2021
DOI: 10.3991/ijes.v9i1.20819
|View full text |Cite
|
Sign up to set email alerts
|

Towards an Architecture-based Ensemble Methods for Online Social Network Sensitive Data Privacy Protection

Abstract: <p><strong>Abstract - </strong>In 2014, the world woke up to a giant data breach that leveraged users’ personal information that was taken from one of the world’s biggest social network platform. Based on the literature, this was possible because of the Centralised Architectural-based Approach to protecting the privacy of users’ online data. Although the literature is inundated with decentralized approaches, there is none to the best of our knowledge that uses an ensemble of methods and draws… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 38 publications
0
1
0
Order By: Relevance
“…In addition, data encryption for privacy protection is a common means. Idepefo et al [9] combined blockchain technology with cryptography, hash, and consensus mechanisms. Xie et al [10] proposed a hybrid data method based on homomorphic encryption and AES and constructed a multiclass support vector machinebased privacy-preserving medical data sharing system.…”
Section: Research On Privacy Protectionmentioning
confidence: 99%
“…In addition, data encryption for privacy protection is a common means. Idepefo et al [9] combined blockchain technology with cryptography, hash, and consensus mechanisms. Xie et al [10] proposed a hybrid data method based on homomorphic encryption and AES and constructed a multiclass support vector machinebased privacy-preserving medical data sharing system.…”
Section: Research On Privacy Protectionmentioning
confidence: 99%
“…The following lines describe the types of increasing noise in ciphertexts during homomorphic operations and present the most commonly used noise management strategies. Homomorphic encryption scheme When the encrypted data is stored on cloud [20,21], all kinds of computations [19] such as analyzing data, the calculation of variance, data mining, … are performed after prior decryption. The prior decryption brings an additional cost in terms of resources and time and introduces a possibility of loss of confidentiality and privacy.…”
Section: Introductionmentioning
confidence: 99%