Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Many companies want to share data for datamining tasks. However, the privacy and security concerns become a bottleneck in the data sharing filed. The secure multiparty computation (SMC)-based privacy-preserving data mining has emerged as a solution to this problem. However, traditional SMC solutions are inefficient. We introduce the method of outsourcing to reduce the computation cost of user’s side...
As a promising cryptographic primitive, attributebased encryption (ABE) is adopted to protect outsourced data. However, there are some issues in existing attribute-based encryption schemes. First, the attribute authority manages attributes of users, so it may cause the leakage of users' privacy information. Second, because the access structures are directed along with the ciphertexts and may violate...
Time series discords are subsequences of a longer time series that are maximally different to all the rest of the time series subsequences. Recent advancements in sensor technology have made it possible to collect enormous amounts of data in real time, sometimes, the unilateral data can't support the data mining task, you must consider the multi-party situation, combining multi-party data into a complete...
Searchable encryption is crucial for the encrypted data utilization, especially in the database generated by multiple owners. Many existing schemes support single keyword query, and assume that the search users are authorized and the returned results are correct. However, single keyword query wastes network bandwidth and computing resources, and these assumptions are not suitable for more realistic...
Database is widely used for information storage and management. With the explosion of the data size, the requirement of the storage capacity is growing dramatically. Cloud offers clients a scalable solution to meet the demand of the increasing space. A cloud service, if used and managed properly, can increase the resource usability and provide more secure services. In this paper, we propose a cloud-based...
Public key encryption scheme with keyword searchable (PEKS) enables one to search for encrypted keywords without compromising the confidentiality of the original data. A practical PEKS scheme should have the following properties: quickly and efficiently searchable method, ciphertext integrity, a small amount of decryption operation for user, and full security. However, there are seldom schemes that...
In order to realize data sharing in mobile cloud computing, decentralized attribute-based encryption (ABE) has been widely concerned. However, the existing ABE schemes are full of flaws. First, the main drawback of ABE is that the computation cost of encryption and decryption are expensive. Second, the existing ABE schemes are inapplicable due to the inefficiency of user revocation. Besides, in a...
Public key encryption with keyword search applies only to the certain circumstances that keyword ciphertext can only be retrieved by a specific user and only supports single-keyword matching. In the existing searchable encryption schemes, either the communication mode is one-to-one, or only single-keyword search is supported. This paper proposes a searchable encryption that is based on attributes...
Dynamic spectrum access (DSA) technique has emerged as a fundamental approach to mitigate the spectrum scarcity problem. As a key form of DSA, the government is proposing to release more federal spectrum for sharing with commercial wireless users. However, the flourish of federal-commercial sharing hinges upon how the federal privacy is managed. In current DSA proposals, the sensitive exclusion zone...
Numerous applications, e.g., in the industrial sector, produce large amounts of time-series data, which must be stored and made available for distributed processing. While outsourcing data storage and processing to third-party service providers offers many benefits, it raises data privacy issues. In light of this problem, techniques have been proposed to share only encrypted data with the remote service...
With the rapid development of the social networks, Collaborative Filtering (CF)-based recommender systems have been increasingly prevalent and become widely accepted by users. The CF-based techniques generate recommendations by collecting privacy sensitive data from users. Usually, the users are sensitive to disclosure of personal information and, consequently, there are unavoidable security concerns...
Recently, research and development on connected vehicles using road-to-vehicle and inter-vehicle communications systems have been positively performed. For communications between roadside infrastructures and in-vehicle devices, not only the development of technologies to realize the communications, such as the establishment of a communication channel, but also the development of technologies to ensure...
In the presented paper, we will show a secure protocol over Controller Area Network(CAN) against tampering and replay attacks. Because a data field in a CAN data frame is at most 64 bits in length, there is a problem that the number of frames increases if security data such as a Message Authentication Code(MAC) is added to data. We will discuss the secure protocol concatenating a part of the MAC value...
In this paper, we proposes a digital content sharing scheme using proxy re-encryption, in which we don't need to access any server when sharing content, and a person, who is not owner of a content but shares it from an owner of it, cannot sublet it to other person. We think such property provides an efficient DRM system. Moreover, we provide experimental result of the scheme.
In this paper, we first define a new security problem, named mPSI (many-to-one private set interaction), which can find applications in many scenarios where the host of a big database may be queried by a large number of clients who have small-size queries and want to prevent both the intentions and results of their queries from being exposed to others. We also propose a new scheme to solve the mPSI...
With cloud services, users can easily host their data in the cloud and retrieve the part needed by search. Searchable encryption is proposed to conduct such process in a privacy-preserving way, which allows a cloud server to perform search over the encrypted data in the cloud according to the search token submitted by the user. However, existing works mainly focus on textual data and merely take numerical...
Attacking cloud-enabled storage is becoming increasingly lucrative as more personal and enterprise data moves to the cloud. Traditional security mechanisms temporarily limit such attacks, but over a long period of time attackers will eventually find vulnerabilities; this can lead to compromising large amounts of valuable data and lead to large-scale privacy breaches. This paper addresses this problem...
Cloud computing has emerged as a compelling vision for managing data and delivering query answering capability over the internet. This new way of computing also poses a real risk of disclosing confidential information to the cloud. Searchable encryption addresses this issue by allowing the cloud to compute the answer to a query based on the cipher texts of data and queries. Thanks to its inner product...
Similarity-oriented services serve as a foundation in a wide range of data analytic applications such as machine learning, target advertising, and real-time decisions. Both industry and academia strive for efficient and scalable similarity discovery and querying techniques to handle massive, complex data records in the real world. In addition to performance, data security and privacy become an indispensable...
As a major branch of LBSs, geosocial networking services become popular. An important functionality of geosocial networking services is allowing people to find potential friends who have similar profile within close proximity and initiate communication with each other. However, in order to realize this functionality, most existing services require mobile users to reveal their profiles and location...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.