In recent years,the type and quantity of news are growing rapidly,and it is not easy for users to find the news they are interested in the massive amount of news.A news recommendation system can score and predict the ...In recent years,the type and quantity of news are growing rapidly,and it is not easy for users to find the news they are interested in the massive amount of news.A news recommendation system can score and predict the candidate news,and finally recommend the news with high scores to users.However,existing user models usually only consider users’long-term interests and ignore users’recent interests,which affects users’usage experience.Therefore,this paper introduces gated recurrent unit(GRU)sequence network to capture users’short-term interests and combines users’short-term interests and long-terminterests to characterize users.While existing models often only use the user’s browsing history and ignore the variability of different users’interest in the same news,we introduce additional user’s ID information and apply the personalized attention mechanism for user representation.Thus,we achieve a more accurate user representation.We also consider the risk of compromising user privacy if the user model training is placed on the server side.To solve this problem,we design the training of the user model locally on the client side by introducing a federated learning framework to keep the user’s browsing history on the client side.We further employ secure multiparty computation to request news representations from the server side,which protects privacy to some extent.Extensive experiments on a real-world news dataset show that our proposed news recommendation model has a better improvement in several performance evaluation metrics.Compared with the current state-of-the-art federated news recommendation models,our model has increased by 0.54%in AUC,1.97%in MRR,2.59%in nDCG@5%,and 1.89%in nDCG@10.At the same time,because we use a federated learning framework,compared with other centralized news recommendation methods,we achieve privacy protection for users.展开更多
The Personal Information Protection Law,as the first law on personal information protection in China,hits the people’s most concerned,realistic and direct privacy and information security issues,and plays an extremel...The Personal Information Protection Law,as the first law on personal information protection in China,hits the people’s most concerned,realistic and direct privacy and information security issues,and plays an extremely important role in promoting the development of the digital economy,the legalization of socialism with Chinese characteristics and social public security,and marks a new historical development stage in the protection of personal information in China.However,the awareness of privacy protection and privacy protection behavior of the public in personal information privacy protection is weak.Based on the literature review and in-depth understanding of current legal regulations,this study integrates the relevant literature and theoretical knowledge of the Personal Protection Law to construct a conceptual model of“privacy information protection willingness-privacy information protection behavior”.Taking the residents of Foshan City as an example,this paper conducts a questionnaire survey on their attitudes toward the Personal Protection Law,analyzes the factors influencing their willingness to protect their privacy and their behaviors,and explores the mechanisms of their influencing variables,to provide advice and suggestions for promoting the protection of privacy information and building a security barrier for the high-quality development of public information security.展开更多
With the rapid development of computer technology, cloud-based services have become a hot topic. They not only provide users with convenience, but also bring many security issues, such as data sharing and privacy issu...With the rapid development of computer technology, cloud-based services have become a hot topic. They not only provide users with convenience, but also bring many security issues, such as data sharing and privacy issue. In this paper, we present an access control system with privilege separation based on privacy protection(PS-ACS). In the PS-ACS scheme, we divide users into private domain(PRD) and public domain(PUD) logically. In PRD, to achieve read access permission and write access permission, we adopt the Key-Aggregate Encryption(KAE) and the Improved Attribute-based Signature(IABS) respectively. In PUD, we construct a new multi-authority ciphertext policy attribute-based encryption(CP-ABE) scheme with efficient decryption to avoid the issues of single point of failure and complicated key distribution, and design an efficient attribute revocation method for it. The analysis and simulation result show that our scheme is feasible and superior to protect users' privacy in cloud-based services.展开更多
In the security and privacy fields,Access Control(AC)systems are viewed as the fundamental aspects of networking security mechanisms.Enforcing AC becomes even more challenging when researchers and data analysts have t...In the security and privacy fields,Access Control(AC)systems are viewed as the fundamental aspects of networking security mechanisms.Enforcing AC becomes even more challenging when researchers and data analysts have to analyze complex and distributed Big Data(BD)processing cluster frameworks,which are adopted to manage yottabyte of unstructured sensitive data.For instance,Big Data systems’privacy and security restrictions are most likely to failure due to the malformed AC policy configurations.Furthermore,BD systems were initially developed toped to take care of some of the DB issues to address BD challenges and many of these dealt with the“three Vs”(Velocity,Volume,and Variety)attributes,without planning security consideration,which are considered to be patch work.Some of the BD“three Vs”characteristics,such as distributed computing,fragment,redundant data and node-to node communication,each with its own security challenges,complicate even more the applicability of AC in BD.This paper gives an overview of the latest security and privacy challenges in BD AC systems.Furthermore,it analyzes and compares some of the latest AC research frameworks to reduce privacy and security issues in distributed BD systems,which very few enforce AC in a cost-effective and in a timely manner.Moreover,this work discusses some of the future research methodologies and improvements for BD AC systems.This study is valuable asset for Artificial Intelligence(AI)researchers,DB developers and DB analysts who need the latest AC security and privacy research perspective before using and/or improving a current BD AC framework.展开更多
Data privacy is important to the security of our society,and enabling authorized users to query this data efficiently is facing more challenge.Recently,blockchain has gained extensive attention with its prominent char...Data privacy is important to the security of our society,and enabling authorized users to query this data efficiently is facing more challenge.Recently,blockchain has gained extensive attention with its prominent characteristics as public,distributed,decentration and chronological characteristics.However,the transaction information on the blockchain is open to all nodes,the transaction information update operation is even more transparent.And the leakage of transaction information will cause huge losses to the transaction party.In response to these problems,this paper combines hierarchical attribute encryption with linear secret sharing,and proposes a blockchain data privacy protection control scheme based on searchable attribute encryption,which solves the privacy exposure problem in traditional blockchain transactions.The user’s access control is implemented by the verification nodes,which avoids the security risks of submitting private keys and access structures to the blockchain network.Associating the private key component with the random identity of the user node in the blockchain can solve the collusion problem.In addition,authorized users can quickly search and supervise transaction information through searchable encryption.The improved algorithm ensures the security of keywords.Finally,based on the DBDH hypothesis,the security of the scheme is proved in the random prediction model.展开更多
Emerging cloud computing has introduced new platforms for developing enterprise academic web applications, where software, platforms and infrastructures are published to the globe as services. Software developers can ...Emerging cloud computing has introduced new platforms for developing enterprise academic web applications, where software, platforms and infrastructures are published to the globe as services. Software developers can build their systems by multiple invocations of these services. This research is devoted to investigating the management and data flow control over enterprise academic web applications where web services and developed academic web application are constructing infrastructure-networking scheme at the application level. Academic web services are invoked over http port and using REST based protocol;thus traditional access control method is not enough to control the follow of data using host and port information. The new cloud based access control rules proposed here are to be designed and implemented to work at this level. The new proposed access control architecture will be a web service gateway, and it published itself as a service (SaaS). We used three case studies to test our moodle and then we apply JSON parsers to perceive web service description file (WSDL file) and supply policies according to data are to be allowed or denied based on user roll through our parsing.展开更多
With the rapid development of the new generation of information technology,the analysis of mobile social network big data is getting deeper and deeper.At the same time,the risk of privacy disclosure in social network ...With the rapid development of the new generation of information technology,the analysis of mobile social network big data is getting deeper and deeper.At the same time,the risk of privacy disclosure in social network is also very obvious.In this paper,we summarize the main access control model in mobile social network,analyze their contribution and point out their disadvantages.On this basis,a practical privacy policy is defined through authorization model supporting personalized privacy preferences.Experiments have been conducted on synthetic data sets.The result shows that the proposed privacy protecting model could improve the security of the mobile social network while keeping high execution efficiency.展开更多
Highly Active Antiretroviral Therapy (HAART) has changed the course of human immunodeficiency virus (HIV) treatments since its introduction. However, for many patients, long term continuous HAART is expensive and can ...Highly Active Antiretroviral Therapy (HAART) has changed the course of human immunodeficiency virus (HIV) treatments since its introduction. However, for many patients, long term continuous HAART is expensive and can include problems with drug toxicity and side effects, as well as increased drug resistance. Because of these reasons, some HIV infected patients will voluntarily terminate HAART. Some of these patients will also interrupt the continuous prescribed therapies for short or long periods. After discontinuing HAART, patients will usually experience a rapid increase in viral load coupled with an immediate decline in CD4+ counts. The canonical example of a patient undergoing unsupervised breaks in HAART is that of the “Berlin patient”. In this case, the patient was able to control viral load in the absence of treatment by cycling HAART on and off due to non-related infections. Due to this patient, interest in the use of structured treatment interruptions (STI) as a mechanism to regulate an HIV infection piqued. This paper describes an optimal control approach to determine STI regimen for HIV patients. The optimal STI was implemented in the context of the receding horizon control (RHC) using a mathematical model for the in-vivo dynamics of an HIV type 1 infection. Using available clinical data, we calibrate the model by estimating on a patient specific basis, a best estimable set of parameters using sensitivity analysis and subset selection. We demonstrate how customized STI protocols can be designed through the variation of control parameters on a patient specific basis.展开更多
The novel severe acute respiratory syndrome coronavirus 2(SARS-CoV-2)has resulted in coronavirus disease 2019(COVID-19)which has affected more than 4.5 million people in 213 countries,and has been declared a pandemic ...The novel severe acute respiratory syndrome coronavirus 2(SARS-CoV-2)has resulted in coronavirus disease 2019(COVID-19)which has affected more than 4.5 million people in 213 countries,and has been declared a pandemic by World Health Organization on March 11,2020.The transmission of SARS-CoV-2 has been reported to occur primarily through direct contact or droplets.There have also been reports that SARS-CoV-2 can be detected in biopsy and stool specimens,and it has been postulated that there is potential for fecal–oral transmission as well.Gastrointestinal symptoms have been reported in 17.6%of COVID-19 patients and transmission can potentially occur through gastrointestinal secretions in this group of patients.Furthermore,transmission can also occur in asymptomatic carriers or patients with viral shedding during the incubation period.Endoscopic procedures hence may pose significant risks of transmission(even for those not directly involving confirmed COVID-19 cases)as endoscopists and endoscopy staff are in close contact with patients during these aerosol generating procedures.This could result in inadvertent transmission of infection at time of endoscopy.展开更多
Spatial Crowdsourcing(SC)is a transformative platform that engages a crowd of mobile users(i.e.,workers)in collecting and analyzing environmental,social and other spatio-temporal information.However,current solutions ...Spatial Crowdsourcing(SC)is a transformative platform that engages a crowd of mobile users(i.e.,workers)in collecting and analyzing environmental,social and other spatio-temporal information.However,current solutions ignore the preference of each worker’s remuneration and acceptable distance,and the lack of error analysis after privacy control lead to undesirable task recommendation.In this paper,we introduce an optimization framework for task recommendation while protecting participant privacy.We propose a Generalization mechanism based on Bisecting k-means and an efficient algorithm considering the generalization error to maximization the reward of SC server.Both numerical evaluations and performance analysis are conducted to show the effectiveness and efficiency of the propose framework.展开更多
A person’s privacy has become a growing concern,given the nature of an expansive reliance on real-time video activities with video capture,stream,and storage.This paper presents an innovative system design based on a...A person’s privacy has become a growing concern,given the nature of an expansive reliance on real-time video activities with video capture,stream,and storage.This paper presents an innovative system design based on a privacy-preserving model.The proposed system design is implemented by employing an enhanced capability that overcomes today’s single parameterbased access control protection mechanism for digital privacy preservation.The enhanced capability combines multiple access control parameters:facial expression,resource,environment,location,and time.The proposed system design demonstrated that a person’s facial expressions combined with a set of access control rules can achieve a person’s privacy-preserving preferences.The findings resulted in different facial expressions successfully triggering a person’s face to be blurred and a person’s privacy when using a real-time video conferencing service captured from a webcam or virtual webcam.A comparison analysis of capabilities between existing designs and the proposed system design shows enhancement of the capabilities of the proposed system.A series of experiments exercising the enhanced,real-time multi-parameterbased system was shown as a viable path forward for preserving a person’s privacy while using a webcam or virtual webcam to capture,stream,and store videos.展开更多
It is necessary to confirm the personal data factors and the rules of verification before conducting personal data detection. So that the detection method can be written in the subsequent implementation of the automat...It is necessary to confirm the personal data factors and the rules of verification before conducting personal data detection. So that the detection method can be written in the subsequent implementation of the automatic detection tool. This paper will conduct experiments on common personal data factor rules, including domestic personal identity numbers and credit card numbers with checksums. We use ChatGPT to test the accuracy of identifying personal information like ID card identification numbers or credit card numbers. And then use personal data correlation to reduce the time for personal data identification. Although the number of personal information factors found has decreased, it has had a better effect on the actual manual personal data identification. The result shows that it saves about 45% of the calculation time, and the execution efficiency of the accuracy is also improved with the original method by about 22%, which is about 2.2 times higher than the general method. Therefore, the method proposed in this paper can accurately and effectively find out the leftover personal information in the enterprise. .展开更多
文摘In recent years,the type and quantity of news are growing rapidly,and it is not easy for users to find the news they are interested in the massive amount of news.A news recommendation system can score and predict the candidate news,and finally recommend the news with high scores to users.However,existing user models usually only consider users’long-term interests and ignore users’recent interests,which affects users’usage experience.Therefore,this paper introduces gated recurrent unit(GRU)sequence network to capture users’short-term interests and combines users’short-term interests and long-terminterests to characterize users.While existing models often only use the user’s browsing history and ignore the variability of different users’interest in the same news,we introduce additional user’s ID information and apply the personalized attention mechanism for user representation.Thus,we achieve a more accurate user representation.We also consider the risk of compromising user privacy if the user model training is placed on the server side.To solve this problem,we design the training of the user model locally on the client side by introducing a federated learning framework to keep the user’s browsing history on the client side.We further employ secure multiparty computation to request news representations from the server side,which protects privacy to some extent.Extensive experiments on a real-world news dataset show that our proposed news recommendation model has a better improvement in several performance evaluation metrics.Compared with the current state-of-the-art federated news recommendation models,our model has increased by 0.54%in AUC,1.97%in MRR,2.59%in nDCG@5%,and 1.89%in nDCG@10.At the same time,because we use a federated learning framework,compared with other centralized news recommendation methods,we achieve privacy protection for users.
文摘The Personal Information Protection Law,as the first law on personal information protection in China,hits the people’s most concerned,realistic and direct privacy and information security issues,and plays an extremely important role in promoting the development of the digital economy,the legalization of socialism with Chinese characteristics and social public security,and marks a new historical development stage in the protection of personal information in China.However,the awareness of privacy protection and privacy protection behavior of the public in personal information privacy protection is weak.Based on the literature review and in-depth understanding of current legal regulations,this study integrates the relevant literature and theoretical knowledge of the Personal Protection Law to construct a conceptual model of“privacy information protection willingness-privacy information protection behavior”.Taking the residents of Foshan City as an example,this paper conducts a questionnaire survey on their attitudes toward the Personal Protection Law,analyzes the factors influencing their willingness to protect their privacy and their behaviors,and explores the mechanisms of their influencing variables,to provide advice and suggestions for promoting the protection of privacy information and building a security barrier for the high-quality development of public information security.
基金financially supported by the National Natural Science Foundation of China(No.61303216,No.61272457,No.U1401251,and No.61373172)the National High Technology Research and Development Program of China(863 Program)(No.2012AA013102)National 111 Program of China B16037 and B08038
文摘With the rapid development of computer technology, cloud-based services have become a hot topic. They not only provide users with convenience, but also bring many security issues, such as data sharing and privacy issue. In this paper, we present an access control system with privilege separation based on privacy protection(PS-ACS). In the PS-ACS scheme, we divide users into private domain(PRD) and public domain(PUD) logically. In PRD, to achieve read access permission and write access permission, we adopt the Key-Aggregate Encryption(KAE) and the Improved Attribute-based Signature(IABS) respectively. In PUD, we construct a new multi-authority ciphertext policy attribute-based encryption(CP-ABE) scheme with efficient decryption to avoid the issues of single point of failure and complicated key distribution, and design an efficient attribute revocation method for it. The analysis and simulation result show that our scheme is feasible and superior to protect users' privacy in cloud-based services.
文摘In the security and privacy fields,Access Control(AC)systems are viewed as the fundamental aspects of networking security mechanisms.Enforcing AC becomes even more challenging when researchers and data analysts have to analyze complex and distributed Big Data(BD)processing cluster frameworks,which are adopted to manage yottabyte of unstructured sensitive data.For instance,Big Data systems’privacy and security restrictions are most likely to failure due to the malformed AC policy configurations.Furthermore,BD systems were initially developed toped to take care of some of the DB issues to address BD challenges and many of these dealt with the“three Vs”(Velocity,Volume,and Variety)attributes,without planning security consideration,which are considered to be patch work.Some of the BD“three Vs”characteristics,such as distributed computing,fragment,redundant data and node-to node communication,each with its own security challenges,complicate even more the applicability of AC in BD.This paper gives an overview of the latest security and privacy challenges in BD AC systems.Furthermore,it analyzes and compares some of the latest AC research frameworks to reduce privacy and security issues in distributed BD systems,which very few enforce AC in a cost-effective and in a timely manner.Moreover,this work discusses some of the future research methodologies and improvements for BD AC systems.This study is valuable asset for Artificial Intelligence(AI)researchers,DB developers and DB analysts who need the latest AC security and privacy research perspective before using and/or improving a current BD AC framework.
基金The National Natural Science Foundation of China(No.61462060,No.61762060)The Network and Information Security Innovation Team of Gansu Provincial Department of Education Lanzhou University of Technology(No.2017C-05).
文摘Data privacy is important to the security of our society,and enabling authorized users to query this data efficiently is facing more challenge.Recently,blockchain has gained extensive attention with its prominent characteristics as public,distributed,decentration and chronological characteristics.However,the transaction information on the blockchain is open to all nodes,the transaction information update operation is even more transparent.And the leakage of transaction information will cause huge losses to the transaction party.In response to these problems,this paper combines hierarchical attribute encryption with linear secret sharing,and proposes a blockchain data privacy protection control scheme based on searchable attribute encryption,which solves the privacy exposure problem in traditional blockchain transactions.The user’s access control is implemented by the verification nodes,which avoids the security risks of submitting private keys and access structures to the blockchain network.Associating the private key component with the random identity of the user node in the blockchain can solve the collusion problem.In addition,authorized users can quickly search and supervise transaction information through searchable encryption.The improved algorithm ensures the security of keywords.Finally,based on the DBDH hypothesis,the security of the scheme is proved in the random prediction model.
文摘Emerging cloud computing has introduced new platforms for developing enterprise academic web applications, where software, platforms and infrastructures are published to the globe as services. Software developers can build their systems by multiple invocations of these services. This research is devoted to investigating the management and data flow control over enterprise academic web applications where web services and developed academic web application are constructing infrastructure-networking scheme at the application level. Academic web services are invoked over http port and using REST based protocol;thus traditional access control method is not enough to control the follow of data using host and port information. The new cloud based access control rules proposed here are to be designed and implemented to work at this level. The new proposed access control architecture will be a web service gateway, and it published itself as a service (SaaS). We used three case studies to test our moodle and then we apply JSON parsers to perceive web service description file (WSDL file) and supply policies according to data are to be allowed or denied based on user roll through our parsing.
基金We thank the anonymous reviewers and editors for their very constructive comments.This work was supported by the National Social Science Foundation Project of China under Grant 16BTQ085.
文摘With the rapid development of the new generation of information technology,the analysis of mobile social network big data is getting deeper and deeper.At the same time,the risk of privacy disclosure in social network is also very obvious.In this paper,we summarize the main access control model in mobile social network,analyze their contribution and point out their disadvantages.On this basis,a practical privacy policy is defined through authorization model supporting personalized privacy preferences.Experiments have been conducted on synthetic data sets.The result shows that the proposed privacy protecting model could improve the security of the mobile social network while keeping high execution efficiency.
文摘Highly Active Antiretroviral Therapy (HAART) has changed the course of human immunodeficiency virus (HIV) treatments since its introduction. However, for many patients, long term continuous HAART is expensive and can include problems with drug toxicity and side effects, as well as increased drug resistance. Because of these reasons, some HIV infected patients will voluntarily terminate HAART. Some of these patients will also interrupt the continuous prescribed therapies for short or long periods. After discontinuing HAART, patients will usually experience a rapid increase in viral load coupled with an immediate decline in CD4+ counts. The canonical example of a patient undergoing unsupervised breaks in HAART is that of the “Berlin patient”. In this case, the patient was able to control viral load in the absence of treatment by cycling HAART on and off due to non-related infections. Due to this patient, interest in the use of structured treatment interruptions (STI) as a mechanism to regulate an HIV infection piqued. This paper describes an optimal control approach to determine STI regimen for HIV patients. The optimal STI was implemented in the context of the receding horizon control (RHC) using a mathematical model for the in-vivo dynamics of an HIV type 1 infection. Using available clinical data, we calibrate the model by estimating on a patient specific basis, a best estimable set of parameters using sensitivity analysis and subset selection. We demonstrate how customized STI protocols can be designed through the variation of control parameters on a patient specific basis.
文摘The novel severe acute respiratory syndrome coronavirus 2(SARS-CoV-2)has resulted in coronavirus disease 2019(COVID-19)which has affected more than 4.5 million people in 213 countries,and has been declared a pandemic by World Health Organization on March 11,2020.The transmission of SARS-CoV-2 has been reported to occur primarily through direct contact or droplets.There have also been reports that SARS-CoV-2 can be detected in biopsy and stool specimens,and it has been postulated that there is potential for fecal–oral transmission as well.Gastrointestinal symptoms have been reported in 17.6%of COVID-19 patients and transmission can potentially occur through gastrointestinal secretions in this group of patients.Furthermore,transmission can also occur in asymptomatic carriers or patients with viral shedding during the incubation period.Endoscopic procedures hence may pose significant risks of transmission(even for those not directly involving confirmed COVID-19 cases)as endoscopists and endoscopy staff are in close contact with patients during these aerosol generating procedures.This could result in inadvertent transmission of infection at time of endoscopy.
文摘Spatial Crowdsourcing(SC)is a transformative platform that engages a crowd of mobile users(i.e.,workers)in collecting and analyzing environmental,social and other spatio-temporal information.However,current solutions ignore the preference of each worker’s remuneration and acceptable distance,and the lack of error analysis after privacy control lead to undesirable task recommendation.In this paper,we introduce an optimization framework for task recommendation while protecting participant privacy.We propose a Generalization mechanism based on Bisecting k-means and an efficient algorithm considering the generalization error to maximization the reward of SC server.Both numerical evaluations and performance analysis are conducted to show the effectiveness and efficiency of the propose framework.
文摘A person’s privacy has become a growing concern,given the nature of an expansive reliance on real-time video activities with video capture,stream,and storage.This paper presents an innovative system design based on a privacy-preserving model.The proposed system design is implemented by employing an enhanced capability that overcomes today’s single parameterbased access control protection mechanism for digital privacy preservation.The enhanced capability combines multiple access control parameters:facial expression,resource,environment,location,and time.The proposed system design demonstrated that a person’s facial expressions combined with a set of access control rules can achieve a person’s privacy-preserving preferences.The findings resulted in different facial expressions successfully triggering a person’s face to be blurred and a person’s privacy when using a real-time video conferencing service captured from a webcam or virtual webcam.A comparison analysis of capabilities between existing designs and the proposed system design shows enhancement of the capabilities of the proposed system.A series of experiments exercising the enhanced,real-time multi-parameterbased system was shown as a viable path forward for preserving a person’s privacy while using a webcam or virtual webcam to capture,stream,and store videos.
文摘It is necessary to confirm the personal data factors and the rules of verification before conducting personal data detection. So that the detection method can be written in the subsequent implementation of the automatic detection tool. This paper will conduct experiments on common personal data factor rules, including domestic personal identity numbers and credit card numbers with checksums. We use ChatGPT to test the accuracy of identifying personal information like ID card identification numbers or credit card numbers. And then use personal data correlation to reduce the time for personal data identification. Although the number of personal information factors found has decreased, it has had a better effect on the actual manual personal data identification. The result shows that it saves about 45% of the calculation time, and the execution efficiency of the accuracy is also improved with the original method by about 22%, which is about 2.2 times higher than the general method. Therefore, the method proposed in this paper can accurately and effectively find out the leftover personal information in the enterprise. .