Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








10,270 Hits in 6.0 sec

Hierarchical Model for Preserving Privacy in Vertically Partitioned Distributed Databases

Rayudu Srinivas, A. Sri Rama Chandra
2013 International Journal of Computer Applications  
Here we are proposed a novel method to provide privacy to the data if the data is vertically partitioned and distributed over sites.  ...  The major advantage of proposed method is to reduce transmission load and to provide privacy using multidimensional distributed method that is similar to the most popular method Mondrian multidimensional  ...  Privacy preserving data publishing for a single database has been extensively used in recent years. To provide privacy for a single database, various methods were proposed.  ... 
doi:10.5120/12341-8618 fatcat:77mcqcxvcnhx7ip3mowr5brlxy

Privacy-Preserving Computation with Trusted Computing via Scramble-then-Compute

Hung Dang, Tien Tuan Anh Dinh, Ee-Chien Chang, Beng Chin Ooi
2017 Proceedings on Privacy Enhancing Technologies  
Simply ensuring that the data remains encrypted outside the trusted computing environment is insufficient to preserve data privacy, for data movement observed during computation could leak information.  ...  We consider privacy-preserving computation of big data using trusted computing primitives with limited private memory.  ...  The results indicate relatively low overheads over the baseline system that is less secure, and run-ning time speedup of up to 4.1× over data-oblivious alternatives with a similar level of privacy protection  ... 
doi:10.1515/popets-2017-0026 dblp:journals/popets/DangDCO17 fatcat:25kvpphyyjgolcsv5refjcp5y4

AMPPERE: A Universal Abstract Machine for Privacy-Preserving Entity Resolution Evaluation [article]

Yixiang Yao, Tanmay Ghai, Srivatsan Ravi, Pedro Szekely
2021 arXiv   pre-print
Specifically, we show that two parties can perform entity resolution over their data, without leaking sensitive information.  ...  The AMPPERE system demonstrates the efficacy of privacy-preserving entity resolution for real-world data while providing a precise characterization of the induced cost of preventing information leakage  ...  Privacy preservation adds significant challenges and computational overhead in solving ER as the data must be obfuscated to preserve privacy, making similarity comparisons difficult and costly.  ... 
arXiv:2108.09879v1 fatcat:twsrvccqsjhzxltu7o5kmsq5n4

Anonymization Privacy Security and Preserving Similarity Joins for Secured Data

Ms. S. Deepa
2018 International Journal for Research in Applied Science and Engineering Technology  
This project proposed a paper approach to share accommodating -specific lengthwise data that offers booming confidentiality guarantees, while preserving data utility for many biomedical investigations.  ...  Privacy Preserving Similarity IV. CONCLUSION This work was motivated by the growing need to disseminate data specify long term data in a privacy-preserving manner.  ...  Elmehdwi, Bharath K et al [3] describe a novel SkNN protocol to facilitate the k-nearest neighbor search over encrypted data in the cloud that preserves both the data privacy and query privacy.  ... 
doi:10.22214/ijraset.2018.4211 fatcat:vpw6hwp6nzd2xkzxxxw3k2hlqm

SPHN/PHRT - MedCo in Action: Empowering the Swiss Molecular Tumor Board with Privacy-Preserving and Real-Time Patient Discovery

Jean Louis Raisaro, Juan Ramòn Troncoso-Pastoriza, Sylvain Pradervand, Michel Cuendet, Mickael Misbach, Joao Sa, Francesco Marino, Nicolas Freundler, Nicolas Rosat, David Cavin, Alexander Leichtle, Jacques Fellay (+2 others)
2020 Studies in Health Technology and Informatics  
MedCo is the first operational system that makes sensitive medical-data available for research in a simple, privacy-conscious and secure way.  ...  It enables a consortium of clinical sites to collectively protect their data and to securely share them with investigators, without single points of failure.  ...  To securely identify similar patients, MedCo will perform an encrypted search over all the oncology patients whose data is stored encrypted in the MedCo databases that are distributed across the five Swiss  ... 
doi:10.3233/shti200345 pmid:32570563 fatcat:reyg746l7feltb63xfsqsfr2u4

Toward privacy-assured and searchable cloud data storage services

Ming Li, Shucheng Yu, Kui Ren, Wenjing Lou, Y. T. Hou
2013 IEEE Network  
effectively support flexible data utilization services such as search over the data in a privacy-preserving manner.  ...  Thus, enabling similarity searches over encrypted graphs is another important functionality for outsourced graph-structured data.  ... 
doi:10.1109/mnet.2013.6574666 fatcat:mq2f4esfizemrkopan34m247ua

Two Round Searchable Encrypted Data using Multi-Keywords for Cloud Computing
IJARCCE - Computer and Communication Engineering

Mr. H.D. Gadade, Miss.Pranita U. Shinganwade, Miss. Punam S. Wanare, Miss. Vibha Badhe
2015 IJARCCE  
Searchable Symmetric Encryption (SSE) use to secure and retrieve data from the cloud and it also focus on addressing data privacy issues.  ...  We observe that server side ranking based on Order Preserving Encryption (OPE) certainly leaks data privacy.OPE use Boolean search technique.  ...  We, thus, perform the first attempt to formulate the privacy issue in searchable encryption, and we show server-side ranking based on order-preserving encryption (OPE) inevitably violates data privacy.  ... 
doi:10.17148/ijarcce.2015.4338 fatcat:3yvwu7kjmvhslfjyazho4lof6q

A Privacy-preserving Community-based P2P OSNs Using Broadcast Encryption Supporting Recommendation Mechanism [article]

Ruihui Zhao, Mingjie Ding, Keiichi Koyanagi, Yuanliang Sun, Liang Zhou
2017 arXiv   pre-print
In this paper, we propose a novel scheme called a Privacy-preserving Community-based P2P OSNs Using Broadcast Encryption Supporting Recommendation Mechanism (PCBE) that supports cross-platform availability  ...  We formulate the security requirements and design goals for privacy- preserving P2P based OSNs supporting recommendation mechanism.  ...  Security Requirements For the first time, we formally define the security requirements in privacy-preserving P2P OSNs supporting recommendation mechanism as follows:  Data privacy: encryption algorithms  ... 
arXiv:1706.01324v1 fatcat:i42ooltchrgo5gpsuxibvfylsq

Privacy Preserving Data Mining: A Comprehensive Survey

Ritika Lohiya, Ankita Mandowara, Rushabh Raolji
2017 International Journal of Computer Applications  
Privacy preservation is classified into many categories like data modification, data distribution, data hiding and data encryption.  ...  At last, most advanced, functional encryption concept in privacy preservation have been included. Functional encryption provides higher level of security as well as privacy to data.  ...  PRIVACY PRESERVATION IN DISTRIBUTED DATA MINING Distributed data mining permits distributed sites owning individual datasets to perform mining by joining their data.  ... 
doi:10.5120/ijca2017913220 fatcat:spmy7qzntraebplqhpra33noiy

Privacy preservation for V2G networks in smart grid: A survey

Wenlin Han, Yang Xiao
2016 Computer Communications  
, identification privacy, concealed data aggregation, privacy-preserving billing and payment, and privacy-preserving data publication.  ...  In this paper, we will analyze and summarize privacy preservation approaches which achieve various privacy preservation goals.  ...  Many other similar protests have taken place all over the world, including Canada, Germany, and other European Union countries [16] .  ... 
doi:10.1016/j.comcom.2016.06.006 fatcat:dsyptr4dyvdahadwhh2htll6zi

An Efficient Privacy-preserving Deep Learning Scheme for Medical Image Analysis

J. Andrew Onesimu, J Karthikeyan
2020 Journal of Information Technology Management  
Data providers morph the images without privacy information using image morphing component.  ...  The performance of MpLe is compared with similar works such as GAZELLE and MiniONN and found that the MpLe attracts very less computational and data transmission overhead.  ...  Homomorphic encryption system allows the RF to be trained on encrypted data thus it preserves the privacy of the data owners.  ... 
doi:10.22059/jitm.2020.79191 doaj:9a2565b20f8740b98d10c745c9cae1c9 fatcat:fqbifqdmeze7vgn35wj3clngde

Towards Practical Privacy-Preserving Collaborative Machine Learning at a Scale

Rania Talbi
2020 2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S)  
In this paper, we present our approach to address this problem through PrivML, a framework for end-to-end outsourced privacy-preserving data classification over encrypted data.  ...  Later on, we want to investigate the possibility of implementing poisoning detection mechanisms that operates over protected model updates via privacy-preservation mechanisms such as homomorphic encryption  ... 
doi:10.1109/dsn-s50200.2020.00037 dblp:conf/dsn/Talbi20 fatcat:m32g3oqhg5bvtdnz25erssfrey

cSELENE: Privacy Preserving Query Retrieval System on Heterogeneous Cloud Data [article]

Diyah Puspitaningrum
2018 arXiv   pre-print
Modeling is the Preserving Privacy Stage I, since by modeling the data is being symbolized. We implement encryption on the database as preserving privacy Stage II.  ...  In this paper we discuss preserving-privacy system and threat model, the format of federated data, the parallel programming (GPU programming and shared/memory systems), the parallel and secure algorithm  ...  Here we proposed efficient method, c-ParMDL, for processing k nearest neighbor for a specific user that made the query at the first place with privacy preserving parallel MDL model of database over encrypted  ... 
arXiv:1805.01275v1 fatcat:j5b3567ys5c3vmbzzk5udtr2vu

Privacy-Preserving Cloud Computing: Ecosystem, Life Cycle, Layered Architecture and Future Roadmap [article]

Saeed Ahmadi
2022 arXiv   pre-print
Likewise, privacy in cloud computing is important because it ensures that the integrity of data stored on the cloud maintains intact.  ...  Privacy-Preserving Cloud Computing is an emerging technology with many applications in various fields.  ...  Privacy-Preserving Task Privacy-Preserving Search: • Keyword Search Many approaches towards searching over encrypted data are only able to perform exact searches, as per [277] .  ... 
arXiv:2204.11120v1 fatcat:tx75pckegjgqxg6tiibptiazbi

Safe Multi Keyword Ranked Search over Encrypted Cloud Data

Pradnya H., Arti Mohanpurkar
2016 Communications on Applied Electronics  
In subsisting system, for the first instance, the conundrum of privacypreserving multi-keyword ranked search over encrypted data in cloud computing (MRSE) is define and solve.  ...  privacy requirements in two different models.  ...  Verifiable Privacy Preserving Multi-keyword Text Search in cloud supporting similarity-Based Ranking, Wenhai Sun et al [2] , Secure Ranked Keyword Search over Encrypted Cloud Data, C.  ... 
doi:10.5120/cae2016652309 fatcat:6qedcs36xfaldae2gf37nk252u
« Previous Showing results 1 — 15 out of 10,270 results