87,844 research outputs found

    Privacy perception and information technology utilization of high school students

    Get PDF
    Mobile technologies are commonly used and are important by high school students, since teens ages 14 to 17 usethese open platforms to share information, communication and construction of their desired cyber identity.Accompanying technology for related data privacy within implementing educational applications is yet to bedeveloped. This research was designed to investigate the perceptions of data privacy and the protection of per-sonal data of high school students who are surrounded by the Internet, social media and technology. Theperception of high school students' personal data privacy survey was developed and conducted with 1065 highschool students (9th grades). The study presentsfive main themes: (1) ownership and utilization of differenttechnologies and password sharing, (2) Internet utilization and perception of privacy, (3) social media utilizationand perception of personal privacy on social media, (4) knowledge level and perception of personal data con-servation, (5) Information technology utilization. High school students have a personal data privacy algorithm butpersons or institutions outside this algorithm are perceived as a threat to their personal data and are rejected. Thisresearch suggests developing practices and techniques to overcome students' concerns about privacy risks thatresult from the collection and sharing personal data

    Lessons Learned: Surveying the Practicality of Differential Privacy in the Industry

    Full text link
    Since its introduction in 2006, differential privacy has emerged as a predominant statistical tool for quantifying data privacy in academic works. Yet despite the plethora of research and open-source utilities that have accompanied its rise, with limited exceptions, differential privacy has failed to achieve widespread adoption in the enterprise domain. Our study aims to shed light on the fundamental causes underlying this academic-industrial utilization gap through detailed interviews of 24 privacy practitioners across 9 major companies. We analyze the results of our survey to provide key findings and suggestions for companies striving to improve privacy protection in their data workflows and highlight the necessary and missing requirements of existing differential privacy tools, with the goal of guiding researchers working towards the broader adoption of differential privacy. Our findings indicate that analysts suffer from lengthy bureaucratic processes for requesting access to sensitive data, yet once granted, only scarcely-enforced privacy policies stand between rogue practitioners and misuse of private information. We thus argue that differential privacy can significantly improve the processes of requesting and conducting data exploration across silos, and conclude that with a few of the improvements suggested herein, the practical use of differential privacy across the enterprise is within striking distance

    Efficient Privacy-Aware Imagery Data Analysis

    Get PDF
    The widespread use of smartphones and camera-coupled Internet of Thing (IoT) devices triggers an explosive growth of imagery data. To extract and process the rich contents contained in imagery data, various image analysis techniques have been investigated and applied to a spectrum of application scenarios. In recent years, breakthroughs in deep learning have powered a new revolution for image analysis in terms of effectiveness with high resource consumption. Given the fact that most smartphones and IoT devices have limited computational capability and battery life, they are not ready for the processing of computational intensive analytics over imagery data collected by them, especially when deep learning is involved. To resolve the bottleneck of computation, storage, and energy for these resource constrained devices, offloading complex image analysis to public cloud computing platforms has become a promising trend in both academia and industry. However, an outstanding challenge with public cloud is on the protection of sensitive information contained in many imagery data, such as personal identities and financial data. Directly sending imagery data to the public cloud can cause serious privacy concerns and even legal issues. In this dissertation, I propose a comprehensive privacy-preserving imagery data analysis framework which can be integrated in different application scenarios to assist image analysis for resource-constrained devices with efficiency, accuracy, and privacy protection. I first identify security challenges in the utilization of public cloud for image analysis. Then, I design and develop a set of novel solutions to address these challenges. These solutions will be featured by strong privacy guarantee, lightweight computation, low accuracy loss compared with image analysis without privacy protection. To optimize the communication overhead and resource utilization of using cloud computing, I investigate edge computing, which is a promising technique to ameliorate the high communication overhead in cloud-assisted architectures. Furthermore, to boost the performance of my solutions under both cloud and edge deployment, I also provide a set of pluggable enhancement modules to be applied to meet different requirements for various tasks. By exploring the features of edge computing and cloud computing, I flexibly incorporate them as a comprehensive framework to provide privacy-preserving image analysis services

    Efficient Multi-User Keyword Search over Encrypted Data in Cloud Computing

    Get PDF
    As cloud computing becomes prevalent, more and more sensitive information are being centralized into the cloud. For the protection of data privacy, sensitive data usually have to be encrypted before outsourcing, which makes effective data utilization a very challenging task. In this paper, we propose a new method to enable effective fuzzy keyword search in a multi-user system over encrypted cloud data while maintaining keyword privacy. In this new system, differential searching privileges are supported, which is achieved with the technique of attribute-based encryption. Edit distance is utilized to quantify keywords similarity and develop fuzzy keyword search technique, which achieve optimized storage and representation overheads. We further propose a symbol-based trie-traverse searching scheme to improve the search efficiency. Through rigorous security analysis, we show that our proposed solution is secure and privacy-preserving, while correctly realizing the goal of fuzzy keyword search with multiple users

    E-DPNCT: An Enhanced Attack Resilient Differential Privacy Model For Smart Grids Using Split Noise Cancellation

    Full text link
    High frequency reporting of energy utilization data in smart grids can be used to infer sensitive information regarding the consumer's life style. We propose A Differential Private Noise Cancellation Model for Load Monitoring and Billing for Smart Meters (DPNCT) to protect the privacy of the smart grid data using noise cancellation protocol with a master smart meter to provide accurate billing and load monitoring. Next, we evaluate the performance of DPNCT under various privacy attacks such as filtering attack, negative noise cancellation attack and collusion attack. The DPNCT model relies on trusted master smart meters and is vulnerable to collusion attack where adversary collude with malicious smart meters in order to get private information of other smart meters. In this paper, we propose an Enhanced DPNCT (E-DPNCT) where we use multiple master smart meters for split noise at each instant in time t for better protection against collusion attack. We did extensive comparison of our E-DPNCT model with state of the art attack resistant privacy preserving models such as EPIC for collision attack and with Barbosa Differentialy Private (BDP) model for filtering attack. We evaluate our E-DPNCT model with real time data which shows significant improvement in privacy attack scenarios without any compute intensive operations.Comment: 10 pages, 12 figues, 4 table

    Legal Protection of Personal Data in Artificial Intelligence for Legal Protection Viewed From Legal Certainty Aspect

    Get PDF
    Protection of personal data is one of the rights possessed by humans, which is one of the privacy rights possessed by a person in maintaining and securing personal data owned by each individual. The development of Artificial Intelligence (AI)-based technology has developed rapidly in the digital world 4.0, where legal protection is needed in personal data protection legal instruments. This research aims to examine the use of AI as a tool in protecting personal data and to examine the urgency of a special regulation in Indonesia in protecting personal data. The research method used in writing this law is normative legal research. In this research, what is meant by juridical research is the 1945 Constitution of the Republic of Indonesia, the Law on Information, and Electronic Transactions Number 11 of 2008, the Regulation of the Minister of Communication and Information Number 20 of 2016, Government Regulation Number 82 of 2012, and UDHR by conducting a study of legal products in the form of laws and regulations. Furthermore, what is meant by normative research is related to the principle of legal certainty, which later can be linked to the urgency of personal data protection regulations for the protection, supervision, and utilization of personal data abuse. Keywords: personal data, artificial intelligence, protection, urgenc

    REFORMULASI PENETRATION STRESS TEST SEBAGAI PERLINDUNGAN HUKUM DATA PRIBADI KONSUMEN DI ERA BISNIS DIGITAL

    Get PDF
    This research focus on consumer personal data protection as a part of invention from privacy right in digital era. The high number of consumer personal data utilization by electronic system operator not accompanied with decent penetration stress test (PST) regulation. The purpose of this research is to give solution to clear personal data protection problem through PST testing method. The method that used by this research is normative research through statutory approach and conceptual approach. The result from this research concludes that there are still many problematic PST regulation. The problem can be seen from personal data protection that shattered in 30 statutory from different sector with no one arrange PST comprehensively. This dispute culminates to emergence dissimilarity definition, overlapping authority between receiver of System Management Security Information certification annual report, and PST operator polemic. As the result, it causes rampant of personal data breach that inflict consumer by matter, along with specific data exploitation that lead to sluggish business and economic country. Therefore, PST testing reformulation is needed as prevention step to protect consumer personal data in digital business era
    corecore