Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (23)
  • Open Access

    ARTICLE

    A Differential Privacy Based (k-Ψ)-Anonymity Method for Trajectory Data Publishing

    Hongyu Chen1, Shuyu Li1, *, Zhaosheng Zhang1

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 2665-2685, 2020, DOI:10.32604/cmc.2020.010965 - 16 September 2020

    Abstract In recent years, mobile Internet technology and location based services have wide application. Application providers and users have accumulated huge amount of trajectory data. While publishing and analyzing user trajectory data have brought great convenience for people, the disclosure risks of user privacy caused by the trajectory data publishing are also becoming more and more prominent. Traditional k-anonymous trajectory data publishing technologies cannot effectively protect user privacy against attackers with strong background knowledge. For privacy preserving trajectory data publishing, we propose a differential privacy based (k-Ψ)-anonymity method to defend against re-identification and probabilistic inference attack. The… More >

  • Open Access

    ARTICLE

    A Distributed Privacy Preservation Approach for Big Data in Public Health Emergencies Using Smart Contract and SGX

    Jun Li1, 2, Jieren Cheng2, *, Naixue Xiong3, Lougao Zhan4, Yuan Zhang1

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 723-741, 2020, DOI:10.32604/cmc.2020.011272 - 23 July 2020

    Abstract Security and privacy issues have become a rapidly growing problem with the fast development of big data in public health. However, big data faces many ongoing serious challenges in the process of collection, storage, and use. Among them, data security and privacy problems have attracted extensive interest. In an effort to overcome this challenge, this article aims to present a distributed privacy preservation approach based on smart contracts and Intel Software Guard Extensions (SGX). First of all, we define SGX as a trusted edge computing node, design data access module, data protection module, and data… More >

  • Open Access

    ARTICLE

    A Review of Data Cleaning Methods for Web Information System

    Jinlin Wang1, Xing Wang1, *, Yuchen Yang1, Hongli Zhang1, Binxing Fang1

    CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1053-1075, 2020, DOI:10.32604/cmc.2020.08675

    Abstract Web information system (WIS) is frequently-used and indispensable in daily social life. WIS provides information services in many scenarios, such as electronic commerce, communities, and edutainment. Data cleaning plays an essential role in various WIS scenarios to improve the quality of data service. In this paper, we present a review of the state-of-the-art methods for data cleaning in WIS. According to the characteristics of data cleaning, we extract the critical elements of WIS, such as interactive objects, application scenarios, and core technology, to classify the existing works. Then, after elaborating and analyzing each category, we More >

Displaying 21-30 on page 3 of 23. Per Page