User-Centric Privacy Preservation in Data-Sharing Applications
نویسندگان
چکیده
During data sharing process across people, users do not want the information that contains privacy to be shared with everyone else; some people may only want to share it with someone they are familiar with. To solve this issue of privacy preservation in data-sharing applications, we propose a novel user-centric method. Our main contributions include the followings. (1) Users can select key words or characters for their own privacy information, which is a user-centric way to protect privacy. (2) During the process of data sharing, data substitution can be used to ensure privacy preservation as well as high successful rate of data sharing. (3) Our method can be used in different data-sharing applications in a flexible way. Simulation results show that our method can achieve our privacy preservation goal.
منابع مشابه
Pervasive Context Sharing in Magpie: Adaptive Trust-Based Privacy Protection
Today’s mobile and pervasive computing devices are embedded with increasingly powerful sensing capabilities that enable them to provide exceptional spatio-temporal context acquisition that is not possible with traditional static sensor networks alone. As a result, enabling these devices to share context information with one another has a great potential for enabling mobile users to exploit the ...
متن کاملA Homomorphic Encryption Technique for Scalable and Secure Sharing of Personal Health Record in Cloud Computing
Cloud computing allows consumers and businesses to use applications without installation and access their personal files at any computers with internet access. Personal Health Record(PHR) is an emerging patient centric model of health information exchange, which is outsourced to be stored at a third party, such as cloud providers. Issues such as risks of privacy exposure, scalability in key man...
متن کاملContext-centric Security
Users today are unable to use the rich collection of third-party untrusted applications without risking significant privacy leaks. In this paper, we argue that current and proposed applications and data-centric security policies do not map well to users’ expectations of privacy. In the eyes of a user, applications and peripheral devices exist merely to provide functionality and should have no p...
متن کاملAn Approach for Preserving Privacy and Protecting Personally Identifiable Information in Cloud Computing
Privacy and security in cloud computing is an important concern for both the public and private sector. Cloud computing allows the use of internet-based services to support business process and rental of ITservices on a utility-like basis. While cloud computing offers a massive concentration of resources, it poses risks for privacy preservation. The expected loss from a single breach can be sig...
متن کاملWebBox: Supporting Decentralised and Privacy-respecting Micro-sharing with Existing Web Standards
The popularity and plurality of social sharing and collaboration platforms today demonstrates the demand for sharing information at a wide variety of granularities and scale — from public blogging of micro-data (e.g., microblogging posts, page“Likes”, and place-“check-ins”) to specific, full-on collaborative sharing of documents and projects. The centralised and fragmented nature of today’s sha...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010