privacy measurement
Recently Published Documents


TOTAL DOCUMENTS

19
(FIVE YEARS 9)

H-INDEX

4
(FIVE YEARS 1)

2022 ◽  
Vol 16 (1) ◽  
pp. 0-0

Privacy protection is a hot topic in network security, many scholars are committed to evaluating privacy information disclosure by quantifying privacy, thereby protecting privacy and preventing telecommunications fraud. However, in the process of quantitative privacy, few people consider the reasoning relationship between privacy information, which leads to the underestimation of privacy disclosure and privacy disclosure caused by malicious reasoning. This paper completes an experiment on privacy information disclosure in the real world based on WordNet ontology .According to a privacy measurement algorithm, this experiment calculates the privacy disclosure of public figures in different fields, and conducts horizontal and vertical analysis to obtain different privacy disclosure characteristics. The experiment not only shows the situation of privacy disclosure, but also gives suggestions and method to reduce privacy disclosure.


Sensors ◽  
2021 ◽  
Vol 21 (22) ◽  
pp. 7647
Author(s):  
Mehvish Fatima ◽  
Muhammad Wasif Nisar ◽  
Junaid Rashid ◽  
Jungeun Kim ◽  
Muhammad Kamran ◽  
...  

With the emerging growth of digital data in information systems, technology faces the challenge of knowledge prevention, ownership rights protection, security, and privacy measurement of valuable and sensitive data. On-demand availability of various data as services in a shared and automated environment has become a reality with the advent of cloud computing. The digital fingerprinting technique has been adopted as an effective solution to protect the copyright and privacy of digital properties from illegal distribution and identification of malicious traitors over the cloud. Furthermore, it is used to trace the unauthorized distribution and the user of multimedia content distributed through the cloud. In this paper, we propose a novel fingerprinting technique for the cloud environment to protect numeric attributes in relational databases for digital privacy management. The proposed solution with the novel fingerprinting scheme is robust and efficient. It can address challenges such as embedding secure data over the cloud, essential to secure relational databases. The proposed technique provides a decoding accuracy of 100%, 90%, and 40% for 10% to 30%, 40%, and 50% of deleted records.


Optik ◽  
2021 ◽  
pp. 168238
Author(s):  
Xuan Li ◽  
Yuhang Xu ◽  
Zhenghua Huang ◽  
Lei Ma ◽  
Zhi Yang
Keyword(s):  

2021 ◽  
Vol 24 (2) ◽  
pp. 1769-1774
Author(s):  
Yang Cai ◽  
Joseph Laws ◽  
Nathaniel Bauernfeind

Human vision is often guided by instinctual commonsense such as proportions and contours. In this paper, we explore how to use the proportion as the key knowledge for designing a privacy algorithm that detects human private parts in a 3D scan dataset. The Analogia Graph is introduced to study the proportion of structures. It is a graph-based representation of the proportion knowledge. The intrinsic human proportions are applied to reduce the search space by an order of magnitude. A feature shape template is constructed to match the model data points using Radial Basis Functions in a non-linear regression and the relative measurements of the height and area factors. The method is tested on 100 datasets from CAESAR database. Two surface rendering methods are studied for data privacy: blurring and transparency. It is found that test subjects normally prefer to have the most possible privacy in both rendering methods. However, the subjects adjusted their privacy measurement to a certain degree as they were informed the context of security.


2021 ◽  
Vol 10 (3) ◽  
pp. 38
Author(s):  
Louma Chaddad ◽  
Ali Chehab ◽  
Ayman Kayssi

Statistical traffic analysis has absolutely exposed the privacy of supposedly secure network traffic, proving that encryption is not effective anymore. In this work, we present an optimal countermeasure to prevent an adversary from inferring users’ online activities, using traffic analysis. First, we formulate analytically a constrained optimization problem to maximize network traffic obfuscation while minimizing overhead costs. Then, we provide OPriv, a practical and efficient algorithm to solve dynamically the non-linear programming (NLP) problem, using Cplex optimization. Our heuristic algorithm selects target applications to mutate to and the corresponding packet length, and subsequently decreases the security risks of statistical traffic analysis attacks. Furthermore, we develop an analytical model to measure the obfuscation system’s resilience to traffic analysis attacks. We suggest information theoretic metrics for quantitative privacy measurement, using entropy. The full privacy protection of OPriv is assessed through our new metrics, and then through extensive simulations on real-world data traces. We show that our algorithm achieves strong privacy protection in terms of traffic flow information without impacting the network performance. We are able to reduce the accuracy of a classifier from 91.1% to 1.42% with only 0.17% padding overhead.


IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 200112-200128
Author(s):  
Baocun Chen ◽  
Nafei Zhu ◽  
Jingsha He ◽  
Peng He ◽  
Shuting Jin ◽  
...  

2019 ◽  
Author(s):  
Tania Basso ◽  
Hebert de Oliveira Silva ◽  
Leonardo Montecchi ◽  
Breno Bernard Nicolau de França ◽  
Regina Lúcia de Oliveira Moraes

Cloud services consumers deal with a major challenge in selecting services from several providers. Facilitating these choices has become critical, and an important factor is the service trustworthiness. To be trusted by users, cloud providers should explicitly communicate their capabilities to ensure important functional and non-functional requirements (such as security, privacy, dependability, fairness, among others). Thus, models and mechanisms are required to provide indicators that can be used to support clients on choosing high quality services. This paper presents a solution to support privacy measurement and analysis, which can help the computation of trustworthiness scores. The solution is composed of a reference model for trustworthiness, a privacy model instance, and a privacy monitoring and assessment component. Finally, we provide an implementation capable of monitoring privacy-related information and performing analysis based on privacy scores for eight different datasets.


2018 ◽  
Vol 8 (10) ◽  
pp. 1790 ◽  
Author(s):  
Xuefeng Li ◽  
Yixian Yang ◽  
Yuling Chen ◽  
Xinxin Niu

Recently, the number of people who are members of multiple online social networks simultaneously has increased. However, if these people share everything with others, they risk their privacy. Users may be unaware of the privacy risks involved with sharing their sensitive information on a network. Currently, there are many research efforts focused on social identity linkage (SIL) on multiple online social networks for commercial services, which exacerbates privacy issues. Many existing studies consider methods of encrypting or deleting sensitive information without considering if this is unreasonable for social networks. Meanwhile, these studies ignore privacy awareness, which is rudimentary and critical. To enhance privacy awareness, we discuss a user privacy exposure measure for users who are members of multiple online social networks. With this measure, users can be aware of the state of their privacy and their position on a privacy measurement scale. Additionally, we propose a straightforward method through our framework to reduce information loss and foster user privacy awareness by using spurious content for required fields.


Sign in / Sign up

Export Citation Format

Share Document