scispace - formally typeset
Search or ask a question
Topic

Information privacy

About: Information privacy is a research topic. Over the lifetime, 25412 publications have been published within this topic receiving 579611 citations. The topic is also known as: data privacy & data protection.


Papers
More filters
Journal ArticleDOI
TL;DR: Thorough security and performance analysis is proved that the proposed efficient and secure privacy-preserving approach for outsourced data of resource-constrained mobile devices in the cloud computing is semantically secure and efficient.

122 citations

Journal ArticleDOI
TL;DR: This work considers the distributed setting in which the network data is split between several data holders and offers two variants of an anonymization algorithm which is based on sequential clustering (Sq), which significantly outperform the SaNGreeA algorithm due to Campan and Truta.
Abstract: We study the problem of privacy-preservation in social networks. We consider the distributed setting in which the network data is split between several data holders. The goal is to arrive at an anonymized view of the unified network without revealing to any of the data holders information about links between nodes that are controlled by other data holders. To that end, we start with the centralized setting and offer two variants of an anonymization algorithm which is based on sequential clustering (Sq). Our algorithms significantly outperform the SaNGreeA algorithm due to Campan and Truta which is the leading algorithm for achieving anonymity in networks by means of clustering. We then devise secure distributed versions of our algorithms. To the best of our knowledge, this is the first study of privacy preservation in distributed social networks. We conclude by outlining future research proposals in that direction.

122 citations

Journal ArticleDOI
TL;DR: A mobile crowdsourcing framework based on blockchain is designed first to preserve the privacy of the participants and keep the integrity of the service request and provision, and then density-based spatial clustering of applications with noise and improved dynamic programming are adopted to cluster the requestors and generate service strategies, respectively.
Abstract: Crowdsourcing is a booming technique that enables participants to exchange data directly, thus making it possible to answer latency-sensitive service requests and relieve the burden of core networks. With some incentives, providers compete to furnish service requests, thus pledging the quality of experience (QoE) for requestors. However, the decentralized communication in crowdsourcing increases the probability of information tapering. Furthermore, providers’ arbitrary selection of the requests poses great threat to the efficient and profitable service provision for the requestors. To deal with these challenges, we propose a blockchain-powered crowdsourcing method, named BPCM, while considering the privacy preservation in mobile environment. Specifically, a mobile crowdsourcing framework based on blockchain is designed first to preserve the privacy of the participants and keep the integrity of the service request and provision. Then, density-based spatial clustering of applications with noise (DBSCAN) and improved dynamic programming (IDP) are adopted to cluster the requestors and generate service strategies, respectively. Furthermore, simple additive weighting (SAW) and multiple criteria decision making (MCDM) are utilized to select the optimal strategy that achieves the tradeoffs among maximizing the service time, increasing the profits, and reducing the energy consumption for the providers. Finally, comprehensive experiments are conducted to verify the accuracy and effectiveness of BPCM.

122 citations

Proceedings ArticleDOI
05 Jan 2004
TL;DR: Thirteen specific privacy issues are enumerated and discussed as examples of the challenges the authors face as these technologies and their associated products and services are deployed.
Abstract: Location awareness, the ability to determine geographical position, is an emerging technology with both significant benefits and important privacy implications for users of mobile devices such as cell phones and PDAs. Location is determined either internally by a device or externally by systems and networks with which the device interacts, and the resultant location information may be stored, used, and disclosed under various conditions that are described. Thirteen specific privacy issues are enumerated and discussed as examples of the challenges we face as these technologies and their associated products and services are deployed. Regulation by governments, standards organizations, industry groups, public interest groups, and marketplace forces are discussed as it may help address privacy issues.

122 citations

Journal ArticleDOI
TL;DR: In this article, the authors argue that insights from the literature on social networks and information dissemination can help provide satisfying answers to these central questions in privacy law, and treat the privacy question as an empirical one, rather than any other method of establishing whether the plaintiff had a reasonable expectation of privacy in the information at issue.
Abstract: What facts are public and what facts are private? It is the fundamental, first-principles question in privacy law, and a necessary element in the two most important privacy torts, public disclosure of private facts and intrusion upon seclusion. Yet the American courts lack a coherent, consistent methodology for determining whether an individual has a reasonable expectation of privacy in a particular fact that he has shared with one or more persons. Some courts hold that when an individual discloses a sensitive fact about himself to a handful of co-workers, friends, relatives, or strangers, this disclosure renders the fact in question sufficiently public to deprive him of a tort cause of action when that fact is subsequently widely disseminated or obtained by a third party using improper means. Other courts hold that an individual can share such a fact with dozens, or even hundreds of people, and still retain a cause of action under privacy tort law. So how much disclosure is enough to transform a private fact into a public fact? This paper argues that insights from the literature on social networks and information dissemination can help provide courts with satisfying answers to these central questions in privacy law. The social networks literature has generated theoretical and empirical insights about the probability that information disclosed to one member of a community will ultimately become known by a large segment of the community. Using these insights, courts can gauge whether the plaintiff's previously private information would have been widely disseminated regardless of the defendant's actions in a particular case. If so, the information in question was public, and if not, the tort law ought to deem the information as private. This paper argues that such an approach, which treats the privacy question as an empirical one, is more attractive than any other method of establishing whether the plaintiff had a reasonable expectation of privacy in the information at issue. The literature on social networks and information dissemination has wide applications beyond privacy tort law, but has found its way into little legal scholarship. Legal scholars interested in Fourth Amendment law, trade secrets, patent law, constitutional privacy, defamation, and other fields might find the paper's survey of social networks theory useful and provocative.

122 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
88% related
Server
79.5K papers, 1.4M citations
85% related
Encryption
98.3K papers, 1.4M citations
84% related
Social network
42.9K papers, 1.5M citations
83% related
Wireless network
122.5K papers, 2.1M citations
82% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023562
20221,226
20211,535
20201,634
20191,255
20181,277