On the Complexity of the Privacy Problem in Databases

Author(s):  
Bhavani Thuraisingham
Keyword(s):  
1976 ◽  
Vol 15 (02) ◽  
pp. 69-74
Author(s):  
M. Goldberg ◽  
B. Doyon

This paper describes a general data base management package, devoted to medical applications. SARI is a user-oriented system, able to take into account applications very different by their nature, structure, size, operating procedures and general objectives, without any specific programming. It can be used in conversational mode by users with no previous knowledge of computers, such as physicians or medical clerks.As medical data are often personal data, the privacy problem is emphasized and a satisfactory solution implemented in SARI.The basic principles of the data base and program organization are described ; specific efforts have been made in order to increase compactness and to make maintenance easy.Several medical applications are now operational with SARI. The next steps will mainly consist in the implementation of highly sophisticated functions.


2017 ◽  
Author(s):  
James Grimmelmann

Chapter in:Big Data, Big Challenges for Evidence-Based Policy Making 211 (Kumar Jayasuria & Kathryn Ritcheske eds., West Academic 2015) (page proof PDF)


2008 ◽  
pp. 693-704
Author(s):  
Bhavani Thuraisingham

This article first describes the privacy concerns that arise due to data mining, especially for national security applications. Then we discuss privacy-preserving data mining. In particular, we view the privacy problem as a form of inference problem and introduce the notion of privacy constraints. We also describe an approach for privacy constraint processing and discuss its relationship to privacy-preserving data mining. Then we give an overview of the developments on privacy-preserving data mining that attempt to maintain privacy and at the same time extract useful information from data mining. Finally, some directions for future research on privacy as related to data mining are given.


2016 ◽  
Vol 20 (1) ◽  
pp. 51-68
Author(s):  
Michael Falgoust ◽  

Unprecedented advances in the ability to store, analyze, and retrieve data is the hallmark of the information age. Along with enhanced capability to identify meaningful patterns in large data sets, contemporary data science renders many classical models of privacy protection ineffective. Addressing these issues through privacy-sensitive design is insufficient because advanced data science is mutually exclusive with preserving privacy. The special privacy problem posed by data analysis has so far escaped even leading accounts of informational privacy. Here, I argue that accounts of privacy must include norms about information processing in addition to norms about information flow. Ultimately, users need the resources to control how and when personal information is processed and the knowledge to make information decisions about that control. While privacy is an insufficient design constraint, value-sensitive design around control and transparency can support privacy in the information age.


IEEE Spectrum ◽  
1995 ◽  
Vol 32 (12) ◽  
pp. 46
Author(s):  
J.A. Adam
Keyword(s):  

2019 ◽  
Vol 21 (2) ◽  
pp. 511-526 ◽  
Author(s):  
Abukari Mohammed Yakubu ◽  
Yi-Ping Phoebe Chen

Abstract In recent times, the reduced cost of DNA sequencing has resulted in a plethora of genomic data that is being used to advance biomedical research and improve clinical procedures and healthcare delivery. These advances are revolutionizing areas in genome-wide association studies (GWASs), diagnostic testing, personalized medicine and drug discovery. This, however, comes with security and privacy challenges as the human genome is sensitive in nature and uniquely identifies an individual. In this article, we discuss the genome privacy problem and review relevant privacy attacks, classified into identity tracing, attribute disclosure and completion attacks, which have been used to breach the privacy of an individual. We then classify state-of-the-art genomic privacy-preserving solutions based on their application and computational domains (genomic aggregation, GWASs and statistical analysis, sequence comparison and genetic testing) that have been proposed to mitigate these attacks and compare them in terms of their underlining cryptographic primitives, security goals and complexities—computation and transmission overheads. Finally, we identify and discuss the open issues, research challenges and future directions in the field of genomic privacy. We believe this article will provide researchers with the current trends and insights on the importance and challenges of privacy and security issues in the area of genomics.


2014 ◽  
Vol 490-491 ◽  
pp. 1734-1738
Author(s):  
Wen Zhuo Guo

To solve the problems of consumers security and privacy, an optimized RFID unidirectional authentication method is proposed, comparing with other asymmetric cryptography, this method has stronger security, shorter key length, less computation and so on. This method achieves one-way authentication between tag and reader-writer, and allow the labels to automatically update the key to improve the performance of RFID authentication, and also can enhance security through updating keys. This method allows the label to update its own name and private key, so can prevent attackers tracking them, so as to solve the privacy problem of the tags.


2021 ◽  
Author(s):  
◽  
Kent Newman

<p>Documentary reality television is hugely successful. The genre, which includes shows like Police Ten 7, Coastwatch and Border Patrol, consistently outperforms other television formats and fills free-to-air television schedules. In these shows ride-along film crews and body-worn cameras record agencies as they go about their tasks. Often these agencies are public authorities and their tasks are statutory functions. The purpose of this paper is to examine the genre’s privacy implications. It concludes that the genre is systemically unlawful. It is unlawful because it breaches the privacy rights of involuntary participants. The paper considers the privacy implications by examining the genre against the shared features of the publication tort and the Privacy Broadcasting Standard. Both of these consider that it is a breach of privacy to broadcast material subject to a reasonable expectation of privacy, where that broadcast is highly offensive unless there is an applicable defence. While the material broadcast represents the work of agencies, it also represents the personal stories of everyday people going about their lives. Often the moments captured are significant life events and intimate moments for those people. By agreeing to contribute to the genre, agencies agree to broadcast these life events without the active involvement of the participants. Research has also found that this is often occurring without informed consent. While the focus of this paper is on the private law implications of the genre, it identifies that some public authorities’ involvement in the genre may also be ultra vires. The paper finishes by considering why, if the genre is systemically unlawful, people are not suing. It considers that general issues with access to civil justice and the powers of the Broadcasting Standards Authority stand in the way of potential complainants. It finishes by considering some solutions that could improve the situation.</p>


2021 ◽  
Author(s):  
Ngoc Hong Tran ◽  
Tri Nguyen ◽  
Quoc Binh Nguyen ◽  
Susanna Pirttikangas ◽  
M-Tahar Kechadi

This paper investigates the situation in which exists the unshared Internet in specific areas while users in there need instant advice from others nearby. Hence, a peer-to-peer network is necessary and established by connecting all neighbouring mobile devices so that they can exchange questions and recommendations. However, not all received recommendations are reliable as users may be unknown to each other. Therefore, the trustworthiness of advice is evaluated based on the advisor's reputation score. The reputation score is locally stored in the user’s mobile device. It is not completely guaranteed that the reputation score is trustful if its owner uses it for a wrong intention. In addition, another privacy problem is about honestly auditing the reputation score on the advising user by the questioning user. Therefore, this work proposes a security model, namely Crystal, for securely managing distributed reputation scores and for preserving user privacy. Crystal ensures that the reputation score can be verified, computed and audited in a secret way. Another significant point is that the device in the peer-to-peer network has limits in physical resources such as bandwidth, power and memory. For this issue, Crystal applies lightweight Elliptic Curve Cryptographic algorithms so that Crystal consumes less the physical resources of devices. The experimental results prove that our proposed model performance is promising.


Sign in / Sign up

Export Citation Format

Share Document