Privacy enhancing technologies in the Internet of Things: Perspectives and challenges
SC Cha, TY Hsu, Y Xiang… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
Internet of Things (IoT) devices have brought much efficiency and convenience to our daily
life. However, the devices may collect a myriad of data from people without their consent …
life. However, the devices may collect a myriad of data from people without their consent …
A room with an overview: Towards meaningful transparency for the consumer Internet of Things
As our physical environments become ever-more connected, instrumented, and automated,
it can be increasingly difficult for users to understand what is happening within them and …
it can be increasingly difficult for users to understand what is happening within them and …
Practical whole-system provenance capture
Data provenance describes how data came to be in its present form. It includes data sources
and the transformations that have been applied to them. Data provenance has many uses …
and the transformations that have been applied to them. Data provenance has many uses …
SHARE: Shaping data distribution at edge for communication-efficient hierarchical federated learning
Federated learning (FL) can enable distributed model training over mobile nodes without
sharing privacy-sensitive raw data. However, to achieve efficient FL, one significant …
sharing privacy-sensitive raw data. However, to achieve efficient FL, one significant …
Trustworthy AI in the age of pervasive computing and big data
The era of pervasive computing has resulted in countless devices that continuously monitor
users and their environment, generating an abundance of user behavioural data. Such data …
users and their environment, generating an abundance of user behavioural data. Such data …
Runtime analysis of whole-system provenance
Identifying the root cause and impact of a system intrusion remains a foundational challenge
in computer security. Digital provenance provides a detailed history of the flow of information …
in computer security. Digital provenance provides a detailed history of the flow of information …
Decision provenance: Harnessing data flow for accountable systems
Demand is growing for more accountability regarding the technological systems that
increasingly occupy our world. However, the complexity of many of these systems—often …
increasingly occupy our world. However, the complexity of many of these systems—often …
Holitrust-a holistic cross-domain trust management mechanism for service-centric Internet of Things
Internet of Things (IoT) is proposed and used in diverse application domains. In IoT, nodes
commonly have a low capacity to maintain security on their own expenses, which increases …
commonly have a low capacity to maintain security on their own expenses, which increases …
The security of medical data on internet based on differential privacy technology
Z Lv, F Piccialli - ACM Transactions on Internet Technology, 2021 - dl.acm.org
The study aims at discussing the security of medical data in the Internet era. By using k-
anonymity (KA) and differential privacy (DP), an algorithm model combining KA and DP was …
anonymity (KA) and differential privacy (DP), an algorithm model combining KA and DP was …
Accountability in the IoT: Systems, law, and ways forward
The physical, ubiquitous, and autonomous nature of the emerging Internet of Things (IoT)
raises various accountability challenges relating to safety and security, privacy and …
raises various accountability challenges relating to safety and security, privacy and …