scholarly journals Research Review on the Application of Homomorphic Encryption in Database Privacy Protection

Author(s):  
Yong Ma ◽  
Jiale Zhao ◽  
Kangshun Li ◽  
Yuanlong Cao ◽  
Huyuan Chen ◽  
...  

With the advent and development of database applications such as big data and data mining, how to ensure the availability of data without revealing sensitive information has been a significant problem for database privacy protection. As a critical technology to solve this problem, homomorphic encryption has become a hot research area in information security at home and abroad in recent years. The paper sorted out, analyzed, and summarized the research progress of homomorphic encryption technology in database privacy protection. Moreover, the application of three different types of homomorphic encryption technology in database privacy protection was introduced respectively, and the rationale and characteristics of each technique were analyzed and explained. Ultimately, this research summarized the challenges and development trends of homomorphic encryption technology in the application of database privacy protection, which provides a reference for future research.

2019 ◽  
Vol 23 (1) ◽  
pp. 421-452 ◽  
Author(s):  
Yongfeng Wang ◽  
Zheng Yan ◽  
Wei Feng ◽  
Shushu Liu

AbstractThe unprecedented proliferation of mobile smart devices has propelled a promising computing paradigm, Mobile Crowd Sensing (MCS), where people share surrounding insight or personal data with others. As a fast, easy, and cost-effective way to address large-scale societal problems, MCS is widely applied into many fields, e.g., environment monitoring, map construction, public safety, etc. Despite the popularity, the risk of sensitive information disclosure in MCS poses a serious threat to the participants and limits its further development in privacy-sensitive fields. Thus, the research on privacy protection in MCS becomes important and urgent. This paper targets the privacy issues of MCS and conducts a comprehensive literature research on it by providing a thorough survey. We first introduce a typical system structure of MCS, summarize its characteristics, propose essential requirements on privacy on the basis of a threat model. Then, we survey existing solutions on privacy protection and evaluate their performances by employing the proposed requirements. In essence, we classify the privacy protection schemes into four categories with regard to identity privacy, data privacy, attribute privacy, and task privacy. Besides, we review the achievements on privacy-preserving incentives in MCS from four viewpoints of incentive measures: credit incentive, auction incentive, currency incentive, and reputation incentive. Finally, we point out some open issues and propose future research directions based on the findings from our survey.


2021 ◽  
Vol 22 (2) ◽  
pp. 97-126
Author(s):  
Sherly Artadita ◽  
Hisyam Hisyam

The growing Muslim population worldwide entice many countries to rule the burgeoning halal market, including the tourism sector. With its potential in reshaping the global tourism industry, researchers have been investigating key aspects that may smooth the operations of this unique tourism practice. In line with that, this study aims to analyze the research progress of halal tourism published from 2011 to 2020, summarize the identified key themes and issues, and suggest for future research area in halal tourism. In doing so, qualitative approach combining the bibliometric analysis, network analysis, and content analysis was employed to examine prior research on ‘halal tourism’ obtained from ‘Scopus’ database. VOSviewer and Microsoft Excel software are employed to process a total of 230 peer-reviewed articles, carefully selected based on relevant query and context, such as years, document type, country, journal’s name, authors’ name, number of authors, and the keywords that frequently used by authors. The major finding of this study is the disclosure of keywords connection which grouping into three various clusters. These three clusters have their own prime keyword, namely Islamic tourism, tourism, and halal tourism. The overall analysis and the summary in this study is designed to provide insights that help researchers to design future halal tourism research agenda. As for the practitioners, this article could be a reference that may help them to have better understanding of the development, issues, and possible solutions related to the implementation of halal tourism.


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Olufunke Oladimeji ◽  
Jennifer Cross ◽  
Heather Keathley-Herring

PurposeA systematic literature review (SLR) was used to identify and analyze literature related to use of system dynamics (SD) applications in organizational performance measurement (PM) research. The purpose of this article is to present the results of a thematic analysis (TA) conducted to synthesize existing empirical evidence, investigate trends and evaluate developments in the research area.Design/methodology/approachA SLR was conducted resulting in a dataset of 97 articles in this research area. Using TA, major themes/subthemes were inductively synthesized to explore the current development and emerging trends and provide guidance for future research.FindingsThe TA resulted in seven themes in the research area – Enhancing knowledge, Approaches to operationalizing PM systems, Utilizing simulation models, Improving organizational outcomes, Achieving strategic alignment, Applying systems thinking and Identifying critical variables. The analysis suggests that although SD has the potential to improve PM systems, there are many limitations and challenges that must be addressed to improve implementation and practical applications. In addition, the results showed that much of the work is exploratory and many fail to fully validate their models suggesting that this research is still in an relatively early phase of development.Research limitations/implicationsThe results of this study are limited to the 97 articles identified using the SLR protocol. Although the search was designed to be comprehensive, there may be other relevant literature that was excluded. Further, the TA was limited to addressing the research questions.Practical implicationsA key insight for managers is that these tools would support decision-makers in understanding performance behaviors and identifying performance drivers for improvement. This suggests that stakeholders can adopt the approach to improve understanding and effectiveness of PM, and to enhance strategic decision-making.Originality/valueThis study provides a distinct and thorough analysis of this research area by conducting an inductive synthesis of developments and challenges and guidance for future research and practice. The resulting thematic model, identified code definitions and proposed framework of strategies to overcome challenges, provide a general overview and resource to support future studies in the research area and facilitate practical use of SD capabilities to support PM.


2021 ◽  
Vol 54 (2) ◽  
pp. 1-36
Author(s):  
Bo Liu ◽  
Ming Ding ◽  
Sina Shaham ◽  
Wenny Rahayu ◽  
Farhad Farokhi ◽  
...  

The newly emerged machine learning (e.g., deep learning) methods have become a strong driving force to revolutionize a wide range of industries, such as smart healthcare, financial technology, and surveillance systems. Meanwhile, privacy has emerged as a big concern in this machine learning-based artificial intelligence era. It is important to note that the problem of privacy preservation in the context of machine learning is quite different from that in traditional data privacy protection, as machine learning can act as both friend and foe. Currently, the work on the preservation of privacy and machine learning are still in an infancy stage, as most existing solutions only focus on privacy problems during the machine learning process. Therefore, a comprehensive study on the privacy preservation problems and machine learning is required. This article surveys the state of the art in privacy issues and solutions for machine learning. The survey covers three categories of interactions between privacy and machine learning: (i) private machine learning, (ii) machine learning-aided privacy protection, and (iii) machine learning-based privacy attack and corresponding protection schemes. The current research progress in each category is reviewed and the key challenges are identified. Finally, based on our in-depth analysis of the area of privacy and machine learning, we point out future research directions in this field.


Sensors ◽  
2021 ◽  
Vol 21 (19) ◽  
pp. 6494
Author(s):  
Jeremiah Abimbola ◽  
Daniel Kostrzewa ◽  
Pawel Kasprowski

This paper presents a thorough review of methods used in various research articles published in the field of time signature estimation and detection from 2003 to the present. The purpose of this review is to investigate the effectiveness of these methods and how they perform on different types of input signals (audio and MIDI). The results of the research have been divided into two categories: classical and deep learning techniques, and are summarized in order to make suggestions for future study. More than 110 publications from top journals and conferences written in English were reviewed, and each of the research selected was fully examined to demonstrate the feasibility of the approach used, the dataset, and accuracy obtained. Results of the studies analyzed show that, in general, the process of time signature estimation is a difficult one. However, the success of this research area could be an added advantage in a broader area of music genre classification using deep learning techniques. Suggestions for improved estimates and future research projects are also discussed.


2020 ◽  
Vol 21 (13) ◽  
pp. 996-1008
Author(s):  
Mengli Wang ◽  
Qiuzheng Du ◽  
Lihua Zuo ◽  
Peng Xue ◽  
Chao Lan ◽  
...  

Background: As a new tumor therapy, targeted therapy is becoming a hot topic due to its high efficiency and low toxicity. Drug effects of targeted tumor drugs are closely related to pharmacokinetics, so it is important to understand their distribution and metabolism in vivo. Methods: A systematic review of the literature on the metabolism and distribution of targeted drugs over the past 20 years was conducted, and the pharmacokinetic parameters of approved targeted drugs were summarized in combination with the FDA's drug instructions. Targeting drugs are divided into two categories: small molecule inhibitors and monoclonal antibodies. Novel targeting drugs and their mechanisms of action, which have been developed in recent years, are summarized. The distribution and metabolic processes of each drug in the human body are reviewed. Results: In this review, we found that the distribution and metabolism of small molecule kinase inhibitors (TKI) and monoclonal antibodies (mAb) showed different characteristics based on the differences of action mechanism and molecular characteristics. TKI absorbed rapidly (Tmax ≈ 1-4 h) and distributed in large amounts (Vd > 100 L). It was mainly oxidized and reduced by cytochrome P450 CYP3A4. However, due to the large molecular diameter, mAb was distributed to tissues slowly, and the volume of distribution was usually very low (Vd < 10 L). It was mainly hydrolyzed and metabolized into peptides and amino acids by protease hydrolysis. In addition, some of the latest drugs are still in clinical trials, and the in vivo process still needs further study. Conclusion: According to the summary of the research progress of the existing targeting drugs, it is found that they have high specificity, but there are still deficiencies in drug resistance and safety. Therefore, the development of safer and more effective targeted drugs is the future research direction. Meanwhile, this study also provides a theoretical basis for clinical accurate drug delivery.


2019 ◽  
Vol 14 ◽  
Author(s):  
Khaleel Ahmad ◽  
Afsar Kamal

Background: Privacy enhancing techniques are developed in order to provide strong protection to cyberspace. These techniques aim to allow users to keep their identities hidden during the communication when they are sending email, making payments online, browsing the Web or posting to newsgroups. MixNet is the most practical solution for concealing identities of message and sender’s identities. Objective: It provides sender and receiver anonymity as well as message security. The main goal of MixNet is to overcome vulnerability and enhance the performance of communication. It can efficiently handle the messages of various length and produce desirable results with privacy. The main objective of this paper is to acquire information and concepts regarding MixNet. We also provide guidelines for future research and references. Methods : The designing of MixNet depends on what cryptosystem method is used. Symmetric and Asymmetric both are used. Other methods could be also used such as PIR, CSP and FDR model, RPC, Token-based approach or others. Result: In this paper we provide an overview of MixNet approaches and presented a survey on MixNet based techniques and different models. We also constructed the comparison tables as per our requirements for better understanding. For this purpose, we found a total of 120 articles related to the MixNet published between 1990 and 2018 from the most relevant scientific resources. However, only 86 papers were analyzed due to comprehensiveness and relevancy to this article. Conclusion: Focused on the security and privacy of communication and how it can be achieved. This survey also reveals research progress and research gap on MixNet.


Author(s):  
Xu Pei-Zhen ◽  
Lu Yong-Geng ◽  
Cao Xi-Min

Background: Over the past few years, the subsynchronous oscillation (SSO) caused by the grid-connected wind farm had a bad influence on the stable operation of the system and has now become a bottleneck factor restricting the efficient utilization of wind power. How to mitigate and suppress the phenomenon of SSO of wind farms has become the focus of power system research. Methods: This paper first analyzes the SSO of different types of wind turbines, including squirrelcage induction generator based wind turbine (SCIG-WT), permanent magnet synchronous generator- based wind turbine (PMSG-WT), and doubly-fed induction generator based wind turbine (DFIG-WT). Then, the mechanisms of different types of SSO are proposed with the aim to better understand SSO in large-scale wind integrated power systems, and the main analytical methods suitable for studying the SSO of wind farms are summarized. Results: On the basis of results, using additional damping control suppression methods to solve SSO caused by the flexible power transmission devices and the wind turbine converter is recommended. Conclusion: The current development direction of the SSO of large-scale wind farm grid-connected systems is summarized and the current challenges and recommendations for future research and development are discussed.


Author(s):  
Jyoti Sharma ◽  
Lata Raj ◽  
Anil Gupta

The purpose of this study is to measure the existence of co-creation behavior between doctors and patients. The research also studies customer participation and customer citizenship behavior as the dimensions of co-creative behavior and tries to establish the relationship between co-creative behavior and satisfaction. This study uses Yi and Gong (2013) scale for collecting data regarding co-creation behavior and its dimensions which are customer participation (CP) and customer citizenship behavior (CCB). The data was collected from 204 patients who were suffering from various chronic/lifestyle diseases and getting their treatment from private clinics in Jammu city. The study uses 7-point Likert scale in the questionnaire ranging from 1 completely disagree through 7 completely agree, with a midpoint labeled 4 neither agree nor disagree. The analysis of paper reflects that co-creation behavior is prevalent among the patients and not only participation but the citizenship behavior also affects the co-creation behavior of patients. The study is conducted from patients point of view whereas doctors perspective should also be used in future research. The research area is restricted to Jammu city only. The research provides several implications-doctors can also use this scale for market segmentation and customer profiling for maximizing customer value co-creation behavior by gaining the useful information.


Author(s):  
Bianca Beersma ◽  
Gerben A. van Kleef ◽  
Maria T. M. Dijkstra

This chapter provides an overview of the antecedents and consequences of gossip in work groups. First, the chapter reviews the different motives for gossip in work groups (i.e., bonding, entertainment, emotional venting, information exchange, maintenance of group norms/social order, and interpersonal aggression) and links each motive to psychological theory. Second, the chapter reviews the different types of influence that gossip can have on various indicators of group effectiveness. Reflecting on the motives underlying gossip in work groups, as well as on its outcomes, it argues that future research should start integrating the diverse insights provided by earlier research on both gossip motives and outcomes, and it provides a number of suggestions for doing so.


Sign in / Sign up

Export Citation Format

Share Document