Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (166)
  • Open Access

    ARTICLE

    Multi-Source Data Privacy Protection Method Based on Homomorphic Encryption and Blockchain

    Ze Xu, Sanxing Cao*

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.1, pp. 861-881, 2023, DOI:10.32604/cmes.2023.025159

    Abstract Multi-Source data plays an important role in the evolution of media convergence. Its fusion processing enables the further mining of data and utilization of data value and broadens the path for the sharing and dissemination of media data. However, it also faces serious problems in terms of protecting user and data privacy. Many privacy protection methods have been proposed to solve the problem of privacy leakage during the process of data sharing, but they suffer from two flaws: 1) the lack of algorithmic frameworks for specific scenarios such as dynamic datasets in the media domain; 2) the inability to solve… More > Graphic Abstract

    Multi-Source Data Privacy Protection Method Based on Homomorphic Encryption and Blockchain

  • Open Access

    ARTICLE

    Trust and QoS-Driven Query Service Provisioning Using Optimization

    K. Narmatha1,*, K. Karthikeyan2

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1827-1844, 2023, DOI:10.32604/iasc.2023.028473

    Abstract The growing advancements with the Internet of Things (IoT) devices handle an enormous amount of data collected from various applications like healthcare, vehicle-based communication, and smart city. This research analyses cloud-based privacy preservation over the smart city based on query computation. However, there is a lack of resources to handle the incoming data and maintain them with higher privacy and security. Therefore, a solution based idea needs to be proposed to preserve the IoT data to set an innovative city environment. A querying service model is proposed to handle the incoming data collected from various environments as the data is… More >

  • Open Access

    ARTICLE

    Research on Federated Learning Data Sharing Scheme Based on Differential Privacy

    Lihong Guo*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5069-5085, 2023, DOI:10.32604/cmc.2023.034571

    Abstract To realize data sharing, and to fully use the data value, breaking the data island between institutions to realize data collaboration has become a new sharing mode. This paper proposed a distributed data security sharing scheme based on C/S communication mode, and constructed a federated learning architecture that uses differential privacy technology to protect training parameters. Clients do not need to share local data, and they only need to upload the trained model parameters to achieve data sharing. In the process of training, a distributed parameter update mechanism is introduced. The server is mainly responsible for issuing training commands and… More >

  • Open Access

    ARTICLE

    A GDPR Compliant Approach to Assign Risk Levels to Privacy Policies

    Abdullah R. Alshamsan1, Shafique A. Chaudhry1,2,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 4631-4647, 2023, DOI:10.32604/cmc.2023.034039

    Abstract Data privacy laws require service providers to inform their customers on how user data is gathered, used, protected, and shared. The General Data Protection Regulation (GDPR) is a legal framework that provides guidelines for collecting and processing personal information from individuals. Service providers use privacy policies to outline the ways an organization captures, retains, analyzes, and shares customers’ data with other parties. These policies are complex and written using legal jargon; therefore, users rarely read them before accepting them. There exist a number of approaches to automating the task of summarizing privacy policies and assigning risk levels. Most of the… More >

  • Open Access

    ARTICLE

    Block Verification Mechanism Based on Zero-Knowledge Proof in Blockchain

    Jin Wang1, Wei Ou1, Osama Alfarraj2, Amr Tolba2, Gwang-Jun Kim3,*, Yongjun Ren4

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1805-1819, 2023, DOI:10.32604/csse.2023.029622

    Abstract Since transactions in blockchain are based on public ledger verification, this raises security concerns about privacy protection. And it will cause the accumulation of data on the chain and resulting in the low efficiency of block verification, when the whole transaction on the chain is verified. In order to improve the efficiency and privacy protection of block data verification, this paper proposes an efficient block verification mechanism with privacy protection based on zero-knowledge proof (ZKP), which not only protects the privacy of users but also improves the speed of data block verification. There is no need to put the whole… More >

  • Open Access

    ARTICLE

    Computer Forensics Framework for Efficient and Lawful Privacy-Preserved Investigation

    Waleed Halboob1,*, Jalal Almuhtadi1,2

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 2071-2092, 2023, DOI:10.32604/csse.2023.024110

    Abstract Privacy preservation (PP) in Digital forensics (DF) is a conflicted and non-trivial issue. Existing solutions use the searchable encryption concept and, as a result, are not efficient and support only a keyword search. Moreover, the collected forensic data cannot be analyzed using existing well-known digital tools. This research paper first investigates the lawful requirements for PP in DF based on the organization for economic co-operation and development OECB) privacy guidelines. To have an efficient investigation process and meet the increased volume of data, the presented framework is designed based on the selective imaging concept and advanced encryption standard (AES). The… More >

  • Open Access

    ARTICLE

    An Adaptive Privacy Preserving Framework for Distributed Association Rule Mining in Healthcare Databases

    Hasanien K. Kuba1, Mustafa A. Azzawi2, Saad M. Darwish3,*, Oday A. Hassen4, Ansam A. Abdulhussein5

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4119-4133, 2023, DOI:10.32604/cmc.2023.033182

    Abstract It is crucial, while using healthcare data, to assess the advantages of data privacy against the possible drawbacks. Data from several sources must be combined for use in many data mining applications. The medical practitioner may use the results of association rule mining performed on this aggregated data to better personalize patient care and implement preventive measures. Historically, numerous heuristics (e.g., greedy search) and metaheuristics-based techniques (e.g., evolutionary algorithm) have been created for the positive association rule in privacy preserving data mining (PPDM). When it comes to connecting seemingly unrelated diseases and drugs, negative association rules may be more informative… More >

  • Open Access

    ARTICLE

    Federation Boosting Tree for Originator Rights Protection

    Yinggang Sun1, Hongguo Zhang1, Chao Ma1,*, Hai Huang1, Dongyang Zhan2,3, Jiaxing Qu4

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4043-4058, 2023, DOI:10.32604/cmc.2023.031684

    Abstract The problem of data island hinders the application of big data in artificial intelligence model training, so researchers propose a federated learning framework. It enables model training without having to centralize all data in a central storage point. In the current horizontal federated learning scheme, each participant gets the final jointly trained model. No solution is proposed for scenarios where participants only provide training data in exchange for benefits, but do not care about the final jointly trained model. Therefore, this paper proposes a new boosted tree algorithm, called RPBT (the originator Rights Protected federated Boosted Tree algorithm). Compared with… More >

  • Open Access

    ARTICLE

    Data De-identification Framework

    Junhyoung Oh1, Kyungho Lee2,*

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3579-3606, 2023, DOI:10.32604/cmc.2023.031491

    Abstract As technology develops, the amount of information being used has increased a lot. Every company learns big data to provide customized services with its customers. Accordingly, collecting and analyzing data of the data subject has become one of the core competencies of the companies. However, when collecting and using it, the authority of the data subject may be violated. The data often identifies its subject by itself, and even if it is not a personal information that infringes on an individual’s authority, the moment it is connected, it becomes important and sensitive personal information that we have never thought of.… More >

  • Open Access

    ARTICLE

    Proposed Privacy Preservation Technique for Color Medical Images

    Walid El-Shafai1,2, Hayam A. Abd El-Hameed3, Noha A. El-Hag4, Ashraf A. M. Khalaf3, Naglaa F. Soliman5, Hussah Nasser AlEisa6,*, Fathi E. Abd El-Samie1

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 719-732, 2023, DOI:10.32604/iasc.2023.031079

    Abstract Nowadays, the security of images or information is very important. This paper introduces a proposed hybrid watermarking and encryption technique for increasing medical image security. First, the secret medical image is encrypted using Advanced Encryption Standard (AES) algorithm. Then, the secret report of the patient is embedded into the encrypted secret medical image with the Least Significant Bit (LSB) watermarking algorithm. After that, the encrypted secret medical image with the secret report is concealed in a cover medical image, using Kekre’s Median Codebook Generation (KMCG) algorithm. Afterwards, the stego-image obtained is split into 16 parts. Finally, it is sent to… More >

Displaying 21-30 on page 3 of 166. Per Page  

Share Link