Privacy preserving algorithms and techniques for distributed system : A review
Abstract
References
A. Ali, A. W. Septyanto, I. Chaudhary, H.
Al Hamadi, H. M. Alzoubi, and Z. F.
Khan, “Applied Artificial Intelligence as
Event Horizon Of Cyber Security,” in
IJETT ISSN: 2350 – 0808 | September 2023 | Volume 10 | Issue 2 |
International Conference on Business
Analytics for Technology and Security,
ICBATS 2022, 2022.
A. A. Mughal, “Cybersecurity Hygiene in
the Era of Internet of Things (IoT): Best
Practices and Challenges,” Appl. Res.
Artif. Intell. Cloud Comput., vol. 2, no. 1,
pp. 1–Accessed: May 30, 2023. [Online].
S. Morrison-Smith and J. Ruiz,
“Challenges and barriers in virtual teams: a
literature review,” SN Appl. Sci., vol. 2,
no. 6, Jun. 2020.
A. Iosup et al., “The atlarge vision on the
design of distributed systems and
ecosystems,” in Proceedings - International
Conference on Distributed Computing
Systems, 2019, pp. 1765–1776.
S.-F. Tu et al., “Revealing the Barriers of
Blockchain Technology for Supply Chain
Transparency and Sustainability in the
Construction Industry: An Application of
Pythagorean FAHP Methods,” Sustain.
, Vol. 15, Page 10681, vol. 15, no. 13,
p. 10681, Jul. 2023.
A. K. Tyagi, M. M. Nair, S. Niladhuri, and
A. Abraham, “Security, Privacy Research
issues in Various Computing Platforms : A
Survey and the Road Ahead,” J. Inf. Assur.
Secur., vol. 15, pp. 1–16, 2020, Accessed:
Jul. 24, 2023. [Online]. Available:
https://ak-tyagi.com/static/pdf/6.pdf
C. Zhang and Y. Wang, “Enabling
Privacy-Preservation in Decentralized
Optimization,” IEEE Trans. Control Netw.
Syst., vol. 6, no. 2, pp. 679–689, 2019.
Y. Lu and M. Zhu, “Privacy preserving
distributed optimization using
homomorphic encryption,” Automatica,
vol. 96, pp. 314–325, 2018, doi:
1016/j.automatica.2018.07.005.
E. Nozari, P. Tallapragada, and J. Cortes,
“Differentially Private Distributed Convex
Optimization via Functional Perturbation,”
IEEE Trans. Control Netw. Syst., vol. 5,
no. 1, pp. 395–408, 2018.
S. Han, U. Topcu, and G. J. Pappas,
“Differentially Private Distributed
Constrained Optimization,” IEEE Trans.
Automat. Contr., vol. 62, no. 1, pp. 50–64,
S. Gade and N. H. Vaidya, “PrivacyPreserving Distributed Learning via
Obfuscated Stochastic Gradients,” in
Proceedings of the IEEE Conference on
Decision and Control, 2018, pp. 184–191.
T. W. K. Mak, F. Fioretto, and P. Van
Hentenryck, “Privacy-preserving
obfuscation for distributed power
systems,” Electr. Power Syst. Res., vol.
, 2020.
J. Okwuibe, M. Liyanage, I. Ahmad, and
M. Ylianttila, “Cloud and MEC security,”
in A Comprehensive Guide to 5G Security,
wiley, 2018, pp. 373–397.
Y. Liu, W. Guo, C. I. Fan, L. Chang, and
C. Cheng, “A Practical Privacy-Preserving
Data Aggregation (3PDA) Scheme for
Smart Grid,” IEEE Trans. Ind. Informatics,
vol. 15, no. 3, pp. 1767–1774, 2019.
K. El Emam, L. Mosquera, and J. Bass,
“Evaluating identity disclosure risk in fully
synthetic health data: model development
and validation,” J. Med. Internet Res., vol.
, no. 11, 2020.
E. Nicol et al., “Revealing Cumulative
Risks in Online Personal Information: A
Data Narrative Study,” Proc. ACM
Human-Computer Interact., vol. 6, no.
CSCW2, p. 25, Nov. 2022.
A. Latenko, M. S. Bargh, S. Van Den
Braak, and M. Vink, “A review of
Frequency Table Disclosure Control from
a Microdata Perspective,” in ICDS 2020 :
The Fourteenth International Conference
on Digital Society, 2020. Accessed: Jul.
, 2023. [Online].
K. Spiller et al., “Data privacy: Users’
thoughts on quantified self personal data,”
in Self-Tracking: Empirical and
Philosophical Investigations, Springer
IJETT ISSN: 2350 – 0808 | September 2023 | Volume 10 | Issue 2 |
International Publishing, 2017, pp. 111–
X. Wang, S. Garg, H. Lin, G. Kaddoum, J.
Hu, and M. S. Hossain, “A Secure Data
Aggregation Strategy in Edge Computing
and Blockchain-Empowered Internet of
Things,” IEEE Internet Things J., vol. 9,
no. 16, pp. 14237–14246, 2022.
J. Zhang, B. Chen, Y. Zhao, X. Cheng,
and F. Hu, “Data Security and PrivacyPreserving in Edge Computing Paradigm:
Survey and Open Issues,” IEEE Access,
vol. 6, pp. 18209–18237, 2018.
D. Ghelani et al., “Cyber Security Threats,
Vulnerabilities, and Security Solutions
Models in Banking,” Am. J. Comput. Sci.
Technol., vol. x, No. x, pp. x–x, 2022.
A. Tandon and P. Srivastava, “Trust-based
Enhanced Secure Routing against Rank
and Sybil Attacks in IoT,” in 2019 Twelfth
International Conference on Contemporary
Computing (IC3), IEEE, Aug. 2019, pp. 1–
T. Orekondy, S. J. Oh, Y. Zhang, B.
Schiele, and M. Fritz, “Gradient-Leaks:
Understanding and Controlling
Deanonymization in Federated Learning,”
arXiv Prepr. arxiv.org/pdf/1805.05838.pdf,
May 2018, Accessed: Oct. 20, 2023.
[Online].
P. Zhao, H. Huang, X. Zhao, and D.
Huang, “P3: Privacy-Preserving Scheme
against Poisoning Attacks in Mobile-Edge
Computing,” IEEE Trans. Comput. Soc.
Syst., vol. 7, no. 3, pp. 818–826, 2020.
J. Y. A. Elreesh and S. S. Abu-Naser,
“Cloud Network Security Based on
Biometrics Cryptography Intelligent
Tutoring System,” vol. 3, no. 3, pp. 37–70,
, Accessed: Jul. 24, 2023. [Online].
M. K. Hasan et al., “Lightweight
Cryptographic Algorithms for Guessing
Attack Protection in Complex Internet of
Things Applications,” Complexity, 2021.
O. G. Abood and S. K. Guirguis, “A
Survey on Cryptography Algorithms,” Int.
J. Sci. Res. Publ., vol. 8, no. 7, pp. 495–
, 2018.
C. Riman and P. E. Abi-Char,
“Comparative Analysis of Block CipherBased Encryption Algorithms: A Survey,”
Comput. Fraud, vol. 3, no. 1, pp. 1–7,
P. Dixit, A. K. Gupta, M. C. Trivedi, and
V. K. Yadav, “Traditional and hybrid
encryption techniques: A survey,” Netw.
Commun. Data Knowl. Eng. Springer
Singapore, vol. 2, pp. 239–248, 2018.
M. Blanton, A. Kang, and C. Yuan,
“Improved Building Blocks for Secure
Multi-party Computation Based on Secret
Sharing with Honest Majority,” in Lecture
Notes in Computer Science (including
subseries Lecture Notes in Artificial
Intelligence and Lecture Notes in
Bioinformatics), 2020, pp. 377–397.
D. H. Vu, T. D. Luong, and T. B. Ho, “An
efficient approach for secure multi-party
computation without authenticated
channel,” Inf. Sci. (Ny)., vol. 527, pp.
–368, 2020.
N. Kaaniche, M. Laurent, and S. Belguith,
“Privacy enhancing technologies for
solving the privacy-personalization
paradox: Taxonomy and survey,” Journal
of Network and Computer Applications,
vol. 171. Academic Press, p. 102807, Dec.
, 2020.
S. Murthy, A. Abu Bakar, F. Abdul
Rahim, and R. Ramli, “A Comparative
Study of Data Anonymization
Techniques,” in Proceedings - 5th IEEE
International Conference on Big Data
Security on Cloud, BigDataSecurity 2019,
th IEEE International Conference on
High Performance and Smart Computing,
HPSC 2019 and 4th IEEE International
Conference on Intelligent Data and Securit,
IEEE, May 2019, pp. 306–309.
B. Ojokoh and E. Adebisi, “A review of
question answering systems,” J. Web Eng.,
vol. 17, no. 8, pp. 717–758, 2019.
IJETT ISSN: 2350 – 0808 | September 2023 | Volume 10 | Issue 2 |
G. M. Biancofiore, Y. Deldjoo, T. Di
Noia, E. Di Sciascio, and F. Narducci,
“Interactive Question Answering Systems:
Literature Review,” arxiv.org, Sep. 2022,
Accessed: May 31, 2023. [Online].
J. Li, X. Kuang, S. Lin, X. Ma, and Y.
Tang, “Privacy preservation for machine
learning training and classification based
on homomorphic encryption schemes,” Inf.
Sci. (Ny)., vol. 526, pp. 166–179, 2020.
A. Meryem, D. Samira, and E. O.
Bouabid, “Enhancing cloud security using
advanced MapReduce k-means on log
files,” ACM Int. Conf. Proceeding Ser., pp.
–67, Jan. 2018.
X. Zhao and W. Zhang, “An anomaly
intrusion detection method based on
improved K-means of cloud computing,”
in Proceedings - 2016 6th International
Conference on Instrumentation and
Measurement, Computer, Communication
and Control, IMCCC 2016, 2016, pp. 284–
M. A. Zardari, L. T. Jung, and N. Zakaria,
“K-NN classifier for data confidentiality in
cloud computing,” in 2014 International
Conference on Computer and Information
Sciences, ICCOINS 2014 - A Conference
of World Engineering, Science and
Technology Congress, ESTCON 2014 -
Proceedings, 2014.
Refbacks
- There are currently no refbacks.
Copyright © IJETT, International Journal on Emerging Trends in Technology