Privacy-Preserving Computing for Analytics and Mining

A special issue of Inventions (ISSN 2411-5134). This special issue belongs to the section "Inventions and Innovation in Design, Modeling and Computing Methods".

Deadline for manuscript submissions: closed (31 March 2022) | Viewed by 11399

Special Issue Editor


E-Mail Website
Guest Editor
School of Information and Electronics Engineering, Korea Aerospace University, Goyang 10540, Korea
Interests: privacy-preserving data publishing (PPDP); information security; information privacy; COVID-19 privacy; data mining; social network analysis and mining; machine learning; zero knowledge proofs; differential privacy; confidential computing; secure multiparty computation; statistical disclosure control
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Due to the recent proliferation in digital solutions such as social networks (SN), recommender systems, cyberphysical social systems (CPSS), and the Internet of Things (IoT), a large amount of data about an individual is collected and processed. These collected data often contain information about an individual’s identity (i.e., demographics), salary, health status, social activities, etc. On one hand, this data is regarded as an oil of the economy when processed using advanced data mining and analytics tools. On the other hand, mishandling such data can spark public criticism and anger if privacy protection is not ensured. Making sense of such data while at the same time preserving privacy is another longstanding challenge in academia and research. To strike a balance between utility and privacy, much research has been proposed. Nevertheless, technical challenges and open research gaps remain in the area of privacy-preserving computing for analytics and mining purposes leverage individuals' data. 

This Special Issue aims to present recent advances in tools, methods, techniques, prototypes, case studies, and technologies to improve privacy preservation leveraging traditional and AI technologies.

Topics of interest include but are not limited to: 

  • Privacy-preserving computing;
  • Privacy-preserving data publishing;
  • Privacy-preserving data mining;
  • Anonymization;
  • Information privacy;
  • Social network privacy preservation;
  • Analytics techniques with privacy guarantees;
  • Emerging privacy threats due to the adoption of social networks;
  • IoT privacy challenges and innovative solutions;
  • Big data privacy and security;
  • Cloud computing privacy issues and solutions;
  • Encryption techniques to protect the contents of personal data;
  • Advance privacy protection techniques pertinent to the COVID-19 era;
  • Privacy issues in the cyberphysical social systems (CPSS);
  • Case studies about people’s perception about privacy in different regions;
  • Emerging privacy issues due the digitization across the globe.

Dr. Majeed Abdul
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Inventions is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1800 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Anonymization
  • Utility
  • Privacy
  • Microdata
  • Statistical disclosure control
  • Identity disclosure
  • Sensitive information disclosure
  • Association rule hiding
  • Data generalization
  • Social networks
  • Data owners/holders
  • Information privacy
  • Generalization

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Jump to: Review

17 pages, 3945 KiB  
Article
Hidden Dynamics Investigation, Fast Adaptive Synchronization, and Chaos-Based Secure Communication Scheme of a New 3D Fractional-Order Chaotic System
by Zain-Aldeen S. A. Rahman and Basil H. Jasim
Inventions 2022, 7(4), 108; https://doi.org/10.3390/inventions7040108 - 21 Nov 2022
Cited by 6 | Viewed by 1352
Abstract
In this paper, a new fractional-order chaotic system containing several nonlinearity terms is introduced. This new system can excite hidden chaotic attractors or self-excited chaotic attractors depending on the chosen system parameters or its fraction-order derivative value. Several dynamics of this new system, [...] Read more.
In this paper, a new fractional-order chaotic system containing several nonlinearity terms is introduced. This new system can excite hidden chaotic attractors or self-excited chaotic attractors depending on the chosen system parameters or its fraction-order derivative value. Several dynamics of this new system, such as chaotic attractors, equilibrium points, Lyapunov exponents, and bifurcation diagrams, are analyzed analytically and numerically. Then, adaptive control laws are developed to achieve chaos synchronization in two identical new systems with uncertain parameters; one of these two new identical systems is the master, and the other is the slave. In addition, update laws for estimating the uncertain slave parameters are derived. Furthermore, in chaos application fields, these master and slave synchronized systems are applied in secure communication to act as the transmitter and receiver, respectively. Finally, the security analysis metric tests were analyzed using histograms and spectrograms to establish the communication system’s security strength. Numerical test results demonstrate the possibility of using this proposed fractional-order chaotic system in high-security communication systems. The employed communication system is also highly resistant to pirate attacks. Full article
(This article belongs to the Special Issue Privacy-Preserving Computing for Analytics and Mining)
Show Figures

Figure 1

Review

Jump to: Research

30 pages, 4312 KiB  
Review
A Comprehensive Survey on Data Utility and Privacy: Taking Indian Healthcare System as a Potential Case Study
by Prathamesh Churi, Ambika Pawar and Antonio-José Moreno-Guerrero
Inventions 2021, 6(3), 45; https://doi.org/10.3390/inventions6030045 - 23 Jun 2021
Cited by 13 | Viewed by 9192
Abstract
Background: According to the renowned and Oscar award-winning American actor and film director Marlon Brando, “privacy is not something that I am merely entitled to, it is an absolute prerequisite.” Privacy threats and data breaches occur daily, and countries are mitigating the consequences [...] Read more.
Background: According to the renowned and Oscar award-winning American actor and film director Marlon Brando, “privacy is not something that I am merely entitled to, it is an absolute prerequisite.” Privacy threats and data breaches occur daily, and countries are mitigating the consequences caused by privacy and data breaches. The Indian healthcare industry is one of the largest and rapidly developing industry. Overall, healthcare management is changing from disease-centric into patient-centric systems. Healthcare data analysis also plays a crucial role in healthcare management, and the privacy of patient records must receive equal attention. Purpose: This paper mainly presents the utility and privacy factors of the Indian healthcare data and discusses the utility aspect and privacy problems concerning Indian healthcare systems. It defines policies that reform Indian healthcare systems. The case study of the NITI Aayog report is presented to explain how reformation occurs in Indian healthcare systems. Findings: It is found that there have been numerous research studies conducted on Indian healthcare data across all dimensions; however, privacy problems in healthcare, specifically in India, are caused by prevalent complacency, culture, politics, budget limitations, large population, and existing infrastructures. This paper reviews the Indian healthcare system and the applications that drive it. Additionally, the paper also maps that how privacy issues are happening in every healthcare sector in India. Originality/Value: To understand these factors and gain insights, understanding Indian healthcare systems first is crucial. To the best of our knowledge, we found no recent papers that thoroughly reviewed the Indian healthcare system and its privacy issues. The paper is original in terms of its overview of the healthcare system and privacy issues. Social Implications: Privacy has been the most ignored part of the Indian healthcare system. With India being a country with a population of 130 billion, much healthcare data are generated every day. The chances of data breaches and other privacy violations on such sensitive data cannot be avoided as they cause severe concerns for individuals. This paper segregates the healthcare system’s advances and lists the privacy that needs to be addressed first. Full article
(This article belongs to the Special Issue Privacy-Preserving Computing for Analytics and Mining)
Show Figures

Figure 1

Back to TopTop