With the rapid development of sensor acquisition technology, more and more data are collected, analyzed, and encapsulated into application services. However, most of applications are developed by untrusted third parties. Therefore, it has become an urgent problem to protect users’ privacy in data publication. Since the attacker may identify the user based on the combination of user’s quasi-identifiers and the fewer quasi-identifier fields result in a lower probability of privacy leaks, therefore, in this paper, we aim to investigate an optimal number of quasi-identifier fields under the constraint of trade-offs between service quality and privacy protection. We first propose modelling the service development process as a cooperative game be...
Cloud services enable companies to outsource data storage and computation. Resource-limited entities...
Use of technology for data collection and analysis has seen an unprecedented growth in the last coup...
One of the approaches to the problem of data-privacy protection is given by the application of obfus...
Privacy issues arising in the process of collecting, publishing and mining individuals' personal dat...
Part 3: Confidentiality and PrivacyInternational audiencePrivacy protection appears as a fundamental...
The popularity of context-aware services is improving the quality of life, while raising serious pri...
Abstract-Security and maintaining privacy of data, have become a challenging issue with innovations ...
Privacy preservation is one of the greatest concerns when data is shared between different organizat...
Empirical thesis.Bibliography: pages 55-62.1. Introduction -- 2. Literature review -- 3. Privacy pre...
With the rapid growth of network of devices with embedded technology, mobile crowdsensing (MCS) has ...
We address the fundamental tradeoff between privacy preservation and high-quality recommendation ste...
Consider users who share their data (e.g., location) with an untrusted service provider to obtain a ...
Abstract—In pervasive computing environments, personal information is expressed in digital forms to ...
© 2018 IEEE. Due to dramatically increasing information published in social networks, privacy issues...
<div><p>Given the potential wealth of insights in personal data the big databases can provide, many ...
Cloud services enable companies to outsource data storage and computation. Resource-limited entities...
Use of technology for data collection and analysis has seen an unprecedented growth in the last coup...
One of the approaches to the problem of data-privacy protection is given by the application of obfus...
Privacy issues arising in the process of collecting, publishing and mining individuals' personal dat...
Part 3: Confidentiality and PrivacyInternational audiencePrivacy protection appears as a fundamental...
The popularity of context-aware services is improving the quality of life, while raising serious pri...
Abstract-Security and maintaining privacy of data, have become a challenging issue with innovations ...
Privacy preservation is one of the greatest concerns when data is shared between different organizat...
Empirical thesis.Bibliography: pages 55-62.1. Introduction -- 2. Literature review -- 3. Privacy pre...
With the rapid growth of network of devices with embedded technology, mobile crowdsensing (MCS) has ...
We address the fundamental tradeoff between privacy preservation and high-quality recommendation ste...
Consider users who share their data (e.g., location) with an untrusted service provider to obtain a ...
Abstract—In pervasive computing environments, personal information is expressed in digital forms to ...
© 2018 IEEE. Due to dramatically increasing information published in social networks, privacy issues...
<div><p>Given the potential wealth of insights in personal data the big databases can provide, many ...
Cloud services enable companies to outsource data storage and computation. Resource-limited entities...
Use of technology for data collection and analysis has seen an unprecedented growth in the last coup...
One of the approaches to the problem of data-privacy protection is given by the application of obfus...