The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper provides an overview of the tools and methodologies for data privacy protection that can cope with the challenges raised by the Big Data storage and analytics processing, with focus on anonymity. Preserving individual privacy is one of the major issues in the context of Big Data, as while handling huge volumes of data, it is possible that sensitive or personally identifiable information...
Nowadays, we witness a tremendous increase in systems that sense various facets of humans and their surrounding environments. In particular, the detection of human emotions can lead to emotionally-aware applications that use this information to help improving people's daily lives and offering new business opportunities. We address the issue of maintaining privacy for this type of applications. In...
Digital traces left by users of online social networking services, even after anonymization, are susceptible to privacy breaches. This is exacerbated by the increasing overlap in user-bases among various services. To alert fellow researchers in both the academia and the industry to the feasibility of such an attack, we propose an algorithm, Seed-and-Grow, to identify users from an anonymized social...
Privacy is the most often cited criticism of context awareness in pervasive environments. Context aware pervasive applications have the vulnerabilities of capturing extensive portions of users' activities. Whether such data capture is an actual threat or not, users' perceptions of such possibilities may discourage them from using many useful pervasive applications. So far, in context aware pervasive...
Personal information sharing is one of the most common online activities. Most of the times we feel forced to give up about some privacy in order to share a piece of information with others. This paper reflects on the anonymity, integrity, privacy of users' personal information and it's scattering across the Web by taking an approach to digital identity management concept. Consequently it also reflects...
Nowadays, Electronic Payment Systems are inseparable part of digitally communication systems. One of the crucial challenges of Electronic Payment System makers is making security and anonymity. Digital information while transferring through the network or in storage systems and servers can easily be copied. Moreover, electronic money which is a good simulation of cash money should have the most characteristic...
Advances in digital technology are increasing the volume of computer data and accelerating the massive integration of software into our daily lives. The widespread interconnection of networks and digital convergence accentuates this computerization process, making computing, telecommunications and audiovisual information increasingly compatible and interoperable. eGovernment services to citizens and...
A common focus of internet privacy research has been on allowing users to maintain their anonymity in order that they may freely reveal personal aspects of themselves. However, with Web 2.0 and the increasing popularity of social networking sites, it has become increasingly commonplace for users to reveal their identities in order to advertise their on-line presence to their real-life associates....
We address issues related to privacy protection in location-based services (LBS). Most existing research in this field either requires a trusted third-party (anonymizer) or uses oblivious protocols that are computationally and communicationally expensive. Our design of privacy-preserving techniques is principled on not requiring a trusted third-party while being highly efficient in terms of time and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.