2015 IEEE International Conference on Smart City/SocialCom/SustainCom (SmartCity) 2015
DOI: 10.1109/smartcity.2015.161
|View full text |Cite
|
Sign up to set email alerts
|

Access Control for Privacy Protection for Dynamic and Correlated Databases

Abstract: The characteristics of volume, variety, velocity and value for big data have made present privacy protection methods less effective in the protection of user privacy to meet the emerging requirements. In this paper, we analyze the spatial and temporal effects the access to the data on privacy disclosure and propose an access control model to protect user privacy that is related to the number and the frequency of access in the access history of the requester. By introducing the notions of the privacy threshold,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2016
2016
2018
2018

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 8 publications
0
1
0
Order By: Relevance
“…Technical solutions regarding privacy enforcement would in general refer to PET -Privacy-Enforcement Technologies. Those technologies assume secure communication and data storage by encryption, access control and auditing, anonymization of on-line activity, detection of privacy violators, and so on [25,40]. Since PET can only partially address privacy-related problems, they need to be combined with information governance features in order to create comprehensive privacyenforcement mechanisms.…”
Section: Privacymentioning
confidence: 99%
“…Technical solutions regarding privacy enforcement would in general refer to PET -Privacy-Enforcement Technologies. Those technologies assume secure communication and data storage by encryption, access control and auditing, anonymization of on-line activity, detection of privacy violators, and so on [25,40]. Since PET can only partially address privacy-related problems, they need to be combined with information governance features in order to create comprehensive privacyenforcement mechanisms.…”
Section: Privacymentioning
confidence: 99%