Privacy-preserving schemes for ad hoc social networks: A survey

MA Ferrag, L Maglaras, A Ahmim - … Communications Surveys & …, 2017 - ieeexplore.ieee.org
We review the state of the art of privacypreserving schemes for ad hoc social networks
including mobile social networks (MSNs) and vehicular social networks (VSNs). Specifically …

A comprehensive survey on online social networks security and privacy issues: Threats, machine learning‐based solutions, and open challenges

M Bhattacharya, S Roy, S Chattopadhyay… - Security and …, 2023 - Wiley Online Library
Over the past few years, online social networks (OSNs) have become an inseparable part of
people's daily lives. Instead of being passive readers, people are now enjoying their role as …

Achieving efficient and privacy-preserving cross-domain big data deduplication in cloud

X Yang, R Lu, KKR Choo, F Yin… - IEEE transactions on big …, 2017 - ieeexplore.ieee.org
Secure data deduplication can significantly reduce the communication and storage
overheads in cloud storage services, and has potential applications in our big data-driven …

[HTML][HTML] A fine-grained and privacy-preserving query scheme for fog computing-enhanced location-based service

X Yang, F Yin, X Tang - Sensors, 2017 - mdpi.com
Location-based services (LBS), as one of the most popular location-awareness applications,
has been further developed to achieve low-latency with the assistance of fog computing …

-Safe ( )-Diversity Privacy Model for Sequential Publication With High Utility

H Zhu, HB Liang, L Zhao, DY Peng, L Xiong - IEEE Access, 2018 - ieeexplore.ieee.org
Preserving privacy while maintaining high utility during sequential publication for data
providers and data users in mathematical statistics, scientific researching, and organizations …

EEIRI: Efficient encrypted image retrieval in IoT-cloud

ZA Abduljabbar, A Ibrahim, MA Hussain… - KSII Transactions on …, 2019 - koreascience.kr
One of the best means to safeguard the confidentiality, security, and privacy of an image
within the IoT-Cloud is through encryption. However, looking through encrypted data is a …

Pedigree-ing your big data: Data-driven big data privacy in distributed environments

A Cuzzocrea, E Damiani - 2018 18th IEEE/ACM International …, 2018 - ieeexplore.ieee.org
This paper introduces a general framework for supporting data-driven privacy-preserving big
data management in distributed environments, such as emerging Cloud settings. The …

A comment on privacy-preserving scalar product protocols as proposed in “SPOC”

T Schneider, A Treiber - IEEE Transactions on Parallel and …, 2019 - ieeexplore.ieee.org
Privacy-preserving scalar product (PPSP) protocols are an important building block for
secure computation tasks in various applications. Lu et al.(TPDS'13) introduced a PPSP …

Complex Mining from Uncertain Big Data in Distributed Environments: Problems, Definitions, and Two Effective and Efficient Algorithms

A Cuzzocrea, CKS Leung, F Jiang… - Big Data Management …, 2017 - taylorfrancis.com
298Big data refer to a wide variety of valuable data of different veracities that are generated
or collected at a high velocity with volumes beyond the ability of commonly used software to …

Making the pedigree to your big data repository: Innovative methods, solutions, and algorithms for supporting big data privacy in distributed settings via data-driven …

A Cuzzocrea, E Damiani - 2019 IEEE 43rd Annual Computer …, 2019 - ieeexplore.ieee.org
Starting from our previous research where we in-troduced a general framework for
supporting data-driven privacy-preserving big data management in distributed …