Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Computational data privacy in wireless networks

Full metadata record
DC Field Value Language
dc.contributor.authorWang, Jian-
dc.contributor.authorWu, Zhipeng-
dc.contributor.authorLiu, Yanheng-
dc.contributor.authorDeng, Weiwen-
dc.contributor.authorOh, Heekuck-
dc.date.accessioned2021-06-22T14:01:38Z-
dc.date.available2021-06-22T14:01:38Z-
dc.date.created2021-01-21-
dc.date.issued2017-07-
dc.identifier.issn1936-6442-
dc.identifier.urihttps://scholarworks.bwise.kr/erica/handle/2021.sw.erica/9473-
dc.description.abstractWireless networks appeal to privacy eavesdroppers that secretly capture packets from the open medium and read the metadata and data content in search of any type of information through data mining and statistical analysis. Addressing the problems of personal privacy for wireless users will require flexible privacy protection mechanisms adaptively to the frequently varying context. Privacy quantification is prerequisite for enabling a context-aware privacy protection in wireless networks. This paper proposes to quantify the data privacy during wireless communication processes. We give a computational quantification method of data privacy through introducing the concepts of privacy entropy and privacy joint entropy, which permits users and applications to on-demand customize their preferential sensitivity extent of privacy leakage and protection strength. Accordingly, we put forward a data-privacy protection scheme in order to explain how to utilize the proposed computational quantification method of data privacy against the excessive disclosure of data privacy. The results show that the computational quantitation method can effectively characterize the real-time fluctuation of data privacy during communication processes and provide the reliable judgment to context-aware privacy protection, which enables to real-timely control the present data privacy to an anticipated target and to balance a tradeoff between the data privacy and communication efficiency.-
dc.language영어-
dc.language.isoen-
dc.publisherSPRINGER-
dc.titleComputational data privacy in wireless networks-
dc.typeArticle-
dc.contributor.affiliatedAuthorOh, Heekuck-
dc.identifier.doi10.1007/s12083-016-0435-6-
dc.identifier.scopusid2-s2.0-84955300544-
dc.identifier.wosid000400385200004-
dc.identifier.bibliographicCitationPEER-TO-PEER NETWORKING AND APPLICATIONS, v.10, no.4, pp.865 - 873-
dc.relation.isPartOfPEER-TO-PEER NETWORKING AND APPLICATIONS-
dc.citation.titlePEER-TO-PEER NETWORKING AND APPLICATIONS-
dc.citation.volume10-
dc.citation.number4-
dc.citation.startPage865-
dc.citation.endPage873-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordPlusPROTECTION-
dc.subject.keywordPlusLEAKAGE-
dc.subject.keywordAuthorWireless network-
dc.subject.keywordAuthorData privacy-
dc.subject.keywordAuthorPrivacy quantification-
dc.subject.keywordAuthorPrivacy protection-
dc.subject.keywordAuthorPrivacy entropy Privacy-
dc.subject.keywordAuthorjoint entropy-
dc.identifier.urlhttps://link.springer.com/article/10.1007/s12083-016-0435-6-
Files in This Item
Go to Link
Appears in
Collections
COLLEGE OF COMPUTING > ERICA 컴퓨터학부 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Oh, Hee kuck photo

Oh, Hee kuck
ERICA 소프트웨어융합대학 (ERICA 컴퓨터학부)
Read more

Altmetrics

Total Views & Downloads

BROWSE