Abstract
During data sharing process across people, users do not want the information that contains privacy to be shared with everyone else; some people may only want to share it with someone they are familiar with. To solve this issue of privacy preservation in data-sharing applications, we propose a novel user-centric method. Our main contributions include the followings. (1) Users can select key words or characters for their own privacy information, which is a user-centric way to protect privacy. (2) During the process of data sharing, data substitution can be used to ensure privacy preservation as well as high successful rate of data sharing. (3) Our method can be used in different data-sharing applications in a flexible way. Simulation results show that our method can achieve our privacy preservation goal.
Chapter PDF
Similar content being viewed by others
References
Jawad, M., Serrano-Alvarado, P., Valduriez, P.: Protecting Data Privacy in Structured P2P Networks. In: Data Management in Grid and Peer-to-Peer Systems. Linz, Austria (2009)
Di Crescenzo, G., Lipton, R.J.: Social Network Privacy via Evolving Access Control. In: Liu, B., et al. (eds.) WASA 2009. LNCS, vol. 5682, pp. 551–560. Springer, Heidelberg (2009)
Wei, Q., Yansheng, L.: Preservation of Privacy in Publishing Social Network Data. In: International Symposium on Electronic Commerce and Security (2008)
Kobsa, A., Teltzrow, M.: Contextualized Communication of Privacy Practices and Personalization Benefits: Impacts on Users’ Data Sharing and Purchase Behavior. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, vol. 3424, pp. 329–343. Springer, Heidelberg (2005)
Spinsante, S., Gambi, E.: Selective Encryption for Efficient and Secure Transmission of Compressed Space Images. In: International Workshop on Satellite and Space Communications (IWSSC), Tuscany, Italy, pp. 9–11 (September 2009)
Gao, F., He, J., Peng, S., Wu, X., Liu, L.: An Approach for Privacy Protection Based-on Ontology. In: The 2nd International Conference on Networks Security, Wireless Communications and Trusted Computing, Wuhan, China, April 24-25 (2010)
Gao, F., He, J., Peng, S., Wu, X.: A Quantify Metric for Privacy Protection Based on Information Theory. In: 3rd International Symposium on Intelligent Information Technology and Security Informatics (IITSI 2010), Jinggangshan, China (April 2-4, 2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 IFIP International Federation for Information Processing
About this paper
Cite this paper
Gao, F., He, J., Peng, S. (2010). User-Centric Privacy Preservation in Data-Sharing Applications. In: Ding, C., Shao, Z., Zheng, R. (eds) Network and Parallel Computing. NPC 2010. Lecture Notes in Computer Science, vol 6289. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15672-4_35
Download citation
DOI: https://doi.org/10.1007/978-3-642-15672-4_35
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-15671-7
Online ISBN: 978-3-642-15672-4
eBook Packages: Computer ScienceComputer Science (R0)