User Privacy Protection Technology of Tennis Match Live Broadcast from Media Cloud Platform Based on AES Encryption Algorithm

Author(s):  
Yan Li
Libri ◽  
2021 ◽  
Vol 0 (0) ◽  
Author(s):  
Zongda Wu ◽  
Chenglang Lu ◽  
Youlin Zhao ◽  
Jian Xie ◽  
Dongdong Zou ◽  
...  

Abstract This paper reviews a large number of research achievements relevant to user privacy protection in an untrusted network environment, and then analyzes and evaluates their application limitations in personalized information retrieval, to establish the conditional constraints that an effective approach for user preference privacy protection in personalized information retrieval should meet, thus providing a basic reference for the solution of this problem. First, based on the basic framework of a personalized information retrieval platform, we establish a complete set of constraints for user preference privacy protection in terms of security, usability, efficiency, and accuracy. Then, we comprehensively review the technical features for all kinds of popular methods for user privacy protection, and analyze their application limitations in personalized information retrieval, according to the constraints of preference privacy protection. The results show that personalized information retrieval has higher requirements for users’ privacy protection, i.e., it is required to comprehensively improve the security of users’ preference privacy on the untrusted server-side, under the precondition of not changing the platform, algorithm, efficiency, and accuracy of personalized information retrieval. However, all kinds of existing privacy methods still cannot meet the above requirements. This paper is an important study attempt to the problem of user preference privacy protection of personalized information retrieval, which can provide a basic reference and direction for the further study of the problem.


2020 ◽  
Vol 195 ◽  
pp. 105679
Author(s):  
Zongda Wu ◽  
Shigen Shen ◽  
Xinze Lian ◽  
Xinning Su ◽  
Enhong Chen

2021 ◽  
Author(s):  
Jindong Zhao ◽  
Wenshuo Wang ◽  
Dan Wang ◽  
Chunxiao Mu

Abstract Nowadays, smart medical cloud platforms have become a new direction in the industry. However, because the medical system involves personal physiological data, user privacy in data transmission and processing is also easy to leak in the smart medical cloud platform. This paper proposed a medical data privacy protection framework named PMHE based on blockchain and fully homomorphic encryption technology. The framework receives personal physiological data from wearable devices on the client side, and uses blockchain as data storage to ensure that the data cannot be tampered with or forged; Besides, it use fully homomorphic encryption method to design a disease prediction model, which was implemented using smart contracts. In PMHE, data is encoded and encrypted on the client side, and encrypted data is uploaded to the cloud platform via the public Internet, preventing privacy leakage caused by channel eavesdropping; Smart contracts run on the blockchain platform for disease prediction, and the operators participating in computing are encrypted user data too, so it avoids privacy and security issues caused by platform data leakage. The client-to-cloud interaction protocol is also designed to overcome the defect that fully homomorphic encryption only supports addition and multiplication by submitting tuples on the client side, to ensure that the prediction model can perform complex computing. In addition, the design of the smart contract is introduced in detail, and the performance of the system is analyzed. Finally, experiments are conducted to verify the operating effect of the system, ensuring that user privacy is not leaked without affecting the accuracy of the model, and realizing a smart medical cloud platform in which data can be used but cannot be borrowed.


Author(s):  
Awanthika Senarath ◽  
Nalin Asanka Gamagedara Arachchilage

There could be numerous reasons that drive organizations to provide privacy protections to end users in the applications they develop and maintain. Organizational motivations towards privacy affects the quality of privacy received by end users. Understanding these motivations and the approaches taken by organizations towards privacy protection would assist the policymakers and regulators to define effective frameworks encouraging organizational privacy practices. This study focuses on understanding the motivations behind organizational decisions and the approaches they take to embed privacy into the software applications. The authors analyzed 40 organizations different in size, scope, scale of operation, nature of data used, and revenue. they identified four groups of organizations characterized by the approach taken to provide privacy protection to their users. The taxonomy contributes to the organizational perspective of privacy. The knowledge presented here would help addressing the challenges in the domain of user privacy in software applications and services.


2016 ◽  
pp. 1693-1717
Author(s):  
Wen-Chen Hu ◽  
Naima Kaabouch ◽  
Hung-Jen Yang ◽  
S. Hossein Mousavinezhad

Since the introduction of iPhone in 2007, smartphones have become very popular (e.g., the number of worldwide smartphone sales has surpassed the number of PC sales in 2011). The feature of high mobility and small size of smartphones has created many applications that are not possible or inconvenient for PCs and servers, even laptops. Location-based services (LBS), one of mobile applications, have attracted a great attention recently. This research proposes a location-based service, which predicts a spatial trajectory based on the current and previous trajectories by using a novel matrix representation. Spatial trajectory prediction can be used in a variety of purposes such as travel recommendations and traffic control and planning, but at the same time, just like most location-based services, the user privacy concern is a major issue. Without rigorous privacy protection, users would be reluctant to use the service. The proposed method is simple but effective and user privacy is rigorously preserved at the same time because the trajectory prediction is performed at the user-side. Additionally, this research is not only useful but also pedagogical because it involves a variety of topics like (i) mobile computing, (ii) mobile security, and (iii) human behavior recognition.


Sign in / Sign up

Export Citation Format

Share Document