- 标题
- 摘要
- 关键词
- 实验方案
- 产品
-
[IEEE 2019 22nd International Multitopic Conference (INMIC) - Islamabad, Pakistan (2019.11.29-2019.11.30)] 2019 22nd International Multitopic Conference (INMIC) - Internal Power Reserve Estimation for Frequency Regulation in Storageless Photovoltaic System
摘要: Providing top-k query services is relevant for storage servers which collect valuable ?les/data and process queries for data owners and mobile users. However, this kind of service could incur severe security concerns, because hackers or even the managers/administrators of the servers may steal important data sets and deceive users into responding to forged or incomplete query results. Therefore, these data sets need to be preserved in privacy, and moreover, the users should have the capability to verify the authenticity and integrity of the query results. As users will demand distinct information with various preferences and time domains in the pragmatic world, the traditional top-k queries are insuf?cient to satisfy their demands. To solve the problem, we provide the functional top-k queries in multi-dimensional space, such that the users can launch queries on the conjunction and sum of the dimensions/attributes. Some recent works have studied how to preserve data privacy and/or integrity for top-k queries on data storage applications. However, these prior works are limited to traditional top-k queries in preserving data privacy and/or integrity without permitting to systematically process top-k queries over encrypted domain in multi-dimensional space and without providing an ef?ciently veri?able mechanism for the corresponding query results. In this paper, we propose an ef?cient and effective method, called SFTopk, which addresses more challenging security problems in data privacy and veri?able functional top-k queries in multi-dimensional space. From performance evaluation experiments, it is shown that our proposed method is much more ef?cient than the prior works in terms of communication overhead and computation cost.
关键词: functional top-k query,authenticity,data storage,integrity,correctness,Privacy
更新于2025-09-19 17:13:59
-
Green wavelength-tunable and high power Ho3+-doped upconversion fiber lasers
摘要: Biometrics is commonly used in many automated verification systems offering several advantages over traditional verification methods. Since biometric features are associated with individuals, their leakage will violate individuals’ privacy, which can cause serious and continued problems as the biometric data from a person are irreplaceable. To protect the biometric data containing privacy information, a number of privacy-preserving biometric schemes (PPBSs) have been developed over the last decade, but they have various drawbacks. The aim of this paper is to provide a comprehensive overview of the existing PPBSs and give guidance for future privacy-preserving biometric research. In particular, we explain the functional mechanisms of popular PPBSs and present the state-of-the-art privacy-preserving biometric methods based on these mechanisms. Furthermore, we discuss the drawbacks of the existing PPBSs and point out the challenges and future research directions in PPBSs.
关键词: automated verification system,biometric data,Privacy protection
更新于2025-09-19 17:13:59
-
[IEEE 2019 IEEE 2nd International Conference on Electronic Information and Communication Technology (ICEICT) - Harbin, China (2019.1.20-2019.1.22)] 2019 IEEE 2nd International Conference on Electronic Information and Communication Technology (ICEICT) - A Flexible and Lightweight Laser Wireless Access Network Design for Space Vehicle
摘要: In this paper, we propose an efficient distortion-based privacy-preserving metering scheme that protects an individual customer’s privacy and provides the complete power consumption distribution curve of a multitude of customers without privacy invasion. In the proposed scheme, a random noise is purposely introduced to distort customers’ power consumption data at the smart meter so that data recovery becomes infeasible. Using the power consumption data and prior knowledge about added random noise, we develop an efficient algorithm for power consumption distribution reconstruction needed for power demand analysis and prediction. As a complete solution, our scheme also supports a privacy-preserving billing service. Using experimental results from real world single household power consumption data set and synthesized data of a large number of households, we demonstrate that the proposed scheme is robust against known attacks. Since it does not demand new facilities on existing smart grids, the proposed scheme offers a practical solution.
关键词: smart grids,smart meter,privacy-preserving,power consumption,privacy protection,Data privacy
更新于2025-09-16 10:30:52
-
[IEEE 2019 IEEE Conference on Antenna Measurements & Applications (CAMA) - Kuta, Bali, Indonesia (2019.10.23-2019.10.25)] 2019 IEEE Conference on Antenna Measurements & Applications (CAMA) - Bandwidth Enhancement Substrate Integrated Waveguide (SIW) Antenna V-Shape Slot for X Band Application
摘要: Biometrics is commonly used in many automated verification systems offering several advantages over traditional verification methods. Since biometric features are associated with individuals, their leakage will violate individuals’ privacy, which can cause serious and continued problems as the biometric data from a person are irreplaceable. To protect the biometric data containing privacy information, a number of privacy-preserving biometric schemes (PPBSs) have been developed over the last decade, but they have various drawbacks. The aim of this paper is to provide a comprehensive overview of the existing PPBSs and give guidance for future privacy-preserving biometric research. In particular, we explain the functional mechanisms of popular PPBSs and present the state-of-the-art privacy-preserving biometric methods based on these mechanisms. Furthermore, we discuss the drawbacks of the existing PPBSs and point out the challenges and future research directions in PPBSs.
关键词: biometric data,automated verification system,Privacy protection
更新于2025-09-16 10:30:52
-
[IEEE 2018 International CET Conference on Control, Communication, and Computing (IC4) - Thiruvananthapuram, India (2018.7.5-2018.7.7)] 2018 International CET Conference on Control, Communication, and Computing (IC4) - Reversible and Secure False Color Based Image Privacy Protection with Color Palette Generation
摘要: In many areas, visual privacy needs the protection, especially in video surveillance. Video surveillance is considered as an important solution for the security and safety issues in public places, since it monitors behaviour, activities, or other changing information. Its usage is increased in today’s world which affects individual’s privacy. There comes the need of visual privacy protection in video surveillance. Local servers can not store and analyze this large amount of data from the surveillance camera. So usage of cloud servers can solve this problem. But there is a chance to acquire these data by unauthorized parties. Different schemes for data hiding are present, which reversibly encrypts this data. But such systems need to do the detection of sensitive regions either by using a computer vision module or manually which increases complexity and reduces reliability. So two fully reversible privacy protection schemes for images using false coloring can be used. First scheme is more generic i.e., it is ?exible with other privacy protection schemes and the next scheme is fully based on false colors. These schemes are independent of region-of-interest (ROI) detection and can be applied to the whole image. So the user can escape from the complex ROI detection. A color palette generation method is also added with these schemes which increases the security.
关键词: k-means clustering,scrambling,pixelation,ROI,blurring,privacy protection,false coloring
更新于2025-09-10 09:29:36
-
[IEEE 2018 International Symposium on Electromagnetic Compatibility (EMC EUROPE) - Amsterdam (2018.8.27-2018.8.30)] 2018 International Symposium on Electromagnetic Compatibility (EMC EUROPE) - Optical TEMPEST
摘要: Research on optical TEMPEST has moved forward since 2002 when the ?rst pair of papers on the subject emerged independently and from widely separated locations in the world within a week of each other. Since that time, vulnerabilities have evolved along with systems, and several new threat vectors have consequently appeared. Although the supply chain ecosystem of Ethernet has reduced the vulnerability of billions of devices through use of standardised PHY solutions, other recent trends including the Internet of Things (IoT) in both industrial settings and the general population, High Frequency Trading (HFT) in the ?nancial sector, the European General Data Protection Regulation (GDPR), and inexpensive drones have made it relevant again for consideration in the design of new products for privacy. One of the general principles of security is that vulnerabilities, once ?xed, sometimes do not stay that way.
关键词: vulnerabilities,privacy,Ethernet,GDPR,IoT,optical TEMPEST,security,HFT
更新于2025-09-09 09:28:46
-
[IEEE 2018 10th International Conference on Wireless Communications and Signal Processing (WCSP) - Hangzhou, China (2018.10.18-2018.10.20)] 2018 10th International Conference on Wireless Communications and Signal Processing (WCSP) - Privacy Protection via Beamforming Optimization in MISO NOMA Networks
摘要: Non-orthogonal multiple access is a promising approach for 5G. However, the privacy between users may be compromised due to the superposition of all users’ signals to successive interference cancellation (SIC) receivers. In this paper, we propose a scheme based on beamforming optimization for the downlink NOMA that can enhance the security of a speci?c private user while guaranteeing other users’ quality of service (QoS). Speci?cally, we intend to maximize the secrecy rate of the private user, under the constraint that the other users’ QoS is satis?ed. Owing to the non-convexity, we ?rst convert it into convex forms and then, an iterative algorithm based on the concave-convex procedure is proposed to attain their solutions. Extensive simulation results are presented to evaluate the effectiveness of the proposed scheme.
关键词: privacy protection,beamforming optimization,physical layer security,Non-orthogonal multiple access
更新于2025-09-04 15:30:14