User-Centric Privacy Preservation in Data-Sharing Applications

نویسندگان

  • Feng Gao
  • Jingsha He
  • Shufen Peng
چکیده

During data sharing process across people, users do not want the information that contains privacy to be shared with everyone else; some people may only want to share it with someone they are familiar with. To solve this issue of privacy preservation in data-sharing applications, we propose a novel user-centric method. Our main contributions include the followings. (1) Users can select key words or characters for their own privacy information, which is a user-centric way to protect privacy. (2) During the process of data sharing, data substitution can be used to ensure privacy preservation as well as high successful rate of data sharing. (3) Our method can be used in different data-sharing applications in a flexible way. Simulation results show that our method can achieve our privacy preservation goal.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Pervasive Context Sharing in Magpie: Adaptive Trust-Based Privacy Protection

Today’s mobile and pervasive computing devices are embedded with increasingly powerful sensing capabilities that enable them to provide exceptional spatio-temporal context acquisition that is not possible with traditional static sensor networks alone. As a result, enabling these devices to share context information with one another has a great potential for enabling mobile users to exploit the ...

متن کامل

A Homomorphic Encryption Technique for Scalable and Secure Sharing of Personal Health Record in Cloud Computing

Cloud computing allows consumers and businesses to use applications without installation and access their personal files at any computers with internet access. Personal Health Record(PHR) is an emerging patient centric model of health information exchange, which is outsourced to be stored at a third party, such as cloud providers. Issues such as risks of privacy exposure, scalability in key man...

متن کامل

Context-centric Security

Users today are unable to use the rich collection of third-party untrusted applications without risking significant privacy leaks. In this paper, we argue that current and proposed applications and data-centric security policies do not map well to users’ expectations of privacy. In the eyes of a user, applications and peripheral devices exist merely to provide functionality and should have no p...

متن کامل

An Approach for Preserving Privacy and Protecting Personally Identifiable Information in Cloud Computing

Privacy and security in cloud computing is an important concern for both the public and private sector. Cloud computing allows the use of internet-based services to support business process and rental of ITservices on a utility-like basis. While cloud computing offers a massive concentration of resources, it poses risks for privacy preservation. The expected loss from a single breach can be sig...

متن کامل

WebBox: Supporting Decentralised and Privacy-respecting Micro-sharing with Existing Web Standards

The popularity and plurality of social sharing and collaboration platforms today demonstrates the demand for sharing information at a wide variety of granularities and scale — from public blogging of micro-data (e.g., microblogging posts, page“Likes”, and place-“check-ins”) to specific, full-on collaborative sharing of documents and projects. The centralised and fragmented nature of today’s sha...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010