Trust Management In Privacy - Preserving Information System

被引:75
|
作者
Peng, Kun [1 ]
Bao, Feng [1 ]
机构
[1] Inst Infocomm Res, Singapore, Singapore
关键词
D O I
10.1109/ICCSIT.2010.5564459
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In many information management applications, sensitive information mnst be stored as a record and be retrieved when necessary. When the recored is stored in a distributed way in multiple databases and shared by multiple users with different trust levels and accessing privileges, the trust management model is called M-to-M model. In this model, on one hand the record is stored in a distributed way; one the other hand every user obtains a different version of the record in their retrieving operations according to their different trust levels and access privileges. A scheme is proposed in this paper to specify M-to-M trust management. The new scheme not only realizes privacy-preserving information storage and sharing in a mnlti-Ievel-trust environment, but also achieves robustness through information rednndancy. The new technique is quite simple and does not need any cryptographic operation like encryption, digital signature or hash function, so its security is unconditional and does not depend on any computational assumption.
引用
收藏
页码:1 / 4
页数:4
相关论文
共 50 条
  • [31] Privacy Preserving Energy Management
    Kinkelin, Holger
    von Maltitz, Marcel
    Peter, Benedikt
    Kappler, Cornelia
    Niedermayer, Heiko
    Carle, Georg
    Social Informatics, 2015, 8852 : 35 - 42
  • [32] Privacy protection in trust management
    Peng, Zhi-Yu
    Li, Shan-Ping
    PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2008, : 1358 - 1362
  • [33] Enabling Trust and Privacy-Preserving e-KYC System Using Blockchain
    Fugkeaw, Somchart
    IEEE ACCESS, 2022, 10 : 49028 - 49039
  • [34] Minimizing information loss and preserving privacy
    Menon, Syam
    Sarkar, Sumit
    MANAGEMENT SCIENCE, 2007, 53 (01) : 101 - 116
  • [35] Preserving Privacy for Discrete Location Information
    Dong, Kai
    Tao, Zhenyuan
    Xia, Xiangyu
    Chen, Zhouguo
    Yang, Ming
    PROCEEDINGS OF THE 2021 IEEE 24TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN (CSCWD), 2021, : 360 - 365
  • [36] Methods for Computing Trust and Reputation While Preserving Privacy
    Gudes, Ehud
    Gal-Oz, Nurit
    Grubshtein, Alon
    DATA AND APPLICATIONS SECURITY XXIII, PROCEEDINGS, 2009, 5645 : 291 - +
  • [37] Privacy-Preserving PKIs with Reduced Server Trust
    Di Crescenzo, Giovanni
    Zhang, Tao
    2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2012,
  • [38] Two Schemes of Privacy-Preserving Trust Evaluation
    Yan, Zheng
    Ding, Wenxiu
    Niemi, Valtteri
    Vasilakos, Athanasios V.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 62 : 175 - 189
  • [39] Enabling Multilevel Trust in Privacy Preserving Data Mining
    Li, Yaping
    Chen, Minghua
    Li, Qiwei
    Zhang, Wei
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2012, 24 (09) : 1598 - 1612
  • [40] PBTM: A Privacy-Preserving Announcement Protocol With Blockchain-Based Trust Management for IoV
    Zhao, Yanan
    Wang, Yunpeng
    Wang, Pengcheng
    Yu, Haiyang
    IEEE SYSTEMS JOURNAL, 2022, 16 (02): : 3422 - 3432