The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile devices that can sense their location using GPS or Wi-Fi have become extremely popular. However, many users hesitate to provide their accurate location information to unreliable third parties if it means that their identities or sensitive attribute values will be disclosed by doing so. Many approaches for anonymization, such as ${k}$ -anonymity, have been proposed to tackle this issue. Existing...
We have built a tool for inspecting and managing data lakes. The motivations for creating this tool are 1) schema discovery (determining links pertinent to solving a data analysis problem), 2) discovering high risk links in data schemas that give rise to Information Security problems and 3) discovering high value relationships enabling data asset curation. The tool works by extracting metadata from...
Growth of computing and analytics, internet and distributed computing, and increasing tendency to use crowd sourcing for creative tasks, the use of collaborative idea in information intensive activities is a growing research concern. In CIS companies would cooperate to do their interlinked business together. It responds to customer requests for information retrieval from or writing on data contents...
Many organizations, including businesses, government agencies and research organizations, are collecting vast amounts of data, which are stored, processed and analyzed to mine interesting patterns and knowledge to support efficient and quality decision making. In order to improve data quality and to facilitate further analysis, many application domains require information from multiple sources to...
Every organization whether it be an enterprise or academic institute, should maintain a proper documentation of attendance of staff or students for effective functioning of their organization. Generally there are two methods of taking attendance in a classroom- calling out students name one by one or taking students signature on paper. However each of those strategies are time consuming, inefficient...
We present and implement schemes for authenticating messages from a group of users to a recipient, with revocable anonymity and massive (very high) message rate. Our implementations present a trade-off between the efficiency and the security required: from online group managers that participate in every message sent to offline managers, from assuming a trusted group manager and a trusted recipient...
Existing data publication methods retain the relationship between the quasi-identifier attributes and sensitive attributes of published data. We call them "positive data publication". However, it will lead to potential risk that attackers could deduce the privacy of the corresponding individuals from the published data. Recently, by combining the negative representation with k-anonymity...
Some of Internet services request us to provide our personal information. When we use their services, we have to provide our personal information even if we cannot trust their service providers. This may cause the abuse of their personal information. Therefore, we propose a framework that prevents service providers from abusing users' personal information. In our framework, a user selects a method...
Due to the proliferation of Global Position System (GPS) and smart phone technology, Location-Based Service (LBS) has attained tremendous growth in recent years. Spatial queries retrieving nearest Point-Of-Interests (POI) require actual user locations for services. However, sharing such sensitive personal location information with potentially malicious servers may cause concerns about user privacy...
We do a survey of some of the most important principles of anonymization present in the literature. We identify different kinds of attacks that can be thrown against an anonymized dataset and give formulas for the maximum probability of success for each. For each principle, we identify whether it is monotonous, what attacks it is suited to counter, if any, and what principles imply other principles...
The balance between privacy and security concerns is a hotly debated topic, especially as government (and private) entities are able to gather and analyze data from several disparate sources with ease. This ability to do large scale analytics of publicly accessible data leads to significant privacy concerns. In particular, for the government, there is the fear of a fishing expedition against individuals...
Preserving the privacy of individuals while publishing their relevant data has been an important problem. Most of previous works in privacy preserving data publication focus on one time, static release of datasets. In multiple publications however, where data is published multiple times, these techniques are unable to ensure privacy of the concerned individuals as just joining either of the releases...
Primary goal of data mining is determining new and precious facts and knowledge from the large databases. Privacy preserving data mining is one of the research areas in the field of data mining which deals with the side effects of the data mining techniques. The results of data mining techniques may produce complete or accurate data; it produces privacy issues regardless of their intended use. Most...
Internet has gained huge popularity over the last decade. It offers its users reliable, efficient and exciting online services. However, the users reveal a lot of their personal information by using these services. Websites that collect information state their practices with data in their privacy policies. However, it is difficult to ensure if the policies are enforced properly in their practices...
Future internet architecture, based on the integration of existing networks, face a series of important technical challenges, one of them being the management of diverse user identities. Existing research efforts often tackle only a small range of identity issues, offering limited solutions only applicable in well defined administrative domains. This paper presents an identity management and discovery...
The widespread use of digital data, storage and sharing for data mining has given data snoopers a big opportunity to collect and match records from multiple sources for identity theft and other privacy-invasion activities. While most healthcare organizations do a good job in protecting their data in their databases, very few organizations take enough precautions to protect data that is shared with...
In industries such as healthcare, there is a need to electronically share privacy-sensitive data across distinct organizations. We show how this can be done while allowing organizations to keep their legacy databases and maintain ownership of the data that they currently store. Without sending or mirroring data to any trusted, centralized entity, we demonstrate how queries can be answered in a distributed...
Moving towards network convergence, a highly complex identity environment is emerging due to the heterogeneity of protocols, networks and devices as well as user requirements. The diversity of names and identities often representing un associated information and carrying different amount of security data, complicates the design of an identity management system. Existing solutions deal only with a...
As the development of the grid technology, it becomes more and more important in commerce application to preserve privacy and prevent information from being leaked when querying in a dynamic and heterogeneous grid database. This paper proposes a privacy-preserving query middleware PVOM (privacy-preserving visual organizations mediator) based on the security requirement of heterogeneous grid nodes,...
Many organizations have to outsource some of their data mining tasks due to inadequate in-house IT expertise. During this process, the organizations lose full security control of their source data which may lead to the exposure of their business privacy. In this paper, we first present different application scenarios of outsourcing computing tasks of data mining, then identify the elements that may...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.