The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile healthcare system integrating wearable sensing and wireless communication technologies continuously monitors the users' health status. However, the mHealth system raises a severe privacy concern as the data it collects are private information, such as heart rate and blood pressure. In this paper, we propose an efficient and privacy-preserving mHealth data release approach for the statistic...
In cognitive radio networks (CRNs), spectrum database has been well recognized as an effective means to dynamically sharing licensed spectrum among primary users (PUs) and secondary users (SUs). In spectrum database, the protected incumbents (a.k.a. PUs) and the CRs (a.k.a. SUs) are required to register in database their operational specifications such as transmitting power, antenna height, time of...
The integration, mining, and analysis of person-specific data can provide enormous opportunities for organizations, governments, and researchers to leverage today's massive data collections. However, the use of personal or otherwise sensitive data also raises concerns about the privacy, confidentiality, and potential discrimination of people. Privacy-preserving record linkage (PPRL) is a growing research...
Differential privacy (DP) has emerged as a popular standard for privacy protection and received great attention from the research community. However, practitioners often find DP cumbersome to implement, since it requires additional protocols (e.g., for randomized response, noise addition) and changes to existing database systems. To avoid these issues we introduce Explode, a platform for differentially...
An organization that has a lot of personal data can create a deep neural network (DNN), which predicts sensitive attribute values such as the salary and diseases of people based on other attribute values such as age and hobbies. Moreover, by putting this data on the Cloud and providing the functionality of the DNN to other organizations, they can obtain new knowledge and can subsequently create new...
As intelligent automation and large-scale distributed monitoring and control systems become more widespread, concerns are growing about the way these systems collect and make use of privacy-sensitive data obtained from individuals. This tutorial paper gives a systems and control perspective on the topic of privacy preserving data analysis, with a particular emphasis on the processing of dynamic data...
Numerous services are being offered over the Internet and require identification of users as in face-to-face interactions. To simplify the authentication procedure and reduce the need to manage multiple credentials to access services, electronic identification (eID) schemes have been introduced that involve many service providers (SPs) and identity providers (IDPs) which verify the identity of users...
In developing information system, privacy is an important component that must be guaranteed especially in government system. Indonesian government has introduced universal health care system that adopts Diagnosis-Related Group (DRG). This system is used to increase the service of healthcare providers and integrate patients' data. In Indonesia the universal health care system is named as Indonesia...
Wireless network traces have been widely used to understand human behaviors and provide value-added services. Sanitization based techniques have been shown to be severely lacking in protecting sensitive user information embedded in such traces. In this paper, we take an encryption based approach that provides much stronger protection of user privacy. One challenge in encrypting wireless network traces...
Fingerprints as biometric authenticators are rapidly increasing in popularity, with fingerprint scanners available on many modern smartphones and laptops. Because these authenticators are non-revocable, special care must be taken to prevent leakage of the representative feature information of a user's fingerprint. While secure multiparty computation protocols have been designed to maintain fingerprint...
The security and privacy of RFID (Radio Frequency Identification) systems becomes an important subject especially for low cost RFID tags. A lot of authentication protocols were proposed to insure the security and in the same time meet the resource limitations. In this paper, we proposed an ultralight weight authentication approach based on permutation, XOR and rotation functions. As a result, the...
A Radio Frequency Identification (RFID) system is a contactless automatic identification system that uses small and low-cost tags. The restricted computation ability and limited memory space of low-cost tags make existing RFID systems vulnerable. EPC Class 1 Generation 2 (EPC-C1G2) is the most popular standard for low cost passive RFID tags. For improving security of this standard; many security schemes...
Considering the development of mobile payment systems and feasibility and suitability of payment protocols we need to provide security requirements of users as well. In this paper we first introduce LMPP and MPCP protocols and show how these two protocols are unable to satisfy anonymity and unlinkability of merchant to issuer. Then we propose a lightweight mobile payment protocol that is based on...
Privacy is the major concern in the present world today. Data is also playing the major role and how the data is secured in the network is the trivial task. When the data is transmitted in the network, it is initially encrypted and the information is secured with minimal crypto security features. The information is more secured with public and private keys and during retrieval the data is to be decrypted...
Online Social Networks (OSNs) are becoming increasingly important in our day to day lives. Statistics show that 74% of the Internet users are involved in social networking. Unfortunately many of us are unaware of the threats and vulnerabilities that come with OSNs. These issues can be resolved by using Data Sanitization; the process of disguising sensitive information by overwriting it with realistic...
We have built a tool for inspecting and managing data lakes. The motivations for creating this tool are 1) schema discovery (determining links pertinent to solving a data analysis problem), 2) discovering high risk links in data schemas that give rise to Information Security problems and 3) discovering high value relationships enabling data asset curation. The tool works by extracting metadata from...
Network security management is a big challenge for network administrators due to increasing vulnerabilities. Vulnerabilities are the weakness of the network and allow malicious attackers access to resources controlled by an organization. To keep networks secure network administrators should be aware of all vulnerabilities through which an attacker can gain access. In this paper, we have considered...
Third party tracking of user behavior via web cookies represents a privacy threat. In this paper we assess this threat through an analysis of anonymized, crowdsourced cookie data provided by Cookiepedia.co.uk. We find that nearly 45% of the cookies in the corpus are from Facebook and of the remaining cookies 25% come from 10 distinct domains. Over 65% are Maximal Permission cookies (i.e., 3rd party,...
The wide deployment of public cloud computing infrastructures has become an appealing solution for the advantages of flexibility and cost saving, but the risk of being exposed to privacy and security issues refrains a lot of customers from risking their sensitive data to the cloud. The data owners do not want to move to the cloud unless the data confidentiality and the privacy of their queries are...
Big data publishing anonymity technology is the main way to achieve privacy protection, it is a research hotspot of data publishing privacy protection. Applying anonymity protection to data is an effective way to protect the privacy of data subject in the process of micro data publishing. This paper analyzes the data publishing privacy protection technology in the anonymous models and main technologies,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.