4.3 Article

A New Edge Perturbation Mechanism for Privacy-Preserving Data Collection in IOT

Related references

Note: Only part of the references are listed.
Article Computer Science, Hardware & Architecture

Quantum-Safe Round-Optimal Password Authentication for Mobile Devices

Zengpeng Li et al.

Summary: Password authentication is a dominant form of access control for the Web and mobile devices, and the use of Password Authenticated Key Exchange (PAKE) systems is recommended for secure data communication. The industry standard suggests using asymmetric-PAKE protocols to prevent password exposure.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2022)

Article Computer Science, Information Systems

Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0

Chenyu Wang et al.

Summary: In this paper, we propose an efficient privacy-preserving user authentication scheme for industry 4.0, which achieves forward secrecy. Compared with other schemes, it meets the latest standards, has reasonable computation cost on sensor nodes, and utilizes the computation and storage capabilities of the cloud center to achieve user anonymity and resistance to offline dictionary attacks.

SCIENCE CHINA-INFORMATION SCIENCES (2022)

Article Computer Science, Information Systems

Improved l-diversity: Scalable anonymization approach for Privacy Preserving Big Data Publishing

Brijesh B. Mehta et al.

Summary: This paper discusses the challenges of privacy preservation in big data analytics and proposes an improved method ImSLD based on scalable k-anonymization. By testing on poker dataset within the MapReduce framework, significant improvements in running time and lower information loss were demonstrated compared to existing methods.

JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES (2022)

Article Computer Science, Software Engineering

Evolutionary game analysis on competition strategy choice of application providers

Ayong Ye et al.

Summary: The research suggests that the privacy issues on modern smartphone platforms are closely related to the permission request strategies of application providers, and it is recommended to establish a privacy alarm mechanism to increase user privacy awareness and avoid excessive collection of personal data, which may impact market share.

CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2021)

Article Computer Science, Information Systems

Three-factor authentication protocol using physical unclonable function for IoV

Qi Jiang et al.

Summary: Internet of Vehicles (IoV) plays a crucial role in transportation sector, but security and privacy issues are pressing. The integration of physical unclonable function (PUF) technology ensures system security, and the combination of password, biometrics, and PUF prevents unauthorized access to user devices.

COMPUTER COMMUNICATIONS (2021)

Article Computer Science, Information Systems

A Survey Of differential privacy-based techniques and their applicability to location-Based services

Jong Wook Kim et al.

Summary: This article explores the use of mobile devices in generating location data and the issue of location privacy, then delves into the application of differential privacy methods and its three variants in the context of LBS.

COMPUTERS & SECURITY (2021)

Article Computer Science, Hardware & Architecture

Secure and Usable Handshake Based Pairing for Wrist-Worn Smart Devices on Different Users

Guichuan Zhao et al.

Summary: In this paper, a secure and usable pairing scheme utilizing handshake acceleration data is proposed. By utilizing an optimal feature selection algorithm and feature sequence similarity measurement approach, the success rate, security, and accuracy of the system are improved. Experimental results show a high key generation rate and fast security pairing time for the proposed solution.

MOBILE NETWORKS & APPLICATIONS (2021)

Article Computer Science, Information Systems

Privacy-preserving data collection for 1: M dataset

M. Abrar et al.

Summary: A novel privacy-preserving data collection protocol has been proposed in this paper for 1:M datasets, which ensures data safety, minimizes the risk of privacy disclosures, and achieves higher computational efficiency through the use of AI and ML methods.

MULTIMEDIA TOOLS AND APPLICATIONS (2021)

Article Computer Science, Information Systems

Distributed K-Means clustering guaranteeing local differential privacy

Chang Xia et al.

COMPUTERS & SECURITY (2020)

Article Computer Science, Theory & Methods

Privacy preserving classification on local differential privacy in data centers

Weibei Fan et al.

JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2020)

Article Computer Science, Information Systems

Achieving secure big data collection based on trust evaluation and true data discovery

Denglong Lv et al.

COMPUTERS & SECURITY (2020)

Article Engineering, Electrical & Electronic

Unified Biometric Privacy Preserving Three-Factor Authentication and Key Agreement for Cloud-Assisted Autonomous Vehicles

Qi Jiang et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)

Article Telecommunications

Workload-Aware Indoor Positioning Data Collection via Local Differential Privacy

Jong Wook Kim et al.

IEEE COMMUNICATIONS LETTERS (2019)

Article Computer Science, Artificial Intelligence

Utility-preserving privacy protection of nominal data sets via semantic rank swapping

Mercedes Rodriguez-Garcia et al.

INFORMATION FUSION (2019)

Article Computer Science, Information Systems

Privacy-preserving scheme in social participatory sensing based on Secure Multi-party Cooperation

Ye Tian et al.

COMPUTER COMMUNICATIONS (2018)

Proceedings Paper Computer Science, Information Systems

A differentially k-anonymity-based location privacy-preserving for mobile crowdsourcing systems

Yingjie Wang et al.

2017 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS (2018)

Article Mathematical & Computational Biology

Privacy Preservation in Skewed Data Using Frequency Distribution and Weightage (FDW)

Mobashirah Nasir et al.

JOURNAL OF MEDICAL IMAGING AND HEALTH INFORMATICS (2017)

Article Computer Science, Artificial Intelligence

Learning k for kNN Classification

Shichao Zhang et al.

ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY (2017)

Article Computer Science, Artificial Intelligence

A new robust data hiding method for H.264/AVC without intra-frame distortion drift

Yunxia Liu et al.

NEUROCOMPUTING (2015)

Article Computer Science, Theory & Methods

Privacy-Preserving Data Publishing: A Survey of Recent Developments

Benjamin C. M. Fung et al.

ACM COMPUTING SURVEYS (2010)

Article Management

An enhanced data perturbation approach for small data sets

K Muralidhar et al.

DECISION SCIENCES (2005)