Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges

J Domingo-Ferrer, O Farras, J Ribes-González… - Computer …, 2019 - Elsevier
The increasing volume of personal and sensitive data being harvested by data controllers
makes it increasingly necessary to use the cloud not just to store the data, but also to …

Federated learning for 6G-enabled secure communication systems: a comprehensive survey

D Sirohi, N Kumar, PS Rana, S Tanwar, R Iqbal… - Artificial Intelligence …, 2023 - Springer
Abstract Machine learning (ML) and Deep learning (DL) models are popular in many areas,
from business, medicine, industries, healthcare, transportation, smart cities, and many more …

Privacy and data protection by design-from policy to engineering

G Danezis, J Domingo-Ferrer, M Hansen… - arXiv preprint arXiv …, 2015 - arxiv.org
Privacy and data protection constitute core values of individuals and of democratic societies.
There have been decades of debate on how those values-and legal obligations-can be …

An effective secured privacy-protecting data aggregation method in IoT

S Pramanik - Achieving Full Realization and Mitigating the …, 2022 - igi-global.com
Because privacy concerns in IoT devices are the most sensitive of all the difficulties, such an
extreme growth in IoT usage has an impact on the privacy and life spans of IoT devices …

Data-oriented mobile crowdsensing: A comprehensive survey

Y Liu, L Kong, G Chen - IEEE communications surveys & …, 2019 - ieeexplore.ieee.org
Mobile devices equipped with rich sensors, such as smartphones, watches, or vehicles,
have been pervasively used all around the world. Their high penetration and powerful …

[HTML][HTML] Publishing data from electronic health records while preserving privacy: A survey of algorithms

A Gkoulalas-Divanis, G Loukides, J Sun - Journal of biomedical informatics, 2014 - Elsevier
Abstract The dissemination of Electronic Health Records (EHRs) can be highly beneficial for
a range of medical studies, spanning from clinical trials to epidemic control studies, but it …

Towards trajectory anonymization: a generalization-based approach

ME Nergiz, M Atzori, Y Saygin - … of the SIGSPATIAL ACM GIS 2008 …, 2008 - dl.acm.org
Trajectory datasets are becoming more and more popular due to the massive usage of GPS
and other location-based devices and services. In this paper, we address privacy issues …

A review of anonymization for healthcare data

IE Olatunji, J Rauch, M Katzensteiner, M Khosla - Big data, 2024 - liebertpub.com
Mining health data can lead to faster medical decisions, improvement in the quality of
treatment, disease prevention, and reduced cost, and it drives innovative solutions within the …

Enhancing data utility in differential privacy via microaggregation-based -anonymity

J Soria-Comas, J Domingo-Ferrer, D Sánchez… - The VLDB Journal, 2014 - Springer
It is not uncommon in the data anonymization literature to oppose the “old” k k-anonymity
model to the “new” differential privacy model, which offers more robust privacy guarantees …

Privacy by design in big data: an overview of privacy enhancing technologies in the era of big data analytics

G D'Acquisto, J Domingo-Ferrer, P Kikiras… - arXiv preprint arXiv …, 2015 - arxiv.org
The extensive collection and processing of personal information in big data analytics has
given rise to serious privacy concerns, related to wide scale electronic surveillance, profiling …