Data Minimization

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 72966 Experts worldwide ranked by ideXlab platform

Suvasini Panigrahi - One of the best experts on this subject based on the ideXlab platform.

  • A novel approach using optimum camera actuation in event boundary detection method for redundant Data Minimization
    Ain Shams Engineering Journal, 2018
    Co-Authors: Sushree Bibhuprada B Priyadarshini, Suvasini Panigrahi
    Abstract:

    Abstract The necessity of having optimum camera activation is rapidly increasing in distributed environment as well as wireless sensor networks. In the current research, we have studied the event boundary detection approach for redundant Data Minimization by actuating less number of cameras. The study reveals that some of the cameras those are present outside the exact event boundary are activated unnecessarily being informed from the boundary scalars regarding the event occurrence. This unnecessary activation of outer cameras leads to additional energy expenditure and redundant Data transmission. In this paper, we have proposed a novel approach to maintain such unnecessarily actuated cameras in turned off state. The experimental evaluation in terms of less camera activation, minimized redundancy ratio, enhanced coverage ratio and reduced energy consumption, obtained from the investigation justifies the effectiveness of the proposed approach as compared to another approach recently proposed in the literature.

  • redundant Data Minimization using minimal mean distant scalar leader selection for event driven camera actuation
    International Conference in Information Technology, 2016
    Co-Authors: Sushree Bibhuprada B Priyadarshini, Suvasini Panigrahi
    Abstract:

    This article reports a novel scheme called minimal mean distant scalar leader selection inspired by event driven camera actuation for redundant Data Minimization. The proposed algorithm aims at actuating minimum number of cameras while maximizing the event area coverage and reducing the resulting traffic overhead. This is accomplished by effective selection of scalar leaders in each sub-region of the monitored region and the chosen scalar leaders operate as informants for event information communication to their respective camera sensors. The less camera actuation with enhanced coverage ratio, minimized redundancy ratio and reduced energy expenditure obtained from the experimentation reveal the effectiveness of the proposed algorithm as compared to three other recent approaches.

  • ICIT - Redundant Data Minimization Using Minimal Mean Distant Scalar Leader Selection for Event Driven Camera Actuation
    2016 International Conference on Information Technology (ICIT), 2016
    Co-Authors: Sushree Bibhuprada B Priyadarshini, Suvasini Panigrahi
    Abstract:

    This article reports a novel scheme called minimal mean distant scalar leader selection inspired by event driven camera actuation for redundant Data Minimization. The proposed algorithm aims at actuating minimum number of cameras while maximizing the event area coverage and reducing the resulting traffic overhead. This is accomplished by effective selection of scalar leaders in each sub-region of the monitored region and the chosen scalar leaders operate as informants for event information communication to their respective camera sensors. The less camera actuation with enhanced coverage ratio, minimized redundancy ratio and reduced energy expenditure obtained from the experimentation reveal the effectiveness of the proposed algorithm as compared to three other recent approaches.

Sushree Bibhuprada B Priyadarshini - One of the best experts on this subject based on the ideXlab platform.

  • A Comparative Study of Redundant Data Minimization and Event Coverage in Wireless Multimedia Sensor Networks (WMSNs)
    2019 International Conference on Applied Machine Learning (ICAML), 2019
    Co-Authors: Sushree Bibhuprada B Priyadarshini, Debabrata Singh, Monalisa Panda
    Abstract:

    In the modern era, Data redundancy stands as one of the predominant problem existing in case of sensor networks. It basically takes place owing to the transmission of same Data through multiple scalars lying at the superimposed zones of field of views. Such scalars report the prevailing event information multiple times to various camera sensors leading to redundancy in Data transmissions. The main objective is to diminish such repeated Data transmission while enhancing coverage of event region under consideration. This paper basically compares three approaches and the way they behave in presence of obstacles while diminishing redundancy and enriching the coverage of monitored zone.

  • A novel approach using optimum camera actuation in event boundary detection method for redundant Data Minimization
    Ain Shams Engineering Journal, 2018
    Co-Authors: Sushree Bibhuprada B Priyadarshini, Suvasini Panigrahi
    Abstract:

    Abstract The necessity of having optimum camera activation is rapidly increasing in distributed environment as well as wireless sensor networks. In the current research, we have studied the event boundary detection approach for redundant Data Minimization by actuating less number of cameras. The study reveals that some of the cameras those are present outside the exact event boundary are activated unnecessarily being informed from the boundary scalars regarding the event occurrence. This unnecessary activation of outer cameras leads to additional energy expenditure and redundant Data transmission. In this paper, we have proposed a novel approach to maintain such unnecessarily actuated cameras in turned off state. The experimental evaluation in terms of less camera activation, minimized redundancy ratio, enhanced coverage ratio and reduced energy consumption, obtained from the investigation justifies the effectiveness of the proposed approach as compared to another approach recently proposed in the literature.

  • redundant Data Minimization using minimal mean distant scalar leader selection for event driven camera actuation
    International Conference in Information Technology, 2016
    Co-Authors: Sushree Bibhuprada B Priyadarshini, Suvasini Panigrahi
    Abstract:

    This article reports a novel scheme called minimal mean distant scalar leader selection inspired by event driven camera actuation for redundant Data Minimization. The proposed algorithm aims at actuating minimum number of cameras while maximizing the event area coverage and reducing the resulting traffic overhead. This is accomplished by effective selection of scalar leaders in each sub-region of the monitored region and the chosen scalar leaders operate as informants for event information communication to their respective camera sensors. The less camera actuation with enhanced coverage ratio, minimized redundancy ratio and reduced energy expenditure obtained from the experimentation reveal the effectiveness of the proposed algorithm as compared to three other recent approaches.

  • ICIT - Redundant Data Minimization Using Minimal Mean Distant Scalar Leader Selection for Event Driven Camera Actuation
    2016 International Conference on Information Technology (ICIT), 2016
    Co-Authors: Sushree Bibhuprada B Priyadarshini, Suvasini Panigrahi
    Abstract:

    This article reports a novel scheme called minimal mean distant scalar leader selection inspired by event driven camera actuation for redundant Data Minimization. The proposed algorithm aims at actuating minimum number of cameras while maximizing the event area coverage and reducing the resulting traffic overhead. This is accomplished by effective selection of scalar leaders in each sub-region of the monitored region and the chosen scalar leaders operate as informants for event information communication to their respective camera sensors. The less camera actuation with enhanced coverage ratio, minimized redundancy ratio and reduced energy expenditure obtained from the experimentation reveal the effectiveness of the proposed algorithm as compared to three other recent approaches.

Nalin Asanka Gamagedara Arachchilage - One of the best experts on this subject based on the ideXlab platform.

  • A Data Minimization model for embedding privacy into software systems
    Computers & Security, 2019
    Co-Authors: Awanthika Senarath, Nalin Asanka Gamagedara Arachchilage
    Abstract:

    Abstract Modern software systems (social networking, banking and shopping applications) are becoming increasingly dependent on our Data. These systems need Data to provide various economic and social benefits to users as well as businesses. However, the extensive use of personal Data in systems poses a threat to user privacy. Therefore, privacy laws expect software systems to practice Data Minimization (DM), to minimize Data in software systems. This has put software developers in a dilemma to minimize user Data to provide user privacy and maximize user Data for enhanced system functionality. Following the design science research approach, in this research we propose and evaluate a methodology that enables developers to make their decisions to minimize user Data in software systems through understanding Data. The methodology encourage developers to think of the ways they would use Data in a system design focusing on the storage and sharing of Data. Developers in the three experiments conducted to evaluate the methodology agreed that it enables them to think of the ways they use Data in system designs and it helps them to make decisions to minimize using Data in a system design. Developers also showed positive intention to use the proposed methodology within system development activities.

  • Understanding Software Developers' Approach towards Implementing Data Minimization.
    arXiv: Cryptography and Security, 2018
    Co-Authors: Awanthika Senarath, Nalin Asanka Gamagedara Arachchilage
    Abstract:

    Data Minimization (DM) is a privacy practice that requires minimizing the use of user Data in software systems. However, continuous privacy incidents that compromise user Data suggest that the requirements of DM are not adequately implemented in software systems. Therefore, it is important that we understand the problems faced by software developers when they attempt to implement DM in software systems. In this study, we investigate how 24 software developers implement DM in a software system design when they are asked to. Our findings revealed that developers find it difficult to implement DM when they are not aware of the potential of Data they could collect at the design phase of systems. Furthermore, developers were inconsistent in how they implemented DM in their software designs.

Maryline Laurent - One of the best experts on this subject based on the ideXlab platform.

  • NordSec - Anonymous Certification for an e-Assessment Framework
    Secure IT Systems, 2017
    Co-Authors: Christophe Kiennert, Pierre-olivier Rocher, Nesrine Kaaniche, Maryline Laurent, Joaquin Garcia-alfaro
    Abstract:

    We present an anonymous certification scheme that provides Data Minimization to allow the learners of an e-assessment platform to reveal only required information to certificate authority providers. Attribute-based signature schemes are considered as a promising cryptographic primitive for building privacy-preserving attribute credentials, also known as anonymous credentials. These mechanisms allow the derivation of certified attributes by the issuing authority relying on non-interactive protocols and enable end-users to authenticate with verifiers in a pseudonymous manner, e.g., by providing only the minimum amount of information to service providers.

  • Anonymous Certification for an e-Assessment Framework
    Secure IT Systems, 2017
    Co-Authors: Christophe Kiennert, Pierre-olivier Rocher, Nesrine Kaaniche, Maryline Laurent, Joaquin Garcia-alfaro
    Abstract:

    We present an anonymous certification scheme that provides Data Minimization to allow the learners of an e-assessment platform to reveal only required information to certificate authority providers. Attribute-based signature schemes are considered as a promising cryptographic primitive for building privacy-preserving attribute credentials, also known as anonymous credentials. These mechanisms allow the derivation of certified attributes by the issuing authority relying on non-interactive protocols and enable end-users to authenticate with verifiers in a pseudonymous manner, e.g., by providing only the minimum amount of information to service providers.

  • ESORICS (1) - Attribute-Based Signatures for Supporting Anonymous Certification
    Computer Security – ESORICS 2016, 2016
    Co-Authors: Nesrine Kaaniche, Maryline Laurent
    Abstract:

    This paper presents an anonymous certification (AC) scheme, built over an attribute based signature (ABS). After identifying properties and core building blocks of anonymous certification schemes, we identify ABS limitations to fulfill AC properties, and we propose a new system model along with a concrete mathematical construction based on standard assumptions and the random oracle model. Our solution has several advantages. First, it provides a Data Minimization cryptographic scheme, permitting the user to reveal only required information to any service provider. Second, it ensures unlinkability between the different authentication sessions, while preserving the anonymity of the user. Third, the derivation of certified attributes by the issuing authority relies on a non interactive protocol which provides an interesting communication overhead.

  • Attribute-Based Signatures for Supporting Anonymous Certification
    Computer Security – ESORICS 2016, 2016
    Co-Authors: Nesrine Kaaniche, Maryline Laurent
    Abstract:

    This paper presents an anonymous certification (AC) scheme, built over an attribute based signature (ABS). After identifying properties and core building blocks of anonymous certification schemes, we identify ABS limitations to fulfill AC properties, and we propose a new system model along with a concrete mathematical construction based on standard assumptions and the random oracle model. Our solution has several advantages. First, it provides a Data Minimization cryptographic scheme, permitting the user to reveal only required information to any service provider. Second, it ensures unlinkability between the different authentication sessions, while preserving the anonymity of the user. Third, the derivation of certified attributes by the issuing authority relies on a non interactive protocol which provides an interesting communication overhead.

Awanthika Senarath - One of the best experts on this subject based on the ideXlab platform.

  • A Data Minimization model for embedding privacy into software systems
    Computers & Security, 2019
    Co-Authors: Awanthika Senarath, Nalin Asanka Gamagedara Arachchilage
    Abstract:

    Abstract Modern software systems (social networking, banking and shopping applications) are becoming increasingly dependent on our Data. These systems need Data to provide various economic and social benefits to users as well as businesses. However, the extensive use of personal Data in systems poses a threat to user privacy. Therefore, privacy laws expect software systems to practice Data Minimization (DM), to minimize Data in software systems. This has put software developers in a dilemma to minimize user Data to provide user privacy and maximize user Data for enhanced system functionality. Following the design science research approach, in this research we propose and evaluate a methodology that enables developers to make their decisions to minimize user Data in software systems through understanding Data. The methodology encourage developers to think of the ways they would use Data in a system design focusing on the storage and sharing of Data. Developers in the three experiments conducted to evaluate the methodology agreed that it enables them to think of the ways they use Data in system designs and it helps them to make decisions to minimize using Data in a system design. Developers also showed positive intention to use the proposed methodology within system development activities.

  • Understanding Software Developers' Approach towards Implementing Data Minimization.
    arXiv: Cryptography and Security, 2018
    Co-Authors: Awanthika Senarath, Nalin Asanka Gamagedara Arachchilage
    Abstract:

    Data Minimization (DM) is a privacy practice that requires minimizing the use of user Data in software systems. However, continuous privacy incidents that compromise user Data suggest that the requirements of DM are not adequately implemented in software systems. Therefore, it is important that we understand the problems faced by software developers when they attempt to implement DM in software systems. In this study, we investigate how 24 software developers implement DM in a software system design when they are asked to. Our findings revealed that developers find it difficult to implement DM when they are not aware of the potential of Data they could collect at the design phase of systems. Furthermore, developers were inconsistent in how they implemented DM in their software designs.