Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (180)
  • Open Access

    ARTICLE

    A Block Compressed Sensing for Images Selective Encryption in Cloud

    Xingting Liu1, Jianming Zhang2,*, Xudong Li2, Siwang Zhou1, Siyuan Zhou2, Hye-JinKim3

    Journal of Cyber Security, Vol.1, No.1, pp. 29-41, 2019, DOI:10.32604/jcs.2019.06013

    Abstract The theory of compressed sensing (CS) has been proposed to reduce the processing time and accelerate the scanning process. In this paper, the image recovery task is considered to outsource to the cloud server for its abundant computing and storage resources. However, the cloud server is untrusted then may pose a considerable amount of concern for potential privacy leakage. How to protect data privacy and simultaneously maintain management of the image remains challenging. Motivated by the above challenge, we propose an image encryption algorithm based on chaotic system, CS and image saliency. In our scheme, we outsource the image CS… More >

  • Open Access

    ARTICLE

    Research on Privacy Preserving Data Mining

    Pingshui Wang1,*, Tao Chen1,2, Zecheng Wang1

    Journal of Information Hiding and Privacy Protection, Vol.1, No.2, pp. 61-68, 2019, DOI:10.32604/jihpp.2019.05943

    Abstract In recent years, with the explosive development in Internet, data storage and data processing technologies, privacy preservation has been one of the greater concerns in data mining. A number of methods and techniques have been developed for privacy preserving data mining. This paper provided a wide survey of different privacy preserving data mining algorithms and analyzed the representative techniques for privacy preservation. The existing problems and directions for future research are also discussed. More >

  • Open Access

    ARTICLE

    Research on the Association of Mobile Social Network Users Privacy Information Based on Big Data Analysis

    Pingshui Wang1,*, Zecheng Wang1, Qinjuan Ma1

    Journal of Information Hiding and Privacy Protection, Vol.1, No.1, pp. 35-42, 2019, DOI:10.32604/jihpp.2019.05942

    Abstract The issue of privacy protection for mobile social networks is a frontier topic in the field of social network applications. The existing researches on user privacy protection in mobile social network mainly focus on privacy preserving data publishing and access control. There is little research on the association of user privacy information, so it is not easy to design personalized privacy protection strategy, but also increase the complexity of user privacy settings. Therefore, this paper concentrates on the association of user privacy information taking big data analysis tools, so as to provide data support for personalized privacy protection strategy design. More >

  • Open Access

    ARTICLE

    A Survey on Cryptographic Security and Information Hiding Technology for Cloud or Fog-Based IoT System

    Liang Bai1, Yuzhen Liu1, Xiaoliang Wang1,*, Nick Patterson2, F. Jiang2

    Journal of Information Hiding and Privacy Protection, Vol.1, No.1, pp. 1-10, 2019, DOI:10.32604/jihpp.2019.06043

    Abstract Internet of Things (IoT) is an emerging paradigm involving intelligent sensor networks that incorporates embedded technology for collecting data, communicating with external environments. Recently, cloud computing together with fog computing has become an important research area of the Internet of Things because of big data processing capabilities. It is a promising technology that utilizes cloud or fog computing / architecture to improve sensor computing, storage, and communication capabilities. However, recently it has been shown that this computing/architecture may be vulnerable to various attacks because of the openness nature of the wireless network. Therefore, it becomes more and more important to… More >

  • Open Access

    ARTICLE

    A Novel Reversible Data Hiding Scheme Based on Lesion Extraction and with Contrast Enhancement for Medical Images

    Xingxing Xiao1, Yang1,*, Rui Li2, Weiming Zhang3

    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 101-115, 2019, DOI:10.32604/cmc.2019.05293

    Abstract The medical industry develops rapidly as science and technology advance. People benefit from medical resource sharing, but suffer from privacy leaks at the same time. In order to protect patients’ privacy and improve quality of medical images, a novel reversible data hiding (RDH) scheme based on lesion extraction and with contrast enhancement is proposed. Furthermore, the proposed scheme can enhance the contrast of medial image's lesion area directly and embed high-capacity privacy data reversibly. Different from previous segmentation methods, this scheme first adopts distance regularized level set evolution (DRLSE) to extract lesion and targets at the lesion area accurately for… More >

  • Open Access

    ARTICLE

    Location Privacy in Device-Dependent Location-Based Services: Challenges and Solution

    Yuhang Wang1, Yanbin Sun1,*, Shen Su1, Zhihong Tian1, Mohan Li1, Jing Qiu1, Xianzhi Wang2

    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 983-993, 2019, DOI:10.32604/cmc.2019.05547

    Abstract With the evolution of location-based services (LBS), a new type of LBS has already gain a lot of attention and implementation, we name this kind of LBS as the Device-Dependent LBS (DLBS). In DLBS, the service provider (SP) will not only send the information according to the user’s location, more significant, he also provides a service device which will be carried by the user. DLBS has been successfully practised in some of the large cities around the world, for example, the shared bicycle in Beijing and London. In this paper, we, for the first time, blow the whistle of the… More >

  • Open Access

    ARTICLE

    Personalized Privacy Protecting Model in Mobile Social Network

    Pingshui Wang1,*, Zecheng Wang1, Tao Chen1,2, Qinjuan Ma1

    CMC-Computers, Materials & Continua, Vol.59, No.2, pp. 533-546, 2019, DOI:10.32604/cmc.2019.05570

    Abstract With the rapid development of the new generation of information technology, the analysis of mobile social network big data is getting deeper and deeper. At the same time, the risk of privacy disclosure in social network is also very obvious. In this paper, we summarize the main access control model in mobile social network, analyze their contribution and point out their disadvantages. On this basis, a practical privacy policy is defined through authorization model supporting personalized privacy preferences. Experiments have been conducted on synthetic data sets. The result shows that the proposed privacy protecting model could improve the security of… More >

  • Open Access

    ARTICLE

    Developing a New Security Framework for Bluetooth Low Energy Devices

    Qiaoyang Zhang1, Zhiyao Liang1,*, Zhiping Cai2

    CMC-Computers, Materials & Continua, Vol.59, No.2, pp. 457-471, 2019, DOI:10.32604/cmc.2019.03758

    Abstract Wearable devices are becoming more popular in our daily life. They are usually used to monitor health status, track fitness data, or even do medical tests, etc. Since the wearable devices can obtain a lot of personal data, their security issues are very important. Motivated by the consideration that the current pairing mechanisms of Bluetooth Low Energy (BLE) are commonly impractical or insecure for many BLE based wearable devices nowadays, we design and implement a security framework in order to protect the communication between these devices. The security framework is a supplement to the Bluetooth pairing mechanisms and is compatible… More >

  • Open Access

    ARTICLE

    Privacy-Preserving Content-Aware Search Based on Two-Level Index

    Zhangjie Fu1,*, Lili Xia1, Yuling Liu2, Zuwei Tian3

    CMC-Computers, Materials & Continua, Vol.59, No.2, pp. 473-491, 2019, DOI:10.32604/cmc.2019.03785

    Abstract Nowadays, cloud computing is used more and more widely, more and more people prefer to using cloud server to store data. So, how to encrypt the data efficiently is an important problem. The search efficiency of existed search schemes decreases as the index increases. For solving this problem, we build the two-level index. Simultaneously, for improving the semantic information, the central word expansion is combined. The purpose of privacy-preserving content-aware search by using the two-level index (CKESS) is that the first matching is performed by using the extended central words, then calculate the similarity between the trapdoor and the secondary… More >

  • Open Access

    ARTICLE

    Security and Privacy Frameworks for Access Control Big Data Systems

    Paolina Centonze1,*

    CMC-Computers, Materials & Continua, Vol.59, No.2, pp. 361-374, 2019, DOI:10.32604/cmc.2019.06223

    Abstract In the security and privacy fields, Access Control (AC) systems are viewed as the fundamental aspects of networking security mechanisms. Enforcing AC becomes even more challenging when researchers and data analysts have to analyze complex and distributed Big Data (BD) processing cluster frameworks, which are adopted to manage yottabyte of unstructured sensitive data. For instance, Big Data systems’ privacy and security restrictions are most likely to failure due to the malformed AC policy configurations. Furthermore, BD systems were initially developed toped to take care of some of the DB issues to address BD challenges and many of these dealt with… More >

Displaying 161-170 on page 17 of 180. Per Page