Privacy-Preserving Detection of Sensitive Data Exposure

Privacy-Preserving Detection of Sensitive Data Exposure ABSTRACT Statistics from security firms, research institutions and government organizations show that the numbers of data-leak instances have grown rapidly in recent years. Among various data-leak cases, human mistakes are one of the main causes of data loss. There exist solutions detecting inadvertent sensitive data leaks caused by human

Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites

Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites ABSTRACT With the increasing volume of images users share through social sites, maintaining privacy has become a major problem, as demonstrated by a recent wave of publicized incidents where users inadvertently shared personal information. In light of these incidents, the need of tools to help

Predicting Asthma-Related Emergency Department Visits Using Big Data

Predicting Asthma-Related Emergency Department Visits Using Big Data ABSTRACT Asthma is one of the most prevalent and costly chronic conditions in the United States which cannot be cured. However accurate and timely surveillance data could allow for timely and targeted interventions at the community or individual level. Current national asthma disease surveillance systems can have

Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing

Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing ABSTRACT An initiative data prefetching scheme on the storage servers in distributed file systems for cloud computing. In this prefetching technique, the client machines are not substantially involved in the process of data prefetching, but the storage servers can directly prefetch the data after

Passive IP Trace back Disclosing the Locations of IP Spoofers From Path Back scatter

Passive IP Trace back Disclosing the Locations of IP Spoofers From Path Back scatter ABSTRACT It is long known attackers may use forged source IP address to conceal their real locations. To capture the spoofers, a number of IP traceback mechanisms have been proposed. However, due to the challenges of deployment, there has been not

Optimal Configuration of Network Coding in Ad Hoc Networks

Optimal Configuration of Network Coding in Ad Hoc Networks ABSTRACT Analyze the impact of network coding (NC) configuration on the performance of ad hoc networks with the consideration of two significant factors, namely, the throughput loss and the decoding loss, which are jointly treated as the overhead of NC. In particular, physical-layer NC and random

On Traffic-Aware Partition and Aggregation in Map Reduce for Big Data Applications

On Traffic-Aware Partition and Aggregation in Map Reduce for Big Data Applications ABSTRACT Map Reduce job, we consider to aggregate data with the same keys before sending them to remote reduce tasks. Although a similar function, called combine, has been already adopted by Hadoop, it operates immediately after a map task solely for its generated

Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce

Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce ABSTRACT In this paper, we present a distributed structured approach to Sybil attack. This is derived from the fact that our approach is based on the neighbor similarity trust relationship among the neighbor peers. Given a P2P e-commerce trust relationship based on interest, the transactions among

k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data

k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data ABSTRACT Data Mining has wide applications in many areas such as banking, medicine, scientific research and among government agencies. Classification is one of the commonly used tasks in data mining applications. For the past decade, due to the rise of various privacy issues, many theoretical and

Innovative Schemes for Resource Allocation in the Cloud for Media Streaming Applications

Innovative Schemes for Resource Allocation in the Cloud for Media Streaming Applications ABSTRACT Media streaming applications have recently attracted a large number of users in the Internet. With the advent of these bandwidth-intensive applications, it is economically inefficient to provide streaming distribution with guaranteed QoS relying only on central resources at a media content provider.