Privacy preserving in a secure network
نویسندگان
چکیده
منابع مشابه
Secure Profile Matching and Privacy Preserving In Mobile Social Network
As the increasing use of mobile devices, mobile social networks (MSNs) are becoming an inseparable part of peoples’ lives. In existing systems for such services, usually all the users directly publish their complete profiles for others to search. However in this paper we create a profile matching application which helps user to find the people whose profile best matches with others people. In t...
متن کاملSecure and Privacy-Preserving Consensus
Consensus is fundamental for distributed systems since it underpins key functionalities of such systems ranging from distributed information fusion, decision-making, to decentralized control. In order to reach an agreement, existing consensus algorithms require each agent to exchange explicit state information with its neighbors. This leads to the disclosure of private state information, which ...
متن کاملPrivacy-preserving Network Provenance
Network accountability, forensic analysis, and failure diagnosis are becoming increasingly important for network management and security. Network provenance significantly aids network administrators in these tasks by explaining system behavior and revealing the dependencies between system states. Although resourceful, network provenance can sometimes be too rich, revealing potentially sensitive...
متن کاملPrivacy-Preserving Network Aggregation
Consider the scenario where information about a large network is distributed across several different parties (examples may include Facebook social networks or email communications networks). Intuitively, we would expect that the aggregate network formed by combining the individual private networks would be a more faithful representation of the underlying network as a whole. Thus, it would be u...
متن کاملSecure Cloud Storage with Data Dynamics and Privacy-Preserving Audits Using Secure Network Coding
In the age of cloud computing, cloud users with a limited amount of storage can outsource their data to remote servers. The cloud servers, in lieu of monetary benefits, offer retrievability of their clients’ data at any point of time. Secure cloud storage protocols ensure the integrity of the outsourced data that can be dynamic (or static) in nature depending on whether the client can (or canno...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IJARCCE
سال: 2015
ISSN: 2278-1021
DOI: 10.17148/ijarcce.2015.4159