scholarly journals Accomplishing Data Integrity and Confidentiality in Data Markets

As a noteworthy business worldview, a few on-line information stages have developed to fulfill society's wants for individual explicit learning, any place a service provider assembles raw data from data givers, at that point offers data services to data clients. Notwithstanding, inside the data exchanging level, the data customers face a squeezing issue, i.e., an approach to confirm whether the service provider has actually gathered and handled data. During this paper, we propose TPDM, that effectively compose truthfulness and Privacy protection in data Markets. TPDM is structured inside in partner degree Encrypt-then-Sign way; utilize mostly homomorphism encryption and identity-based signature. It along encourage bunch confirmation, processing, and result check, though giving identity protection and data confidentiality. We used dataset and 2015 RECS dataset, severally. Our examination and investigation results that TPDM accomplishes numerous alluring properties, though obtaining low calculation and correspondence overheads once sustaining huge size data markets

2010 ◽  
Vol 22 (1) ◽  
pp. 259-292
Author(s):  
KyungsikOh ◽  
LeeJeongHoon ◽  
Hwang, Tae-Jeong

Author(s):  
Jianhong Zhang ◽  
Yixian Yang ◽  
Xinxin Niu ◽  
Shengnan Gao ◽  
Hua Chen ◽  
...  

2014 ◽  
Vol 277 ◽  
pp. 321-326 ◽  
Author(s):  
Yu-Chi Chen ◽  
Gwoboa Horng ◽  
Chang-Chin Huang

2013 ◽  
Vol 411-414 ◽  
pp. 172-176
Author(s):  
Su Duo Li ◽  
Jing Lian Huang ◽  
Ying Xing Li ◽  
Jing Wei Deng ◽  
Kai Ying Deng

How to protect users privacy effectively while providing location based service (LBS) is a very important study of the mobile Internet. Where location k-anonymity algorithm is the most commonly used algorithm at present. However the algorithm also has some disadvantages. Therefore, this paper presents a model of LBS privacy protection based on collaboration. It divides a location-based query into two parts and sends to two entities separately. One is the location cloaking server (LCS) which calculates k-anonymous locations, and the other is location service provider (LSP) which implements the query. Except the user none of the servers could have the complete query information. By this way it protects the users privacy very well. The algorithm partly solved the problems existing in the traditional k-anonymity algorithm, and the algorithms performance was significantly increased.


Author(s):  
Jennifer Batamuliza ◽  
Damien Hanyurwimfura

Smart Grid (SG) is a modern digital metering system that was introduced by researchers to take over the traditional electricity infrastructure that existed before by gathering and putting in use the data generated by smart meters and ensure efficiency and reliability in the two directional flow of electricity and data for both the service providers and smart meters. Leakage of customers’ identity causes inconvenience to the customer because he is exposed to theft in his household. Secure anonymous key distribution scheme for SG has been proposed as solution to secure data transfer between service provider and customer. Existing secure anonymous key distribution scheme for SG brings challenge such as being inefficient, having traceability issues and do not stop replay attack hence vulnerable to DoS attacks. In this paper a Secure efficient anonymous identity-based with bilateral protocol is proposed to address the weakness in existing anonymous key distribution schemes. , With this protocol, both smart meter and service provider in (SG) identify each other anonymously in efficient way achieving un-traceability and restisting Replay and DoS attack.


2014 ◽  
Vol 6 (2) ◽  
pp. 431-449 ◽  
Author(s):  
Elzbieta Korolczuk

This article focuses on the identity work that takes place on the biggest Polish Internet forum for infertile people (www.nasz-bocian.pl). It is an example of a wider trend of “digital groupings created by and for those who struggle with the physical and emotional burden of a disease or disability, and through blogs, chats and forums contact others who have similar experiences, while staying anonymous. Participating in on-line discussions often leads to various forms of social engagement, both on-line and off-line. The sick, their family members, partners and friends cooperate in order to change the public discourse, as well as the regulation and financing of research and the treatment of certain diseases. Emergence and proliferation of such digital groupings raise questions such as: what ails these communities? How the collective identity is constructed on-line? This article examines “boundary work, which is a specific element of collective identity construction processes. The analysis concerns how the borders are established between the different sub-groups within the digital community, and how this process involves producing novel forms of identity based on a fragmented “socially legitimized childlessness. It focuses on a sub-forum” Conscious Childlessness and is based on qualitative analysis of the posts placed there. This sub-forum was established by users who do not necessarily share the dominant collective identity around which the social mobilization on infertility in Poland coalesces. They refuse to see themselves as sick people, or as patients, attempting to construct a new collective identity based on the idea of choice and the pursuit of happiness.


Sign in / Sign up

Export Citation Format

Share Document