275v1
fatcat:j5b3567ys5c3vmbzzk5udtr2vu
Privacy-Preserving Cloud Computing: Ecosystem, Life Cycle, Layered Architecture and Future Roadmap
[article]
2022
arXiv
pre-print
Likewise, privacy in cloud computing is important because it ensures that the integrity of data stored on the cloud maintains intact. ...
Privacy-Preserving Cloud Computing is an emerging technology with many applications in various fields. ...
Privacy-Preserving Task
Privacy-Preserving Search: • Keyword Search Many approaches towards searching over encrypted data are only able to perform exact searches, as per [277] . ...
arXiv:2204.11120v1
fatcat:tx75pckegjgqxg6tiibptiazbi
Safe Multi Keyword Ranked Search over Encrypted Cloud Data
2016
Communications on Applied Electronics
In subsisting system, for the first instance, the conundrum of privacypreserving multi-keyword ranked search over encrypted data in cloud computing (MRSE) is define and solve. ...
privacy requirements in two different models. ...
Verifiable Privacy Preserving Multi-keyword Text Search in cloud supporting similarity-Based Ranking, Wenhai Sun et al [2] , Secure Ranked Keyword Search over Encrypted Cloud Data, C. ...
doi:10.5120/cae2016652309
fatcat:6qedcs36xfaldae2gf37nk252u
« Previous
Showing results 1 — 15 out of 10,270 results