Multi-objective Optimization for Computer Security and Privacy
نویسندگان
چکیده
There is need for a scheme to ensure the security and privacy of the administrator and users. Providing security is different to providing privacy, because their goals differ. Security is based on organization goals, but privacy is based on user goals. Providing security and privacy must be according to organization constraints. The most important constraints in any organization are economic issues. A useful scheme must consider all these requirements. In this paper, we present a scheme that provides security and privacy and considers various constraints. We model the problem as a multi-objective optimization problem.
منابع مشابه
Exploring privacy versus data quality trade-offs in anonymization techniques using multi-objective optimization
Data anonymization techniques have received extensive attention in the privacy research community over the past several years. Various models of privacy preservation have been proposed: k–anonymity, !–diversity and t–closeness, to name a few. An oft-cited drawback of these models is that there is considerable loss in data quality arising from the use of generalization and suppression techniques...
متن کاملPrivacy-Preserving Multi-Objective Evolutionary Algorithms
Existing privacy-preserving evolutionary algorithms are limited to specific problems securing only cost function evaluation. This lack of functionality and security prevents their use for many security sensitive business optimization problems, such as our use case in collaborative supply chain management. We present a technique to construct privacypreserving algorithms that address multi-object...
متن کاملBig Data Security and Privacy Issues in the Cloud
Many organizations demand efficient solutions to store and analyze huge amount of information. Cloud computing as an enabler provides scalable resources and significant economic benefits in the form of reduced operational costs. This paradigm raises a broad range of security and privacy issues that must be taken into consideration. Multi-tenancy, loss of control, and trust are key challenges in...
متن کاملMULTI-OBJECTIVE OPTIMIZATION WITH PREEMPTIVE PRIORITY SUBJECT TO FUZZY RELATION EQUATION CONSTRAINTS
This paper studies a new multi-objective fuzzy optimization prob- lem. The objective function of this study has dierent levels. Therefore, a suitable optimized solution for this problem would be an optimized solution with preemptive priority. Since, the feasible domain is non-convex; the tra- ditional methods cannot be applied. We study this problem and determine some special structures related...
متن کاملSecurity and Privacy of Sensitive Data in Cloud Computing: A Survey of Recent Developments
Cloud computing is revolutionizing many ecosystems by providing organizations with computing resources featuring easy deployment, connectivity, configuration, automation and scalability. This paradigm shift raises a broad range of security and privacy issues that must be taken into consideration. Multi-tenancy, loss of control, and trust are key challenges in cloud computing environments. This ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- I. J. Network Security
دوره 19 شماره
صفحات -
تاریخ انتشار 2017