A framework for protecting personal information and privacy
نویسندگان
چکیده
User’s security and privacy are core issues of network applications. This paper proposes a privacy protection model to evaluate property risk of users, which takes into account both sensitivity of the property and requester’s level of assurance. Furthermore, the sensitivity of the property is evaluated by problem of expectation–maximization algorithm. Experiments show that the optimal size of samples for EM is relatively small, which indicates the high efficiency of the algorithm. The proposed privacy protection model cannot only assist users to do correct authorization, but also benefit the privacy reservation of users in online service. Copyright © 2015 John Wiley & Sons, Ltd.
منابع مشابه
A Sudy on Information Privacy Issue on Social Networks
In the recent years, social networks (SN) are now employed for communication and networking, socializing, marketing, as well as one’s daily life. Billions of people in the world are connected though various SN platforms and applications, which results in generating massive amount of data online. This includes personal data or Personally Identifiable Information (PII). While more and more data a...
متن کاملA centralized privacy-preserving framework for online social networks
There are some critical privacy concerns in the current online social networks (OSNs). Users' information is disclosed to different entities that they were not supposed to access. Furthermore, the notion of friendship is inadequate in OSNs since the degree of social relationships between users dynamically changes over the time. Additionally, users may define similar privacy settings for their f...
متن کاملData Merging Method by Protecting Energy in Wireless Sensor Networks
Privacy protecting is a direct manifestation of information confidentiality, such as the perception of the terminal location information. Data collection is an important information resource of things, and it is also one of the needs for protecting sensitive information. Privacy protecting has a significant role in application of the Cyber Physical Systems (CPS). As a part of the Internet Techn...
متن کاملAccessibility Evaluation in Biometric Hybrid Architecture for Protecting Social Networks Using Colored Petri Nets
In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...
متن کاملAccessibility Evaluation in Biometric Hybrid Architecture for Protecting Social Networks Using Colored Petri Nets
In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...
متن کاملA User-Centric Privacy Framework for Pervasive Environments
One distinctive feature of pervasive computing environments is the common need to gather and process context information about real persons. Unfortunately, this unavoidably affects persons’ privacy. Each time someone uses a cellular phone, a credit card, or surfs the web, he leaves a trace that is stored and processed. In a pervasive sensing environment, however, the amount of information colle...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Security and Communication Networks
دوره 8 شماره
صفحات -
تاریخ انتشار 2015