Privacy-preserving data mining: methods, metrics, and applications

R Mendes, JP Vilela - IEEE Access, 2017 - ieeexplore.ieee.org
The collection and analysis of data are continuously growing due to the pervasiveness of
computing devices. The analysis of such information is fostering businesses and …

Privacy in the Internet of Things: threats and challenges

JH Ziegeldorf, OG Morchon… - Security and …, 2014 - Wiley Online Library
ABSTRACT The Internet of Things paradigm envisions the pervasive interconnection and
cooperation of smart things over the current and future Internet infrastructure. The Internet of …

Evolving privacy: From sensors to the Internet of Things

J Lopez, R Rios, F Bao, G Wang - Future Generation Computer Systems, 2017 - Elsevier
Abstract The Internet of Things (IoT) envisions a world covered with billions of smart,
interacting things capable of offering all sorts of services to near and remote entities. The …

Privacy preservation in wireless sensor networks: A state-of-the-art survey

N Li, N Zhang, SK Das, B Thuraisingham - Ad Hoc Networks, 2009 - Elsevier
Much of the existing work on wireless sensor networks (WSNs) has focused on addressing
the power and computational resource constraints of WSNs by the design of specific routing …

[PDF][PDF] Privacy enhancing technologies: A review

Y Shen, S Pearson - … Packard Development Company. Disponible en https …, 2011 - Citeseer
Organisations handle employees', customers' and third parties' Personally Identifiable
Information (PII) in a number of ways and for a variety of reasons; when doing this, it is …

Integrity protecting hierarchical concealed data aggregation for wireless sensor networks

S Ozdemir, Y **ao - Computer Networks, 2011 - Elsevier
In wireless sensor networks, performing data aggregation while preserving data
confidentiality and integrity is challenging. Recently, privacy homomorphism-based secure …

Attribute-based access to scalable media in cloud-assisted content sharing networks

Y Wu, Z Wei, RH Deng - IEEE transactions on multimedia, 2013 - ieeexplore.ieee.org
This paper presents a novel Multi-message Ciphertext Policy Attribute-Based Encryption
(MCP-ABE) technique, and employs the MCP-ABE to design an access control scheme for …

Distributed privacy-preserving access control in sensor networks

R Zhang, Y Zhang, K Ren - IEEE Transactions on Parallel and …, 2011 - ieeexplore.ieee.org
The owner and users of a sensor network may be different, which necessitates privacy-
preserving access control. On the one hand, the network owner need enforce strict access …

Distributed access control with privacy support in wireless sensor networks

D He, J Bu, S Zhu, S Chan… - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
A distributed access control module in wireless sensor networks (WSNs) allows the network
to authorize and grant user access privileges for in-network data access. Prior research …

Short paper: PEPSI---privacy-enhanced participatory sensing infrastructure

E De Cristofaro, C Soriente - Proceedings of the fourth ACM conference …, 2011 - dl.acm.org
Participatory Sensing combines the ubiquity of mobile phones with the sensing capabilities
of Wireless Sensor Networks. It targets the pervasive collection of information, eg …