scispace - formally typeset
Search or ask a question
Topic

Information privacy

About: Information privacy is a research topic. Over the lifetime, 25412 publications have been published within this topic receiving 579611 citations. The topic is also known as: data privacy & data protection.


Papers
More filters
Journal ArticleDOI
TL;DR: A blockchain-based privacy preserving payment mechanism for V2G networks is proposed, which enables data sharing while securing sensitive user information and ensures the anonymity of user payment data while enabling payment auditing by privileged users.
Abstract: As an integral part of V2G networks, EVs receive electricity from not only the grid but also other EVs and may frequently feed the power back to the grid. Payment records in V2G networks are useful for extracting user behaviors and facilitating decision-making for optimized power supply, scheduling, pricing, and consumption. Sharing payment and user information, however, raises serious privacy concerns in addition to the existing challenge of secure and reliable transaction processing. In this article, we propose a blockchain-based privacy preserving payment mechanism for V2G networks, which enables data sharing while securing sensitive user information. The mechanism introduces a registration and data maintenance process that is based on a blockchain technique, which ensures the anonymity of user payment data while enabling payment auditing by privileged users. Our design is implemented based on Hyperledger to carefully evaluate its feasibility and effectiveness.

223 citations

Proceedings ArticleDOI
10 Jun 2012
TL;DR: This paper investigates the searchable encryption problem in the presence of a semi-honest-but-curious server, which may execute only a fraction of search operations honestly and return a fractionof search outcome honestly, and proposes a verifiable SSE scheme to offer verifiable searchability in additional to the data privacy.
Abstract: Outsourcing data to cloud servers, while increasing service availability and reducing users' burden of managing data, inevitably brings in new concerns such as data privacy, since the server may be honest-but-curious. To mediate the conflicts between data usability and data privacy in such a scenario, research of searchable encryption is of increasing interest. Motivated by the fact that a cloud server, besides its curiosity, may be selfish in order to save its computation and/or download bandwidth, in this paper, we investigate the searchable encryption problem in the presence of a semi-honest-but-curious server, which may execute only a fraction of search operations honestly and return a fraction of search outcome honestly. To fight against this strongest adversary ever, a verifiable SSE (VSSE) scheme is proposed to offer verifiable searchability in additional to the data privacy, both of which are further confirmed by our rigorous security analysis. Besides, we treat the practicality/efficiency as a central requirement of a searchable encryption scheme. To demonstrate the lightweightness of our scheme, we implemented and tested the proposed VSSE on a laptop (serving as the server) and a mobile phone running Android 2.3.4 (serving as the end user). The experimental results optimistically suggest that the proposed scheme satisfies all of our design goals.

223 citations

Journal ArticleDOI
TL;DR: The most relevant PPDM techniques from the literature and the metrics used to evaluate such techniques are surveyed and typical applications of PPDD methods in relevant fields are presented.
Abstract: The collection and analysis of data are continuously growing due to the pervasiveness of computing devices. The analysis of such information is fostering businesses and contributing beneficially to the society in many different fields. However, this storage and flow of possibly sensitive data poses serious privacy concerns. Methods that allow the knowledge extraction from data, while preserving privacy, are known as privacy-preserving data mining (PPDM) techniques. This paper surveys the most relevant PPDM techniques from the literature and the metrics used to evaluate such techniques and presents typical applications of PPDM methods in relevant fields. Furthermore, the current challenges and open issues in PPDM are discussed.

223 citations

Book
01 Feb 1999
TL;DR: The End of Privacy as mentioned in this paper is a collection of interviews with Reg Whitaker, a leading expert on government surveillance, who shows how vast amounts of personal information are moving into corporate hands and how this data can be combined and used to develop electronic profiles of individuals and groups.
Abstract: From the Publisher: The Information Revolution and the rise of the networked society are reconstituting the structures of power on a global scale. In The End of Privacy, Reg Whitaker, a leading expert on government surveillance, shows that these developments pose dramatic new threats to personal privacy. Reg Whitaker shows how vast amounts of personal information are moving into corporate hands. Once there, this data can be combined and used to develop electronic profiles of individuals and groups that are potentially far more detailed, and far more intrusive, than the files built up in the past by state police and security agencies.

223 citations

Proceedings ArticleDOI
04 Mar 2008
TL;DR: The aim of this paper is to show security measures for NFC (Near Field Communication) use cases and devices, and applies different attacks against the operation modes to show how applications and devices could be protected against such attacks.
Abstract: The aim of this paper is to show security measures for NFC (Near Field Communication) use cases and devices. We give a brief overview over NFC technology and evaluate the implementation of NFC in devices. Out of this technology review we derive different use cases and applications based on NFC technology. Based on the use cases we show assets and interfaces of an NFC device that could be a possible target of an attacker. In the following we apply different attacks against the operation modes to show how applications and devices could be protected against such attacks. The information collected is consolidated in a set of threats giving guidelines on how to improve security and overcome privacy issues. This allows integrating NFC technology in a secure way for the end consumer.

222 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
88% related
Server
79.5K papers, 1.4M citations
85% related
Encryption
98.3K papers, 1.4M citations
84% related
Social network
42.9K papers, 1.5M citations
83% related
Wireless network
122.5K papers, 2.1M citations
82% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023562
20221,226
20211,535
20201,634
20191,255
20181,277