A framework for protecting personal information and privacy

نویسندگان

  • Hongying Zheng
  • Quan Yuan
  • Jianyong Chen
چکیده

User’s security and privacy are core issues of network applications. This paper proposes a privacy protection model to evaluate property risk of users, which takes into account both sensitivity of the property and requester’s level of assurance. Furthermore, the sensitivity of the property is evaluated by problem of expectation–maximization algorithm. Experiments show that the optimal size of samples for EM is relatively small, which indicates the high efficiency of the algorithm. The proposed privacy protection model cannot only assist users to do correct authorization, but also benefit the privacy reservation of users in online service. Copyright © 2015 John Wiley & Sons, Ltd.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Sudy on Information Privacy Issue on Social Networks

In the recent years, social networks (SN) are now employed for communication and networking, socializing, marketing, as well as one’s daily life. Billions of people in the world are connected though various SN platforms and applications, which results in generating massive amount of data online. This includes personal data or Personally Identifiable Information (PII). While more and more data a...

متن کامل

A centralized privacy-preserving framework for online social networks

There are some critical privacy concerns in the current online social networks (OSNs). Users' information is disclosed to different entities that they were not supposed to access. Furthermore, the notion of friendship is inadequate in OSNs since the degree of social relationships between users dynamically changes over the time. Additionally, users may define similar privacy settings for their f...

متن کامل

Data Merging Method by Protecting Energy in Wireless Sensor Networks

Privacy protecting is a direct manifestation of information confidentiality, such as the perception of the terminal location information. Data collection is an important information resource of things, and it is also one of the needs for protecting sensitive information. Privacy protecting has a significant role in application of the Cyber Physical Systems (CPS). As a part of the Internet Techn...

متن کامل

Accessibility Evaluation in Biometric Hybrid Architecture for Protecting Social Networks Using Colored Petri Nets

In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...

متن کامل

Accessibility Evaluation in Biometric Hybrid Architecture for Protecting Social Networks Using Colored Petri Nets

In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...

متن کامل

A User-Centric Privacy Framework for Pervasive Environments

One distinctive feature of pervasive computing environments is the common need to gather and process context information about real persons. Unfortunately, this unavoidably affects persons’ privacy. Each time someone uses a cellular phone, a credit card, or surfs the web, he leaves a trace that is stored and processed. In a pervasive sensing environment, however, the amount of information colle...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Security and Communication Networks

دوره 8  شماره 

صفحات  -

تاریخ انتشار 2015