Weitere Kapitel dieses Buchs durch Wischen aufrufen
These days in smart home environments, one could find the absence of mechanisms to empower occupants so as to see and manage the data created by smart gadgets at peoples living places. By means of the expanding adoption physical devices such as remote systems, intelligent gadgets, and sensors homes have been getting to be smart home environments. Intelligent gadgets could obtain an unfathomable measure of delicate individual data. Nevertheless the incredible way of smart home data investigation has been building up defensive consideration. The gathering and processing of data of this data raises privacy concerns about how the people existing in a kind of a smart home environments could guarantee where this data would be shared just pertaining to their own particular great, as opposed to be shared, collected, used, or maliciously disclosed so as to meet the requirements which would damage their independence and security. Hence handling a sort of data ought to be exclusive to specific clients in charge of straight concern. This study proposes a framework displayed to keep up safety and saving protection so as to examine the data regarding from homes that are brilliant, in the absence of bargaining on utility data. This study deals with the implantation of a security protecting method of pertaining to the art of solving coding called cryptography as well as randomization has been utilized for keeping up the protection of touchy data pertaining to a person. Randomization is strategy; which adjusts unique data by the addition of a few noises arbitrarily to unique data which is independent of different reports. At this time cryptography strategy has been utilized to provide safety and security of sensitive attributes. Prior to the process of Randomization Data partition are performed in vertical and horizontal. At long last, giving right of entry of sharing data is data is ensured against third party and valuable data is imparted to approved data per users for security counseling, and investigative reason.
Bitte loggen Sie sich ein, um Zugang zu diesem Inhalt zu erhalten
Sie möchten Zugang zu diesem Inhalt erhalten? Dann informieren Sie sich jetzt über unsere Produkte:
Wong, R. C.-W., Fu, A. W.-C., Wang, K, & Pei, J. (2007). Minimality attack in privacy preserving data publishing. Proceedings of the International Conference on Very Large Data Bases (VLDB), pp. 543–554.
Cook, D. J., Youngblood, M., Heierman, E. O., Gopalratnam, K., Rao, S., Litvin, A., & Khawaja, F. (2003). Mavhome: An agent-based smart home. In Proceedings of the First IEEE International Conference on Pervasive Computing and Communications 2003, pp. 521–524. https://doi.org/10.1109/percom.2003.1192783.
Cook, D. J., Youngblood, G. M., & Jain, G. (2008). Algorithms for smart spaces. In Technology for Aging, Disability and Independence: Computer and Engineering for Design and Applications. Wiley.
Langheinrich, M. (2001). Privacy by design—Principles of privacy-aware ubiquitous systems. In Ubicomp: Ubiquitous Computing, 2001, pp. 273–291. Available at http://Link.Springer.Com/Chapter/10.1007/3-540-45427-6_23.
Rivest, R., Adleman, L., & Dertouzos, M. (1978). On data banks and privacy homomorphisms. Foundations of Secure Computation, 169–177. Academic Press.
Fontaine, C., & Galand, F. (2007). A survey of homomorphic encryption for nonspecialists. Journal on Data Security, 2004(15).
Dhivakar, K., & Mohana. (2014). A survey on privacy preservation approaches and techniques. International Journal of Innovative Research in Computer & Communication Engineering, 2(11), November 2014.
Chen, K., & Liu, L. (2009). Privacy-preserving multiparty collaborative mining with geometric data perturbation, Dec 2009.
Sharma, D. (2012). A survey on maintaining privacy. In Data Mining. IJERT April
Devi, S. (2011). A survey on privacy preserving data mining: Approaches and techniques. IJEST March.
Silwattananusarn, T., & Tuamsuk, K. (2012). Data mining and its applications for knowledge management: A literature review from 2007 to 2012. IJDKP September 2012.
Shrma, S., Gupta, H., & Jain, P. (2012). A study survey of privacy preserving data mining. IJRICE April 2012.
Adhvaryu, R., & Domadiya, N. (2014). On horizontally partitioned database. International Journal Of Engineering Development And Research IJEDR, 2(1). ISSN 2321–9939 Ijedr1401035 ( www.ijedr.org) 200 Research Trends In Privacy Preserving In Association Rule Mining (Pparm).
Rajkumar, M. N., Vijayalakshmi, A., & Shiny, M. U. (2016). Survey of secure two parties confidential data release in vertical partitioned data. WSN, 45(2), 126–136 Eissn 2392–2192.
Shrivastva, V. (2013). Randomized response technique in data mining. International Journal on Recent and Innovation Trends in Computing and Communication, 1(6), 569–574. ISSN 2321–8169. June 2013, Monika Soni Arya College of Engineering And It, Jaipur (Raj.)
Moncrieff, S., Venkatesh, S. et al. (2007). Dynamic privacy in a smart house environment. IEEE International Conference on Multimedia and Expo, pp. 2034–2037, July 2007.
Meyer, S., & Rakotonirainy, A. (2013). A survey of research on context-aware homes. Australian Computer Society, 21, 159–168.
Bagüés, S., Zeidler, A. et al. (2007). Sentry home—leveraging the smart home for privacy in pervasive computing. International Journal of Smart Home, 1(2), July 2007.
Drosatos, G., & Efraimidis, P. (2011). Privacy-preserving statistical analysis on ubiquitous health data. In 8th International Conference on Trust, Privacy and Security in Digital Business, pp. 24–36, Springer Verlag.
Chen, D., & Zhao, H. (2012). Data security and privacy protection issues in cloud computing. International Conference on Computer Science and Electronics Engineering (ICCSEE), 1, 647–651.
- Privacy Protection Data Analytics in Smart Home Environments with Secure Computation
- Springer Singapore