The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We present Pythia, a privacy-enhanced non-invasive contextual suggestion system for tourists, with important architectural innovations. The system offers high quality personalized recommendations, non-invasive operation and protection of user privacy. A key feature of Pythia is the exploitation of the vast amounts of personal data generated by smartphones to automatically build user profiles, and...
We propose storage efficient SQL-aware encrypted databases that preserve the format of the fields. We give experimental results of storage improvements in CryptDB using FNR encryption scheme. We explore the feasibility of adopting Format Preserving Encryption for SQL-aware encrypted databases.
Existing data publication methods retain the relationship between the quasi-identifier attributes and sensitive attributes of published data. We call them "positive data publication". However, it will lead to potential risk that attackers could deduce the privacy of the corresponding individuals from the published data. Recently, by combining the negative representation with k-anonymity...
In this paper we consider privacy-preserving multimedia content identification for a cloud based Bag-of-Feature (BoF) framework. We analytically model how geometric information can be used as a shared secret and derive the tradeoff between identification capability, privacy and computational load. In addition we suggest a descriptor ambiguization method that introduces uncertainty to the server with...
Data anonymization is an important preprocessing step for data sharing and the delegation of data storage to the cloud. In this paper, we propose an SQL-like query language and a tool to help the data provider ensuring the quality and the privacy of the data being outsourced. The tool supports a set of recent and well-known anonymization techniques in an SQL query style. We present our framework and...
The digitalization of mental health records and psychotherapy notes has made individual mental health data more readily accessible to a wide range of users including patients, psychiatrists, researchers, statisticians, and data scientists. However, increased accessibility of highly sensitive mental records threatens the privacy and confidentiality of psychiatric patients. The objective of this study...
Nowadays biometric authentication and identification becomes a part of every-day life. As a result, many services emerge that rely on biometric-based access control. However, from a user point of view, supplying biometric information to many different service providers imposes high privacy and security risks. In this paper we focus on the use of biometrics in a claimed-based authentication framework...
Scientific documents need to be checked for plagiarism before publication. On the other hand, authors do not want to reveal their document's contents prior to successful publication. In this paper, we propose a novel approach for plagiarism detection in scientific digital libraries, which does not reveal contents of unpublished documents, but allows for early detection of plagiarism attempts. Based...
With the help of location-aware mobile device user can issue a query and obtain information on nearest point of interest as it moves within a spatial network. This evolving computing paradigm offers great level of convenience to information access and usage. Nevertheless, the convenience comes with a price in the form of exposing user private information to potential abuse and misuse. This paper proposes...
We study the following private data transfer problem: Alice has a database of files. Bob and Cathy want to access a file each from this database (which may or may not be the same file), but each of them wants to ensure that their choices of file do not get revealed even if Alice colludes with the other user. Alice, on the other hand, wants to make sure that each of Bob and Cathy does not learn any...
Private information retrieval (PIR) protocols allow a user to retrieve a data item from a database without revealing any information about the identity of the item being retrieved. Specifically, in information-theoretic k-server PIR, the database is replicated among k non-communicating servers, and each server learns nothing about the item retrieved by the user. The cost of PIR protocols is usually...
Current concerns about data privacy have lead to increased focus on data anonymization methods. Differential privacy is a new mechanism that offers formal guarantees about anonymization strength. The main challenge when using differential privacy consists in the difficulty in designing correct algorithms when operating on complex data types. One such data type is sequential data, which is used to...
Privacy is an increasing concern as the number of databases containing personal information grows. Differential privacy algorithms can be used to provide safe database queries through the insertion of noise. Attackers cannot recover pieces of the initial data with certainty, but this comes at the cost of data utility. Noise insertion leads to errors, and signal to noise ratio can become an issue....
With the increasing popularity of RFID applications, RFID protocols are widely discussed. Most RFID protocols use a central database to store the RFID tag data, while severless RFID protocols are proposed to provide users with security and privacy protection without the connection and security problem between readers and sever. The shortcoming of severless RFID protocols is that the reader is authorized...
In this paper, we extend the information theoretic secure constructions for biometrics to the computational setting. Based on semantically secure encryption, we introduce robust, fully private and secure biometric key distillation and verification. Our model incorporates an adversary with side information who has access to a database with reference information. Even though our schemes are based on...
In this paper, we study the problem of mining frequent sequences under the rigorous differential privacy model. We explore the possibility of designing a differentially private frequent sequence mining (FSM) algorithm which can achieve both high data utility and a high degree of privacy. We found, in differentially private FSM, the amount of required noise is proportionate to the number of candidate...
In this project, we are presenting a new concept for preserving fingerprint confidential. Identification of fingerprint is an active area of search. In most portions we are manipulating recognition of fingerprint for enhancing the isolation and safety. The matching methods can be of two types-enrolment of fingerprint and authentication of fingerprint. The union of fingerprint for protecting isolation...
Now a days everyone is using smartphone devices for personal and official data storage. Smartphone apps are usually not secure and need user permission to access protected system resources. Specifically, the existing Android permission system will check whether the calling app has the right permission to invoke sensitive system APIs. Android OS allows third-party applications. Whenever a user installs...
For extorting the helpful comprehension concealed in the biggest compilation of a database the data mining technology is used. There are some negative approaches occurred about the data mining technology, among which the potential privacy incursion and potential discrimination. The latter consists of irrationally considering individuals on the source of their fitting to an exact group. Data mining...
As availability of the mobile has been increased and many providers have started offering Location Based Services (LBS). There is undoubted potential of location-aware computing, but location awareness also comes up with the inherent threats, perhaps the most important of which is location privacy. This tracking of the location information result into unauthorized access of location data of user and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.