The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In cloud computing environments, the data operations of tenants destroy the original data relationships, which put tenants' privacy at risk of being leaked. Therefore, the paper proposes a privacy protection model for hiding data relationships based on chunk-confusion. For insert, delete and update operations, based on the L-diversity principle, this paper proposes L-K-equilibrium that ensures the...
When a data holder wants to share databases that contain personal attributes, individual privacy needs to be considered. Existing anonymization techniques, such as l-diversity, remove identifiers and generalize quasi-identifiers (QIDs) from the database to ensure that adversaries cannot specify each individual's sensitive attributes. Usually, the database is anonymized based on one-size-fits-all measures...
Snowden's whistleblower from the last year made people more aware of the fact that we are living in the Internet surveillance era. Privacy of Internet communication has been disrupted. In this paper, application for privacy protection in chat communication, named CryptoCloak, is presented. CryptoCloak provides privacy protection for chat communication. Encrypted communication is masked with dynamic...
Providing users with a lot of information might sound ideal in many scenarios, nonetheless, this may often be very annoying for the end user. To limit the amount of information that has to be processed by the user, to a set that is more relevant for his needs, most service providers use recommender systems. Undoubtedly, to provide someone with proper recommendations, one needs some background knowledge...
RFID (radio frequency identification) is a small electronic device that consists of small chip and an antenna. The biggest challenge for RFID technology is to provide benefits without degrading the secutiry level. This paper proposes a new RFID authentication protocol based on the lightweight stream cipher Enhanced-Bivium. In terms of security we show that the protocol is robust under the attack of...
The recognition and color processing of video complex object is now a research focus in contemporary computer science, the technology is widely used in various areas of society. In this article, we individually designed the system framework of Android-based client and OpenStack-based SSH server, the system has achieved functions include the management of personal clothes, dress collocation, intelligent...
We cast the classic problem of achieving k-anonymity for a given database as a problem in algebraic topology. Using techniques from this field of mathematics, we propose a framework for k-anonymity that brings new insights and algorithms to anonymize a database. We focus on the simpler case when the data lies in a metric space which is instrumental in introducing the main ideas and notation. Specifically,...
The main drawback of speaker de-identification approaches using voice conversion techniques is the need for parallel corpora to train transformation functions between the source and target speakers. In this paper, a voice conversion approach that does not require training any parameters is proposed: it consists in manually defining frequency warping (FW) based transformations by using piecewise linear...
Cancelable biometrics is one of the possible solutions to security and privacy problems in biometrics-based recognition systems. In this paper we propose the use of two classical transformations, block re-mapping and image warping, for the definition of cancelable biometrics from finger vein pattern images. Specifically, the impact on matching performance of the employed distortions, as well as the...
Google and Yandex Safe Browsing are popular services included in many web browsers to prevent users from visiting phishing or malware websites. If these services protect their users from losing private information, they also require that their servers receive browsing information on the very same users. In this paper, we analyze Google and Yandex Safe Browsing services from a privacy perspective....
Trajectory data. Like human mobility trace, in participatory sensing is of vital importance to many applications, like traffic monitoring, urban planning and social relationship mining. However, improper release of trajectory data can incur great threats to user's privacy. Recent researches have adopted Laplace mechanism to achieve differential privacy which can guarantee that small change of one...
Image sharing in Online Social Networks (OSNs) faces potential risks of exposing users' private or sensitive information to others. In this paper, we develop a framework of calculating the privacy level of a digital image based on perceptual hashing and semantic privacy rules. In particular, we design two privacy preserving perception hashing methods: the first one is based on the SIFT features which...
A public cloud platform offers economy of scale, ease of management, and elasticity to solutions. In addition, regulatory compliance and security must be assured for solutions handling sensitive data, such as student and healthcare data. With the steep rise in data breaches at large enterprises, it is a requirement to emphasize the security, privacy, and compliance of cloud-delivered solutions that...
Online social network graphs provide useful insights on various social phenomena such as information dissemination and epidemiology. Unfortunately, social network providers often refuse to publish their social network graphs due to privacy concerns. Recently, differential privacy has become the widely accepted criteria for privacy preserving data publishing because it provides strongest privacy guarantees...
In the last decades, Online Social Networks (OSN) has become the most convenient and preferable means of communication between people regardless of age, culture, educational background or job title. The fast development of online social networks OSNs in turn gives rise to certain privacy risk and concerns towards the safety of using the OSNs for the disclosure of some personal data. In this work,...
In the last decade, various types of RFID security schemes have been proposed which have tried to provide all security and privacy requirements of end-users. In this paper, we cryptanalyze two new-found key exchange and key agreement security schemes which are proposed by Zhang et al. and Kim in 2012 and 2013 respectively. We present the reveal secret parameter, tag impersonation and traceability...
Rapid expansion of network and internet services enabled users to use and share large amount of data on a massive scale. Once the information is combined, it becomes the wealth information which can be used for research. Researcher directly applies data mining techniques and algorithm on the original dataset to fetch information, which may leads to leakage of privacy data. Large amount of data leads...
Security and privacy of computation, and the related concept of (deliberate) sharing, have, historically, largely been afterthoughts. In a traditional multi-user, multi-application web hosting environment, typically applications are public by default. Applications wishing to offer a notion of private resources must take it upon themselves to independently manage authentication and authorization of...
With the widespread adoption of Online Social Networks (OSNs), users increasingly also use corresponding third-party applications (TPAs), such as social games and applications for collaboration. To improve their social experience, TPAs access users' personal data via an API provided by the OSN. Applications are then expected to comply with certain security and privacy policies when handling the users'...
Differential privacy (DP) is a framework to quantify to what extent individual privacy in a statistical database is preserved while releasing useful aggregate information about the database. In this work, we aim an exploratory study to understand questions related to the optimality of noise generation mechanisms (NGMs) in differential privacy by taking into consideration the (i) query sensitivity,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.