Skip to main content
Top

2021 | OriginalPaper | Chapter

2. Existing Privacy Protection Solutions

Authors : Youyang Qu, Mohammad Reza Nosouhi, Lei Cui, Shui Yu

Published in: Personalized Privacy Protection in Big Data

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this chapter, we outline the major developments of modern privacy study based on the survey work we have conducted [14]. Mainstream privacy protection techniques including anonymity, clustering-based, differential privacy, cryptography, and machine learning methods will be presented in the following sections.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference J. Yu, K. Wang, D. Zeng, C. Zhu, S. Guo, Privacy-preserving data aggregation computing in cyber-physical social systems. ACM Trans. Cyber-Phys. Syst. 3(1), 1–23 (2018)CrossRef J. Yu, K. Wang, D. Zeng, C. Zhu, S. Guo, Privacy-preserving data aggregation computing in cyber-physical social systems. ACM Trans. Cyber-Phys. Syst. 3(1), 1–23 (2018)CrossRef
2.
go back to reference L. Cui, G. Xie, Y. Qu, L. Gao, Y. Yang, Security and privacy in smart cities: challenges and opportunities. IEEE Access 6, 134–146 (2018) L. Cui, G. Xie, Y. Qu, L. Gao, Y. Yang, Security and privacy in smart cities: challenges and opportunities. IEEE Access 6, 134–146 (2018)
3.
go back to reference Y. Qu, M.R. Nosouhi, L. Cui, S. Yu, Privacy preservation in smart cities, in Smart Cities Cybersecurity and Privacy (Elsevier, Amsterdam, 2019), pp. 75–88 Y. Qu, M.R. Nosouhi, L. Cui, S. Yu, Privacy preservation in smart cities, in Smart Cities Cybersecurity and Privacy (Elsevier, Amsterdam, 2019), pp. 75–88
4.
go back to reference Y. Qu, S. Yu, W. Zhou, S. Peng, G. Wang, K. Xiao, Privacy of things: emerging challenges and opportunities in wireless internet of things. IEEE Wirel. Commun. 25(6), 91–97 (2018)CrossRef Y. Qu, S. Yu, W. Zhou, S. Peng, G. Wang, K. Xiao, Privacy of things: emerging challenges and opportunities in wireless internet of things. IEEE Wirel. Commun. 25(6), 91–97 (2018)CrossRef
5.
go back to reference R.C.-W. Wong, J. Li, A. W.-C. Fu, K. Wang, (\(\alpha \), k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing, in Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (ACM, 2006), pp. 754–759 R.C.-W. Wong, J. Li, A. W.-C. Fu, K. Wang, (\(\alpha \), k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing, in Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (ACM, 2006), pp. 754–759
6.
go back to reference Q. Zhang, N. Koudas, D. Srivastava, T. Yu, Aggregate query answering on anonymized tables, in IEEE 23rd International Conference on Data Engineering (IEEE, 2007), pp. 116–125 Q. Zhang, N. Koudas, D. Srivastava, T. Yu, Aggregate query answering on anonymized tables, in IEEE 23rd International Conference on Data Engineering (IEEE, 2007), pp. 116–125
7.
go back to reference J. Li, Y. Tao, X. Xiao, Preservation of proximity privacy in publishing numerical sensitive data, in Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data (ACM, 2008), pp. 473–486 J. Li, Y. Tao, X. Xiao, Preservation of proximity privacy in publishing numerical sensitive data, in Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data (ACM, 2008), pp. 473–486
8.
go back to reference V. Goyal, O. Pandey, A. Sahai, B. Waters, Attribute-based encryption for fine-grained access control of encrypted data, in Proceedings of the 13th ACM Conference on Computer and Communications Security (2006), pp. 89–98 V. Goyal, O. Pandey, A. Sahai, B. Waters, Attribute-based encryption for fine-grained access control of encrypted data, in Proceedings of the 13th ACM Conference on Computer and Communications Security (2006), pp. 89–98
9.
go back to reference A. Lewko, B. Waters, Decentralizing attribute-based encryption, in Annual International Conference on the Theory and Applications of Cryptographic Techniques (Springer, 2011), pp. 568–588 A. Lewko, B. Waters, Decentralizing attribute-based encryption, in Annual International Conference on the Theory and Applications of Cryptographic Techniques (Springer, 2011), pp. 568–588
10.
go back to reference A. Sahai, B. Waters, Fuzzy identity-based encryption, in Annual International Conference on the Theory and Applications of Cryptographic Techniques (Springer, 2005), pp. 457–473 A. Sahai, B. Waters, Fuzzy identity-based encryption, in Annual International Conference on the Theory and Applications of Cryptographic Techniques (Springer, 2005), pp. 457–473
11.
go back to reference D.X. Song, D. Wagner, A. Perrig, Practical techniques for searches on encrypted data, in Proceeding of the IEEE Symposium on Security and Privacy. S&P 2000 (IEEE, 2000), pp. 44–55 D.X. Song, D. Wagner, A. Perrig, Practical techniques for searches on encrypted data, in Proceeding of the IEEE Symposium on Security and Privacy. S&P 2000 (IEEE, 2000), pp. 44–55
12.
go back to reference R. Curtmola, J. Garay, S. Kamara, R. Ostrovsky, Searchable symmetric encryption: improved definitions and efficient constructions. J. Comput. Secur. 19(5), 895–934 (2011)CrossRef R. Curtmola, J. Garay, S. Kamara, R. Ostrovsky, Searchable symmetric encryption: improved definitions and efficient constructions. J. Comput. Secur. 19(5), 895–934 (2011)CrossRef
13.
go back to reference C. Gentry, Fully homomorphic encryption using ideal lattices, in Proceedings of the Forty-first Annual ACM Symposium on Theory of Computing (2009), pp. 169–178 C. Gentry, Fully homomorphic encryption using ideal lattices, in Proceedings of the Forty-first Annual ACM Symposium on Theory of Computing (2009), pp. 169–178
14.
go back to reference V. Vaikuntanathan, Computing blindfolded: new developments in fully homomorphic encryption, in IEEE 52nd Annual Symposium on Foundations of Computer Science (IEEE, 2011), pp. 5–16 V. Vaikuntanathan, Computing blindfolded: new developments in fully homomorphic encryption, in IEEE 52nd Annual Symposium on Foundations of Computer Science (IEEE, 2011), pp. 5–16
15.
go back to reference A.C. Yao, Protocols for secure computations, in 23rd Annual Symposium on Foundations of Computer Science (sfcs) (IEEE, 1982), pp. 160–164 A.C. Yao, Protocols for secure computations, in 23rd Annual Symposium on Foundations of Computer Science (sfcs) (IEEE, 1982), pp. 160–164
16.
go back to reference Q. Sun, D.R. Simon, Y.-M. Wang, W. Russell, V.N. Padmanabhan, L. Qiu, Statistical identification of encrypted web browsing traffic, in Proceedings of the IEEE Symposium on Security and Privacy (IEEE, 2002), pp. 19–30 Q. Sun, D.R. Simon, Y.-M. Wang, W. Russell, V.N. Padmanabhan, L. Qiu, Statistical identification of encrypted web browsing traffic, in Proceedings of the IEEE Symposium on Security and Privacy (IEEE, 2002), pp. 19–30
17.
go back to reference M. Liberatore and B. N. Levine, Inferring the source of encrypted http connections, in Proceedings of the 13th ACM Conference on Computer and Communications Security (2006), pp. 255–263 M. Liberatore and B. N. Levine, Inferring the source of encrypted http connections, in Proceedings of the 13th ACM Conference on Computer and Communications Security (2006), pp. 255–263
18.
go back to reference Y. Zhu, X. Fu, B. Graham, R. Bettati, W. Zhao, Correlation-based traffic analysis attacks on anonymity networks. IEEE Trans. Parallel Distrib. Syst. 21(7), 954–967 (2009)CrossRef Y. Zhu, X. Fu, B. Graham, R. Bettati, W. Zhao, Correlation-based traffic analysis attacks on anonymity networks. IEEE Trans. Parallel Distrib. Syst. 21(7), 954–967 (2009)CrossRef
19.
go back to reference P. Venkitasubramaniam, T. He, L. Tong, Anonymous networking amidst eavesdroppers. IEEE Trans. Inf. Theory 54(6), 2770–2784 (2008)MathSciNetCrossRef P. Venkitasubramaniam, T. He, L. Tong, Anonymous networking amidst eavesdroppers. IEEE Trans. Inf. Theory 54(6), 2770–2784 (2008)MathSciNetCrossRef
20.
go back to reference S. Yu, G. Zhao, W. Dou, S. James, Predicted packet padding for anonymous web browsing against traffic analysis attacks. IEEE Trans. Inf. Forensics Secur. 7(4), 1381–1393 (2012)CrossRef S. Yu, G. Zhao, W. Dou, S. James, Predicted packet padding for anonymous web browsing against traffic analysis attacks. IEEE Trans. Inf. Forensics Secur. 7(4), 1381–1393 (2012)CrossRef
21.
go back to reference Y. Sun, J. Liu, J. Wang, Y. Cao, N. Kato, When machine learning meets privacy in 6g: a survey. IEEE Commun. Surv. Tutorials (2020) Y. Sun, J. Liu, J. Wang, Y. Cao, N. Kato, When machine learning meets privacy in 6g: a survey. IEEE Commun. Surv. Tutorials (2020)
22.
go back to reference J. Zhang, B. Chen, Y. Zhao, X. Cheng, F. Hu, Data security and privacy-preserving in edge computing paradigm: survey and open issues. IEEE Access 6, 209–237 (2018) J. Zhang, B. Chen, Y. Zhao, X. Cheng, F. Hu, Data security and privacy-preserving in edge computing paradigm: survey and open issues. IEEE Access 6, 209–237 (2018)
23.
go back to reference K. Gai, Y. Wu, L. Zhu, L. Xu, Y. Zhang, Permissioned blockchain and edge computing empowered privacy-preserving smart grid networks. IEEE Internet Things J. 6(5), 7992–8004 (2019)CrossRef K. Gai, Y. Wu, L. Zhu, L. Xu, Y. Zhang, Permissioned blockchain and edge computing empowered privacy-preserving smart grid networks. IEEE Internet Things J. 6(5), 7992–8004 (2019)CrossRef
24.
go back to reference Z. Ma, Y. Liu, X. Liu, J. Ma, K. Ren, Lightweight privacy-preserving ensemble classification for face recognition. IEEE Internet Things J. 6(3), 5778–5790 (2019)CrossRef Z. Ma, Y. Liu, X. Liu, J. Ma, K. Ren, Lightweight privacy-preserving ensemble classification for face recognition. IEEE Internet Things J. 6(3), 5778–5790 (2019)CrossRef
25.
go back to reference X. Li, S. Liu, F. Wu, S. Kumari, J.J. Rodrigues, Privacy preserving data aggregation scheme for mobile edge computing assisted iot applications. IEEE Internet Things J. 6(3), 4755–4763 (2018)CrossRef X. Li, S. Liu, F. Wu, S. Kumari, J.J. Rodrigues, Privacy preserving data aggregation scheme for mobile edge computing assisted iot applications. IEEE Internet Things J. 6(3), 4755–4763 (2018)CrossRef
26.
go back to reference M. Du, K. Wang, Z. Xia, Y. Zhang, Differential privacy preserving of training model in wireless big data with edge computing. IEEE Trans. Big Data (2018) M. Du, K. Wang, Z. Xia, Y. Zhang, Differential privacy preserving of training model in wireless big data with edge computing. IEEE Trans. Big Data (2018)
27.
go back to reference Q. Yang, Y. Liu, T. Chen, Y. Tong, Federated machine learning: concept and applications. ACM Trans. Intell. Syst. Technol. (TIST) 10(2), 1–19 (2019)CrossRef Q. Yang, Y. Liu, T. Chen, Y. Tong, Federated machine learning: concept and applications. ACM Trans. Intell. Syst. Technol. (TIST) 10(2), 1–19 (2019)CrossRef
28.
go back to reference G. Xu, H. Li, S. Liu, K. Yang, X. Lin, Verifynet: secure and verifiable federated learning. IEEE Trans. Inf. Forensics Secur. 15, 911–926 (2019)CrossRef G. Xu, H. Li, S. Liu, K. Yang, X. Lin, Verifynet: secure and verifiable federated learning. IEEE Trans. Inf. Forensics Secur. 15, 911–926 (2019)CrossRef
29.
go back to reference K. Bonawitz, V. Ivanov, B. Kreuter, A. Marcedone, H.B. McMahan, S. Patel, D. Ramage, A. Segal, K. Seth, Practical secure aggregation for federated learning on user-held data (2016), arXiv preprint arXiv:1611.04482 K. Bonawitz, V. Ivanov, B. Kreuter, A. Marcedone, H.B. McMahan, S. Patel, D. Ramage, A. Segal, K. Seth, Practical secure aggregation for federated learning on user-held data (2016), arXiv preprint arXiv:​1611.​04482
30.
go back to reference Y. Liu, Z. Ma, X. Liu, S. Ma, S. Nepal, R. Deng, Boosting privately: privacy-preserving federated extreme boosting for mobile crowdsensing (2019), arXiv preprint arXiv:1907.10218 Y. Liu, Z. Ma, X. Liu, S. Ma, S. Nepal, R. Deng, Boosting privately: privacy-preserving federated extreme boosting for mobile crowdsensing (2019), arXiv preprint arXiv:​1907.​10218
31.
go back to reference M. Hao, H. Li, X. Luo, G. Xu, H. Yang, S. Liu, Efficient and privacy-enhanced federated learning for industrial artificial intelligence. IEEE Trans. Industr. Inf. 16(10), 6532–6542 (2019)CrossRef M. Hao, H. Li, X. Luo, G. Xu, H. Yang, S. Liu, Efficient and privacy-enhanced federated learning for industrial artificial intelligence. IEEE Trans. Industr. Inf. 16(10), 6532–6542 (2019)CrossRef
Metadata
Title
Existing Privacy Protection Solutions
Authors
Youyang Qu
Mohammad Reza Nosouhi
Lei Cui
Shui Yu
Copyright Year
2021
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-16-3750-6_2

Premium Partner