Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (211)
  • Open Access

    ARTICLE

    Security and Privacy Frameworks for Access Control Big Data Systems

    Paolina Centonze1,*

    CMC-Computers, Materials & Continua, Vol.59, No.2, pp. 361-374, 2019, DOI:10.32604/cmc.2019.06223

    Abstract In the security and privacy fields, Access Control (AC) systems are viewed as the fundamental aspects of networking security mechanisms. Enforcing AC becomes even more challenging when researchers and data analysts have to analyze complex and distributed Big Data (BD) processing cluster frameworks, which are adopted to manage yottabyte of unstructured sensitive data. For instance, Big Data systems’ privacy and security restrictions are most likely to failure due to the malformed AC policy configurations. Furthermore, BD systems were initially developed toped to take care of some of the DB issues to address BD challenges and many of these dealt with… More >

  • Open Access

    ARTICLE

    Reliable Medical Recommendation Based on Privacy-Preserving Collaborative Filtering

    Mengwei Hou1, Rong Wei1,*, Tiangang Wang1, Yu Cheng2, Buyue Qian3

    CMC-Computers, Materials & Continua, Vol.56, No.1, pp. 137-149, 2018, DOI: 10.3970/cmc.2018.02438

    Abstract Collaborative filtering (CF) methods are widely adopted by existing medical recommendation systems, which can help clinicians perform their work by seeking and recommending appropriate medical advice. However, privacy issue arises in this process as sensitive patient private data are collected by the recommendation server. Recently proposed privacy-preserving collaborative filtering methods, using computation-intensive cryptography techniques or data perturbation techniques are not appropriate in medical online service. The aim of this study is to address the privacy issues in the context of neighborhood-based CF methods by proposing a Privacy Preserving Medical Recommendation (PPMR) algorithm, which can protect patients’ treatment information and demographic… More >

  • Open Access

    ARTICLE

    Privacy-Aware Service Subscription in People-Centric Sensing: A Combinatorial Auction Approach

    Yuanyuan Xu1,*, Shan Li2, Yixuan Zhang3

    CMC-Computers, Materials & Continua, Vol.61, No.1, pp. 129-139, 2019, DOI:10.32604/cmc.2019.05691

    Abstract With the emergence of ambient sensing technologies which combine mobile crowdsensing and Internet of Things, large amount of people-centric data can be obtained and utilized to build people-centric services. Note that the service quality is highly related to the privacy level of the data. In this paper, we investigate the problem of privacy-aware service subscription in people-centric sensing. An efficient resource allocation framework using a combinatorial auction (CA) model is provided. Specifically, the resource allocation problem that maximizes the social welfare in view of varying requirements of multiple users is formulated, and it is solved by a proposed computationally tractable… More >

  • Open Access

    ARTICLE

    Privacy-Preserving Quantum Two-Party Geometric Intersection

    Wenjie Liu1,2,*, Yong Xu2, James C. N. Yang3, Wenbin Yu1,2, Lianhua Chi4

    CMC-Computers, Materials & Continua, Vol.60, No.3, pp. 1237-1250, 2019, DOI:10.32604/cmc.2019.03551

    Abstract Privacy-preserving computational geometry is the research area on the intersection of the domains of secure multi-party computation (SMC) and computational geometry. As an important field, the privacy-preserving geometric intersection (PGI) problem is when each of the multiple parties has a private geometric graph and seeks to determine whether their graphs intersect or not without revealing their private information. In this study, through representing Alice’s (Bob’s) private geometric graph GA (GB) as the set of numbered grids SA (SB), an efficient privacy-preserving quantum two-party geometric intersection (PQGI) protocol is proposed. In the protocol, the oracle operation OA (OB) is firstly utilized… More >

  • Open Access

    ARTICLE

    Enabling Comparable Search Over Encrypted Data for IoT with Privacy-Preserving

    Lei Xu1, Chungen Xu1,*, Zhongyi Liu1, Yunling Wang2,3, Jianfeng Wang2,3

    CMC-Computers, Materials & Continua, Vol.60, No.2, pp. 675-690, 2019, DOI:10.32604/cmc.2019.05276

    Abstract With the rapid development of cloud computing and Internet of Things (IoT) technology, massive data raises and shuttles on the network every day. To ensure the confidentiality and utilization of these data, industries and companies users encrypt their data and store them in an outsourced party. However, simple adoption of encryption scheme makes the original lose its flexibility and utilization. To address these problems, the searchable encryption scheme is proposed. Different from traditional encrypted data search scheme, this paper focuses on providing a solution to search the data from one or more IoT device by comparing their underlying numerical values.… More >

  • Open Access

    ARTICLE

    A Privacy-Preserving Algorithm for Clinical Decision-Support Systems Using Random Forest

    Alia Alabdulkarim1, Mznah Al-Rodhaan2, Yuan Tian*,3, Abdullah Al-Dhelaan2

    CMC-Computers, Materials & Continua, Vol.58, No.3, pp. 585-601, 2019, DOI:10.32604/cmc.2019.05637

    Abstract Clinical decision-support systems are technology-based tools that help healthcare providers enhance the quality of their services to satisfy their patients and earn their trust. These systems are used to improve physicians’ diagnostic processes in terms of speed and accuracy. Using data-mining techniques, a clinical decision support system builds a classification model from hospital’s dataset for diagnosing new patients using their symptoms. In this work, we propose a privacy-preserving clinical decision-support system that uses a privacy-preserving random forest algorithm to diagnose new symptoms without disclosing patients’ information and exposing them to cyber and network attacks. Solving the same problem with a… More >

  • Open Access

    ARTICLE

    Differentially Private Real-Time Streaming Data Publication Based on Sliding Window Under Exponential Decay

    Lan Sun1, Chen Ge1, Xin Huang1, Yingjie Wu1,*, Yan Gao2

    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 61-78, 2019, DOI:10.32604/cmc.2019.03744

    Abstract Continuous response of range query on steaming data provides useful information for many practical applications as well as the risk of privacy disclosure. The existing research on differential privacy streaming data publication mostly pay close attention to boosting query accuracy, but pay less attention to query efficiency, and ignore the effect of timeliness on data weight. In this paper, we propose an effective algorithm of differential privacy streaming data publication under exponential decay mode. Firstly, by introducing the Fenwick tree to divide and reorganize data items in the stream, we achieve a constant time complexity for inserting a new item… More >

  • Open Access

    ARTICLE

    A Privacy-Preserving Image Retrieval Based on AC-Coefficients and Color Histograms in Cloud Environment

    Zhihua Xia1,*, Lihua Lu1, Tong Qiu1, H. J. Shim1, Xianyi Chen1, Byeungwoo Jeon2

    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 27-43, 2019, DOI:10.32604/cmc.2019.02688

    Abstract Content based image retrieval (CBIR) techniques have been widely deployed in many applications for seeking the abundant information existed in images. Due to large amounts of storage and computational requirements of CBIR, outsourcing image search work to the cloud provider becomes a very attractive option for many owners with small devices. However, owing to the private content contained in images, directly outsourcing retrieval work to the cloud provider apparently bring about privacy problem, so the images should be protected carefully before outsourcing. This paper presents a secure retrieval scheme for the encrypted images in the YUV color space. With this… More >

  • Open Access

    ARTICLE

    Expression Preserved Face Privacy Protection Based on Multi-mode Discriminant Analysis

    Xiang Wang1, *, Chen Xiong1, Qingqi Pei1, Youyang Qu2

    CMC-Computers, Materials & Continua, Vol.57, No.1, pp. 107-121, 2018, DOI:10.32604/cmc.2018.03675

    Abstract Most visual privacy protection methods only hide the identity information of the face images, but the expression, behavior and some other information, which are of great significant in the live broadcast and other scenarios, are also destroyed by the privacy protection process. To this end, this paper introduces a method to remove the identity information while preserving the expression information by performing multi-mode discriminant analysis on the images normalized with AAM algorithm. The face images are decomposed into mutually orthogonal subspaces corresponding to face attributes such as gender, race and expression, each of which owns related characteristic parameters. Then, the… More >

  • Open Access

    ARTICLE

    On the Privacy-Preserving Outsourcing Scheme of Reversible Data Hiding over Encrypted Image Data in Cloud Computing

    Lizhi Xiong1,*, Yunqing Shi2

    CMC-Computers, Materials & Continua, Vol.55, No.3, pp. 523-539, 2018, DOI: 10.3970/cmc.2018.01791

    Abstract Advanced cloud computing technology provides cost saving and flexibility of services for users. With the explosion of multimedia data, more and more data owners would outsource their personal multimedia data on the cloud. In the meantime, some computationally expensive tasks are also undertaken by cloud servers. However, the outsourced multimedia data and its applications may reveal the data owner’s private information because the data owners lose the control of their data. Recently, this thought has aroused new research interest on privacy-preserving reversible data hiding over outsourced multimedia data. In this paper, two reversible data hiding schemes are proposed for encrypted… More >

Displaying 201-210 on page 21 of 211. Per Page