Search results for "Privacy software"
showing 5 items of 15 documents
Rings for privacy: An architecture for privacy-preserving user profiling
2014
Multi-cloud privacy preserving schemes for linear data mining
2015
This paper presents an approach to privacy-preserving data mining that relies upon a relatively simple secret sharing scheme. Its main feature is that users, sensitive data owners, are engaged in the secret sharing operations that protect their privacy. They are grouped in independent clouds connected to a central unit, the data miner, that only manages the aggregated data of each cloud, therefore avoiding the disclosure of information belonging to single nodes. We propose two privacy preserving schemes, with different privacy levels and communication costs. When designing them, we assume that some users' data might become inaccessible during the operation of the privacy preserving protocol…
PRIvacy LEakage Methodology (PRILE) for IDS Rules
2010
This paper introduces a methodology for evaluating PRIvacy LEakage in signature-based Network Intrusion Detection System (IDS) rules. IDS rules that expose more data than a given percentage of all data sessions are defined as privacy leaking. Furthermore, it analyses the IDS rule attack specific pattern size required in order to keep the privacy leakage below a given threshold, presuming that occurrence frequencies of the attack pattern in normal text are known. We have applied the methodology on the network intrusion detection system Snort’s rule set. The evaluation confirms that Snort in its default configuration aims at not being excessively privacy invasive. However we have identified s…
Privacy Violation Classification of Snort Ruleset
2010
Published version of a paper presented at the 2010 18th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP). (c) 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. Paper also available from the publisher:http://dx.doi.org/10.1109/PDP.2010.87 It is important to analyse the privacy impact of Intrusion Detection System (IDS) rules, in order to understand a…
Towards enabling privacy preserving smart city apps
2016
Smart city applications are increasingly relying on personally identifiable data. A disclosure of such a data to a platform provider and possible 3rd parties represents a risk to the privacy of the application users. To mitigate the privacy risk, two-layer privacy-preserving platform architecture is introduced, wherein the personally identifiable information is dealt with at the inner layer (executed in a trusted environment), whereas only generic and personally unidentifiable information is made available to the apps at the outer layer of the architecture — e.g., in a form of app-specific events. The essential requirements for the platform are described, and the architectural implications …