咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Privacy Computing: Concept, Co... 收藏

Privacy Computing: Concept, Computing Framework, and Future Development Trends

Privacy Computing: Concept, Computing Framework, and Future Development Trends

作     者:Fenghua Li Hui Li Ben Niu Jinjun Chen 

作者机构:Institute of Information EngineeringChinese Academy of SciencesBeijing 100093China School of Cyber SecurityUniversity of Chinese Academy of SciencesBeijing 100049China State Key Laboratory of Integrated Services NetworksSchool of Cyber EngineeringXidian UniversityXi’an 710071China Department of Computer Science and Software EngineeringSwinburne University of TechnologyHawthornVIC 3122Australia 

出 版 物:《Engineering》 (工程(英文))

年 卷 期:2019年第5卷第6期

页      面:1179-1192页

核心收录:

学科分类:0810[工学-信息与通信工程] 0830[工学-环境科学与工程(可授工学、理学、农学学位)] 0808[工学-电气工程] 0817[工学-化学工程与技术] 08[工学] 0807[工学-动力工程及工程热物理] 0805[工学-材料科学与工程(可授工学、理学学位)] 0703[理学-化学] 0812[工学-计算机科学与技术(可授工学、理学学位)] 

基  金:National Natural Science Foundation of China, NSFC, (61672515, 61872441) Chinese Academy of Sciences, CAS, (2018196) National Basic Research Program of China (973 Program), (2017YFB0802203) Youth Innovation Promotion Association, YIPA 

主  题:Privacy computing Private information description Privacy metric Evaluation of the privacy-preserving effect Privacy computing language 

摘      要:With the rapid development of information technology and the continuous evolution of personalized ser- vices, huge amounts of data are accumulated by large internet companies in the process of serving users. Moreover, dynamic data interactions increase the intentional/unintentional persistence of private infor- mation in different information systems. However, problems such as the cask principle of preserving pri- vate information among different information systems and the dif culty of tracing the source of privacy violations are becoming increasingly serious. Therefore, existing privacy-preserving schemes cannot pro- vide systematic privacy preservation. In this paper, we examine the links of the information life-cycle, such as information collection, storage, processing, distribution, and destruction. We then propose a the- ory of privacy computing and a key technology system that includes a privacy computing framework, a formal de nition of privacy computing, four principles that should be followed in privacy computing, ffect algorithm design criteria, evaluation of the privacy-preserving effect, and a privacy computing language. Finally, we employ four application scenarios to describe the universal application of privacy computing, and discuss the prospect of future research trends. This work is expected to guide theoretical research on user privacy preservation within open environments.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分