Search results for "data privacy"

showing 10 items of 12 documents

Multi-party metering: An architecture for privacy-preserving profiling schemes

2013

Several privacy concerns about the massive deploy- ment of smart meters have been arisen recently. Namely, it has been shown that the fine-grained temporal traces generated by these meters can be correlated with different users behaviors. A new architecture, called multi-party metering, for enabling privacy-preserving analysis of high-frequency metering data without requiring additional complexity at the smart meter side is here proposed. The idea is to allow multiple entities to get a share of the high-frequency metering data rather than the real data, where this share does not reveal any information about the real data. By aggregating the shares provided by different users and publishing …

OptimizationInformation privacyEngineeringtatistical analysiSmart meterDistributed computingpattern clusteringC.2 COMPUTER-COMMUNICATION NETWORKSSmart gridelectricity supply industryComputer securitycomputer.software_genreCOMPUTER-COMMUNICATION NETWORKSElectricityClustering algorithmProfiling (information science)Metering modemart meterIndexeArchitectureCluster analysisgas industrydata privacybusiness.industrySettore ING-INF/03 - TelecomunicazioniComplexity theoryreal gas consumption dataVectorsA sharehigh-frequency metering datamultiparty meteringInformation sensitivityynthetic electricity consumption dataCryptographyprivacy-preserving profiling schemeprivacy-preserving analysibusinesscomputeruser profiling clustering mechanismMulti-Party Metering
researchProduct

Rings for Privacy: an Architecture for Large Scale Privacy-Preserving Data Mining

2021

This article proposes a new architecture for privacy-preserving data mining based on Multi Party Computation (MPC) and secure sums. While traditional MPC approaches rely on a small number of aggregation peers replacing a centralized trusted entity, the current study puts forth a distributed solution that involves all data sources in the aggregation process, with the help of a single server for storing intermediate results. A large-scale scenario is examined and the possibility that data become inaccessible during the aggregation process is considered, a possibility that traditional schemes often neglect. Here, it is explicitly examined, as it might be provoked by intermittent network connec…

020203 distributed computingInformation privacyDistributed databasesDistributed databaseSettore ING-INF/03 - TelecomunicazioniComputer scienceReliability (computer networking)Secure Multi-Party Computation02 engineering and technologycomputer.software_genreSecret sharingData Mining; Data privacy; Distributed databases; Peer-to-peer computing; Secret sharing; Secure Multi-Party ComputationComputational Theory and MathematicsHardware and ArchitectureServerSignal Processing0202 electrical engineering electronic engineering information engineeringSecure multi-party computationData MiningData miningPeer-to-peer computingC-means data mining Privacy secret sharing secure multi-party computationSecret sharingcomputerData privacy
researchProduct

A Logical Key Hierarchy Based approach to preserve content privacy in Decentralized Online Social Networks

2020

Distributed Online Social Networks (DOSNs) have been proposed to shift the control over user data from a unique entity, the online social network provider, to the users of the DOSN themselves. In this paper we focus on the problem of preserving the privacy of the contents shared to large groups of users. In general, content privacy is enforced by encrypting the content, having only authorized parties being able to decrypt it. When efficiency has to be taken into account, new solutions have to be devised that: i) minimize the re-encryption of the contents published in a group when the composition of the group changes; and, ii) enable a fast distribution of the cryptographic keys to all the m…

Theoretical computer scienceFacebookComputer scienceInformation privacyCyber SecurityGroup communicationJoinsEncryptionEncryptioncomputer.software_genreKey managementSet (abstract data type)Peer-to-peer computingElectrical and Electronic EngineeringFocus (computing)VegetationSocial networkSettore INF/01 - Informaticabusiness.industryGroup (mathematics)Composition (combinatorics)Decentralized Online Social NetworksDecentralized Online Social Networks; Encryption; Facebook; Group communication; Information privacy; Key management; Peer-to-peer computing; Privacy; Vegetation; Electrical and Electronic EngineeringPrivacyContent (measure theory)Decentralized online social networkData miningbusinesscomputerData privacy
researchProduct

Rings for privacy: An architecture for privacy-preserving user profiling

2014

Information privacysocial networking (online) data privacy human factors InternetSettore ING-INF/03 - TelecomunicazioniComputer sciencePrivacy softwarebusiness.industryInternet privacyComputer securitycomputer.software_genrePrivacy preservingprivacy-preserving users profiling FCM clustering distributed unstable scenarioProfiling (information science)The InternetArchitecturebusinesscomputer
researchProduct

A secret sharing scheme for anonymous DNS queries

2013

Since its adoption in the early 90's, several privacy concerns have emerged about the Domain Name System (DNS). By collecting the DNS queries performed by each user, it is possible to characterize habits, interests and other sensitive data of the users. Usually, users resolve their {\em url} requests by querying the DSN server belonging to their Internet Service Provider (ISP) and therefore they assume they can trust it. However, different DNS servers can be used, by revealing sensitive data to a partially untrusted entity that can collect and sell this data for several purposes (target advertising, user profiling, etc.). In this paper we address the possibility to integrate tools in the cu…

Name serverInformation privacyComputer scienceRound-robin DNSecret sharing schemeOverlay networkServersServernsupdateISPDNS spoofingPeer-to-peer computingDNS hijackingdomain name systemInternetdata privacyender anonymitybusiness.industrySettore ING-INF/03 - TelecomunicazioniDomain Name Systemquery processinguser privacyComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSmultiple nodeIP networkInternet service provideranonymous DNS queryPrivacyecurity of dataCryptographybusinessComputer networkDSN serverRadiation detector
researchProduct

Communication-Efficient Federated Learning in Channel Constrained Internet of Things

2022

Federated learning (FL) is able to utilize the computing capability and maintain the privacy of the end devices by collecting and aggregating the locally trained learning model parameters while keeping the local personal data. As the most widely-used FL framework,Jederated averaging (FedAvg) suffers an expensive communication cost especially when there are large amounts of devices involving the FL process. Moreover, when considering asynchronous FL, the slowest device becomes the bottleneck for the cask effect and determines the overall latency. In this work, we propose a communication-efficient federated learning framework with partial model aggregation (CE-FedPA) algorithm to utilize comp…

data privacytietosuojatrainingkoneoppiminenfederated learningcostssimulointiesineiden internetsimulationtiedonsiirtoperformance evaluationdata integrity
researchProduct

Reverse-Safe Text Indexing

2021

We introduce the notion of reverse-safe data structures. These are data structures that prevent the reconstruction of the data they encode (i.e., they cannot be easily reversed). A data structure D is called z - reverse-safe when there exist at least z datasets with the same set of answers as the ones stored by D . The main challenge is to ensure that D stores as many answers to useful queries as possible, is constructed efficiently, and has size close to the size of the original dataset it encodes. Given a text of length n and an integer z , we propose an algorithm that constructs a z -reverse-safe data structure ( z -RSDS) that has size O(n) and answers decision and counting pattern matc…

Data structuresComputer scienceSuffix treesuffix tree0102 computer and information sciences02 engineering and technologytext indexing01 natural sciencesTheoretical Computer Sciencelaw.inventionSet (abstract data type)law020204 information systems0202 electrical engineering electronic engineering information engineeringPattern matchingdata privacySettore INF/01 - InformaticaSearch engine indexingdata privacy; Data structures; pattern matching; suffix tree; text indexingData structureMatrix multiplicationpattern matching010201 computation theory & mathematicsData structureAlgorithmAdversary modelInteger (computer science)ACM Journal of Experimental Algorithmics
researchProduct

Privacy and temporal aware allocation of data in decentralized online social networks

2017

Distributed Online Social Networks (DOSNs) have recently been proposed to grant users more control over the data they share with the other users. Indeed, in contrast to centralized Online Social Networks (such as Facebook), DOSNs are not based on centralized storage services, because the contents shared by the users are stored on the devices of the users themselves. One of the main challenges in a DOSN comes from guaranteeing availability of the users' contents when the data owner disconnects from the network. In this paper, we focus our attention on data availability by proposing a distributed allocation strategy which takes into account both the privacy policies defined on the contents an…

Information privacyComputer sciencePrivacy policyControl (management)02 engineering and technologyInterval (mathematics)Computer securitycomputer.software_genreAvailability predictionTheoretical Computer ScienceSet (abstract data type)0202 electrical engineering electronic engineering information engineeringFocus (computing)Social networkSettore INF/01 - Informaticabusiness.industry020206 networking & telecommunicationsData availabilityOrder (business)Computer ScienceDecentralized online social networkDecentralized online social networks020201 artificial intelligence & image processingbusinesscomputerData privacyComputer network
researchProduct

ISO/IEC 27001 -standardi yleisen tietosuoja-asetuksen kontekstissa

2017

EU:n tietosuojalainsäädäntö uudistui 24.5.2016, kun yleinen tietosuoja-asetus astui voimaan ja lakia aletaan soveltaa käytännössä kahden vuoden siirtymäajan jälkeen 25.5.2018. Tämä yleinen tietosuoja-asetus on merkittävä uudistus, joka esittelee monia lisäyksiä ja tarkennuksia vanhaan henkilödirektiiviin ja tutkielman kirjoittamisen ajankohtana siirtymäaika on jo käynnissä. Tutkielma toteutettiin kirjallisuuskatsauksena ja tutkielman varsinaisena tarkoituksena oli selvittää, pystyykö tunnettu tietoturvallisuuden hallintajärjestelmä -standardi, ISO/IEC 27001:2013, vastaamaan yleisen tietosuoja-asetuksen moniin vaatimuksiin. Toisin sanoen tarkoituksena oli vertailla standardin ja asetuksen va…

data privacytietosuojalainsäädäntöpersonal datahenkilötietolakistandardsstandardittietoturvaEU-legislation
researchProduct

A Survey on Privacy in Decentralized Online Social Networks

2018

Decentralized Online Social Networks (DOSNs) have recently captured the interest of users because of the more control given to them over their shared contents. Indeed, most of the user privacy issues related to the centralized Online Social Network (OSN) services (such as Facebook or Google+) do not apply in the case of DOSNs because of the absence of the centralized service provider. However, these new architectures have motivated researchers to investigate new privacy solutions that allow DOSN’s users to protect their contents by taking into account the decentralized nature of the DOSNs platform. In this survey, we provide a comprehensive overview of the privacy solutions adopted by…

Information privacyData privacy; Decentralized online social network; Access control; Security; Peer to peer computingGeneral Computer ScienceSocial networkbusiness.industryComputer sciencePrivacy policyControl (management)Internet privacyComputer Science (all)020206 networking & telecommunicationsAccess controlPeer to peer computing02 engineering and technologyService providerTheoretical Computer ScienceOverhead (business)0202 electrical engineering electronic engineering information engineeringSecurityDecentralized online social network020201 artificial intelligence & image processingAccess controlEnforcementbusinessData privacy
researchProduct