User-Centric Privacy Preservation in Data-Sharing Applications

被引:0
|
作者
Gao, Feng [1 ]
He, Jingsha [2 ]
Peng, Shufen [1 ]
机构
[1] Beijing Univ Technol, Coll Comp Sci & Technol, Beijing, Peoples R China
[2] Beijing Univ Technol, Sch Engn, Beijing, Peoples R China
来源
关键词
User-centric; privacy preservation; data sharing; trust; P2P network; online social network;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
During data sharing process across people, users do not want the information that contains privacy to be shared with everyone else; some people may only want to share it with someone they are familiar with. To solve this issue of privacy preservation in data-sharing applications, we propose a novel user-centric method. Our main contributions include the followings. (1) Users can select key words or characters for their own privacy information, which is a user-centric way to protect privacy. (2) During the process of data sharing, data substitution can be used to ensure privacy preservation as well as high successful rate of data sharing. (3) Our method can be used in different data-sharing applications in a flexible way. Simulation results show that our method can achieve our privacy preservation goal.
引用
收藏
页码:423 / +
页数:3
相关论文
共 50 条
  • [1] Efficient User-Centric Privacy-Friendly and Flexible Wearable Data Aggregation and Sharing
    Jastaniah, Khlood
    Zhang, Ning
    Mustafa, Mustafa A.
    [J]. IEEE Transactions on Cloud Computing, 2024, 12 (04): : 967 - 982
  • [2] RDSF-Responsive Data-Sharing Framework for User-Centric Internet of Vehicles Assisted Healthcare Systems
    Thota, Chandu
    Mavromoustakis, Constandinos X.
    Mastorakis, George
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2023,
  • [3] A user-centric applications sharing model on pervasive computing
    Zhu, Zhenmin
    Jiang, Faqun
    Su, Xiaoli
    Li, Jintao
    Ye, Jian
    [J]. 2007 2ND INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND APPLICATIONS, VOLS 1 AND 2, 2007, : 576 - 581
  • [4] A User-Centric Method for Data Privacy Protection in Cloud Computing
    Li, Xiaohui
    He, Jingsha
    [J]. 2011 INTERNATIONAL CONFERENCE ON COMPUTER, ELECTRICAL, AND SYSTEMS SCIENCES, AND ENGINEERING (CESSE 2011), 2011, : 355 - +
  • [5] A User-centric Data Sharing Scheme with Hidden Strategies and Revocation
    Wu, Shu
    Zhang, Aiqing
    Gao, Ya
    [J]. 2023 INTERNATIONAL CONFERENCE ON DATA SECURITY AND PRIVACY PROTECTION, DSPP, 2023, : 50 - 57
  • [6] Towards Building User-Centric Privacy-Respecting Collaborative Applications
    Bourimi, Mohamed
    Barth, Thomas
    Ueberschaer, Bernd
    Kesdogan, Dogan
    [J]. INTELLIGENT INTERACTIVE ASSISTANCE AND MOBILE MULTIMEDIA COMPUTING, 2009, 53 : 341 - +
  • [7] Sharing with people: a system for user-centric content sharing
    Belimpasakis, Petros
    Saaranen, Anne
    [J]. MULTIMEDIA SYSTEMS, 2010, 16 (06) : 399 - 421
  • [8] Sharing with people: a system for user-centric content sharing
    Petros Belimpasakis
    Anne Saaranen
    [J]. Multimedia Systems, 2010, 16 : 399 - 421
  • [9] Protecting trajectory privacy: A user-centric analysis
    Shen, Hang
    Bai, Guangwei
    Yang, Mei
    Wang, Zhonghui
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 82 : 128 - 139
  • [10] User-Centric Privacy-Preserving Collection and Analysis of Trajectory Data
    Romero-Tris, Cristina
    Megias, David
    [J]. DATA PRIVACY MANAGEMENT, AND SECURITY ASSURANCE, 2016, 9481 : 245 - 253