16,384 research outputs found
Privacy-Preserving Reengineering of Model-View-Controller Application Architectures Using Linked Data
When a legacy system’s software architecture cannot be redesigned, implementing
additional privacy requirements is often complex, unreliable and
costly to maintain. This paper presents a privacy-by-design approach to
reengineer web applications as linked data-enabled and implement access
control and privacy preservation properties. The method is based on the
knowledge of the application architecture, which for the Web of data is
commonly designed on the basis of a model-view-controller pattern. Whereas
wrapping techniques commonly used to link data of web applications duplicate
the security source code, the new approach allows for the controlled
disclosure of an application’s data, while preserving non-functional properties
such as privacy preservation. The solution has been implemented
and compared with existing linked data frameworks in terms of reliability,
maintainability and complexity
Recommended from our members
Generative Adversarial Networks for Multi-Objective Synthetic Data Generation
Synthetic data has become increasingly accessible due to remarkable advancements in machine learning. This data is extremely useful to researchers due to its wide range of applications. Synthetic data may be used to robust populations that are under-sampled, or to create permutations of some existing data, generating combinations not seen in the original data. Synthetic data may also be used in place of the original data completely when sensitive aspects limit the distribution.Previously, research in synthetic data generation has been primarily focused on generating data that is maximally realistic. Significantly less attention has been paid to assurances of other components of the data, such as privacy concerns or data diversity. This has left a gap in the field of synthetic data generation. We address this through the investigation of multi-agent synthetic data generation.In this dissertation, we expand the scope of data generation by introducing agents that optimize various facets of synthetic data, such as privacy, class diversity, and training utility. We propose a novel, multi-objective synthetic generation framework to allow all of these objectives to be optimized. We finally demonstrate this framework can generate high quality data across multiple domains for an arbitrary number of objectives
Federated Learning for Medical Applications: A Taxonomy, Current Trends, Challenges, and Future Research Directions
With the advent of the IoT, AI, ML, and DL algorithms, the landscape of
data-driven medical applications has emerged as a promising avenue for
designing robust and scalable diagnostic and prognostic models from medical
data. This has gained a lot of attention from both academia and industry,
leading to significant improvements in healthcare quality. However, the
adoption of AI-driven medical applications still faces tough challenges,
including meeting security, privacy, and quality of service (QoS) standards.
Recent developments in \ac{FL} have made it possible to train complex
machine-learned models in a distributed manner and have become an active
research domain, particularly processing the medical data at the edge of the
network in a decentralized way to preserve privacy and address security
concerns. To this end, in this paper, we explore the present and future of FL
technology in medical applications where data sharing is a significant
challenge. We delve into the current research trends and their outcomes,
unravelling the complexities of designing reliable and scalable \ac{FL} models.
Our paper outlines the fundamental statistical issues in FL, tackles
device-related problems, addresses security challenges, and navigates the
complexity of privacy concerns, all while highlighting its transformative
potential in the medical field. Our study primarily focuses on medical
applications of \ac{FL}, particularly in the context of global cancer
diagnosis. We highlight the potential of FL to enable computer-aided diagnosis
tools that address this challenge with greater effectiveness than traditional
data-driven methods. We hope that this comprehensive review will serve as a
checkpoint for the field, summarizing the current state-of-the-art and
identifying open problems and future research directions.Comment: Accepted at IEEE Internet of Things Journa
Privacy-Preserving Data in IoT-based Cloud Systems: A Comprehensive Survey with AI Integration
As the integration of Internet of Things devices with cloud computing
proliferates, the paramount importance of privacy preservation comes to the
forefront. This survey paper meticulously explores the landscape of privacy
issues in the dynamic intersection of IoT and cloud systems. The comprehensive
literature review synthesizes existing research, illuminating key challenges
and discerning emerging trends in privacy preserving techniques. The
categorization of diverse approaches unveils a nuanced understanding of
encryption techniques, anonymization strategies, access control mechanisms, and
the burgeoning integration of artificial intelligence. Notable trends include
the infusion of machine learning for dynamic anonymization, homomorphic
encryption for secure computation, and AI-driven access control systems. The
culmination of this survey contributes a holistic view, laying the groundwork
for understanding the multifaceted strategies employed in securing sensitive
data within IoT-based cloud environments. The insights garnered from this
survey provide a valuable resource for researchers, practitioners, and
policymakers navigating the complex terrain of privacy preservation in the
evolving landscape of IoT and cloud computingComment: 33 page
Introduction to IoT
The Internet of Things has rapidly transformed the 21st century, enhancing
decision-making processes and introducing innovative consumer services such as
pay-as-you-use models. The integration of smart devices and automation
technologies has revolutionized every aspect of our lives, from health services
to the manufacturing industry, and from the agriculture sector to mining.
Alongside the positive aspects, it is also essential to recognize the
significant safety, security, and trust concerns in this technological
landscape. This chapter serves as a comprehensive guide for newcomers
interested in the IoT domain, providing a foundation for making future
contributions. Specifically, it discusses the overview, historical evolution,
key characteristics, advantages, architectures, taxonomy of technologies, and
existing applications in major IoT domains. In addressing prevalent issues and
challenges in designing and deploying IoT applications, the chapter examines
security threats across architectural layers, ethical considerations, user
privacy concerns, and trust-related issues. This discussion equips researchers
with a solid understanding of diverse IoT aspects, providing a comprehensive
understanding of IoT technology along with insights into the extensive
potential and impact of this transformative field.Comment: 48 pages, 7 figures, 8 tables, chapter 1 revised version of "IoT and
ML for Information Management: A Smart Healthcare Perspective" under the
Springer Studies in Computational Intelligence serie
- …