Proceedings of the 2021 ACM Workshop on Intelligent Cross-Data Analysis and Retrieval 2021
DOI: 10.1145/3463944.3469267
|View full text |Cite
|
Sign up to set email alerts
|

Investigation on Privacy-Preserving Techniques For Personal Data

Abstract: Privacy protection technology has become a crucial part of almost every existing cross-data analysis application. The privacypreserving technique allows sharing sensitive personal information and preserves the users' privacy. This new trend influences data collection results by improving the analytical accuracy, increasing the number of participants, and better understand the participants' environments. Herein, collecting these personal data is significant to many advantageous applications such as health monit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(1 citation statement)
references
References 36 publications
0
1
0
Order By: Relevance
“…The implementation of the "Society 5.0" initiative is complicated by these issues. A great deal of attention has recently been paid to data protection in order to improve privacy in use, storage, and transmission [8][9][10]. Thanks to cryptographic security approaches, such as homomorphic encryption and blockchain, datasets of any size can currently be kept secure and effective as they travel across the network and are stored in the data store [11][12][13].…”
Section: Introductionmentioning
confidence: 99%
“…The implementation of the "Society 5.0" initiative is complicated by these issues. A great deal of attention has recently been paid to data protection in order to improve privacy in use, storage, and transmission [8][9][10]. Thanks to cryptographic security approaches, such as homomorphic encryption and blockchain, datasets of any size can currently be kept secure and effective as they travel across the network and are stored in the data store [11][12][13].…”
Section: Introductionmentioning
confidence: 99%