Data Privacy: Foundations, New Developments and the Big Data Challenge


Book Description

This book offers a broad, cohesive overview of the field of data privacy. It discusses, from a technological perspective, the problems and solutions of the three main communities working on data privacy: statistical disclosure control (those with a statistical background), privacy-preserving data mining (those working with data bases and data mining), and privacy-enhancing technologies (those involved in communications and security) communities. Presenting different approaches, the book describes alternative privacy models and disclosure risk measures as well as data protection procedures for respondent, holder and user privacy. It also discusses specific data privacy problems and solutions for readers who need to deal with big data.




Big Data Analytics for Large-Scale Multimedia Search


Book Description

A timely overview of cutting edge technologies for multimedia retrieval with a special emphasis on scalability The amount of multimedia data available every day is enormous and is growing at an exponential rate, creating a great need for new and more efficient approaches for large scale multimedia search. This book addresses that need, covering the area of multimedia retrieval and placing a special emphasis on scalability. It reports the recent works in large scale multimedia search, including research methods and applications, and is structured so that readers with basic knowledge can grasp the core message while still allowing experts and specialists to drill further down into the analytical sections. Big Data Analytics for Large-Scale Multimedia Search covers: representation learning, concept and event-based video search in large collections; big data multimedia mining, large scale video understanding, big multimedia data fusion, large-scale social multimedia analysis, privacy and audiovisual content, data storage and management for big multimedia, large scale multimedia search, multimedia tagging using deep learning, interactive interfaces for big multimedia and medical decision support applications using large multimodal data. Addresses the area of multimedia retrieval and pays close attention to the issue of scalability Presents problem driven techniques with solutions that are demonstrated through realistic case studies and user scenarios Includes tables, illustrations, and figures Offers a Wiley-hosted BCS that features links to open source algorithms, data sets and tools Big Data Analytics for Large-Scale Multimedia Search is an excellent book for academics, industrial researchers, and developers interested in big multimedia data search retrieval. It will also appeal to consultants in computer science problems and professionals in the multimedia industry.




Handbook of Research on Big Data and the IoT


Book Description

The increase in connected devices in the internet of things (IoT) is leading to an exponential increase in the data that an organization is required to manage. To successfully utilize IoT in businesses, big data analytics are necessary in order to efficiently sort through the increased data. The combination of big data and IoT can thus enable new monitoring services and powerful processing of sensory data streams. The Handbook of Research on Big Data and the IoT is a pivotal reference source that provides vital research on emerging trends and recent innovative applications of big data and IoT, challenges facing organizations and the implications of these technologies on society, and best practices for their implementation. While highlighting topics such as bootstrapping, data fusion, and graph mining, this publication is ideally designed for IT specialists, managers, policymakers, analysts, software engineers, academicians, and researchers.




Guide to Data Privacy


Book Description

Data privacy technologies are essential for implementing information systems with privacy by design. Privacy technologies clearly are needed for ensuring that data does not lead to disclosure, but also that statistics or even data-driven machine learning models do not lead to disclosure. For example, can a deep-learning model be attacked to discover that sensitive data has been used for its training? This accessible textbook presents privacy models, computational definitions of privacy, and methods to implement them. Additionally, the book explains and gives plentiful examples of how to implement—among other models—differential privacy, k-anonymity, and secure multiparty computation. Topics and features: Provides integrated presentation of data privacy (including tools from statistical disclosure control, privacy-preserving data mining, and privacy for communications) Discusses privacy requirements and tools for different types of scenarios, including privacy for data, for computations, and for users Offers characterization of privacy models, comparing their differences, advantages, and disadvantages Describes some of the most relevant algorithms to implement privacy models Includes examples of data protection mechanisms This unique textbook/guide contains numerous examples and succinctly and comprehensively gathers the relevant information. As such, it will be eminently suitable for undergraduate and graduate students interested in data privacy, as well as professionals wanting a concise overview. Vicenç Torra is Professor with the Department of Computing Science at Umeå University, Umeå, Sweden.




Research Anthology on Privatizing and Securing Data


Book Description

With the immense amount of data that is now available online, security concerns have been an issue from the start, and have grown as new technologies are increasingly integrated in data collection, storage, and transmission. Online cyber threats, cyber terrorism, hacking, and other cybercrimes have begun to take advantage of this information that can be easily accessed if not properly handled. New privacy and security measures have been developed to address this cause for concern and have become an essential area of research within the past few years and into the foreseeable future. The ways in which data is secured and privatized should be discussed in terms of the technologies being used, the methods and models for security that have been developed, and the ways in which risks can be detected, analyzed, and mitigated. The Research Anthology on Privatizing and Securing Data reveals the latest tools and technologies for privatizing and securing data across different technologies and industries. It takes a deeper dive into both risk detection and mitigation, including an analysis of cybercrimes and cyber threats, along with a sharper focus on the technologies and methods being actively implemented and utilized to secure data online. Highlighted topics include information governance and privacy, cybersecurity, data protection, challenges in big data, security threats, and more. This book is essential for data analysts, cybersecurity professionals, data scientists, security analysts, IT specialists, practitioners, researchers, academicians, and students interested in the latest trends and technologies for privatizing and securing data.




Challenges in the IoT and Smart Environments


Book Description

This book is an invaluable reference for those operating within the fields of Cyber Security, Digital Forensics, Digital Policing, Computer Science and Artificial Intelligence. The Internet of Things (IoT) ecosystem presents a wide range of consumer, infrastructure, organisational, industrial and military applications. The IoT technologies such as intelligent health-connected devices; unmanned aerial vehicles (UAVs); smart grids; cyber-physical and cyber-biological systems; and the Internet of Military/Battlefield Things offer a myriad of benefits both individually and collectively. For example, implantable devices could be utilised to save or enhance patients’ lives or offer preventative treatments. However, notwithstanding its many practical and useful applications, the IoT paradigm presents numerous challenges spanning from technical, legal and investigative issues to those associated with security, privacy and ethics. Written by internationally-renowned experts in the field, this book aims to contribute to addressing some of these challenges. Lawyers, psychologists and criminologists could also find this book a very valuable resource at their disposal, and technology enthusiasts might find the book interesting. Furthermore, the book is an excellent advanced text for research and master’s degree students as well as undergraduates at their final years of studies in the stated fields.




Security and Artificial Intelligence


Book Description

AI has become an emerging technology to assess security and privacy, with many challenges and potential solutions at the algorithm, architecture, and implementation levels. So far, research on AI and security has looked at subproblems in isolation but future solutions will require sharing of experience and best practice in these domains. The editors of this State-of-the-Art Survey invited a cross-disciplinary team of researchers to a Lorentz workshop in 2019 to improve collaboration in these areas. Some contributions were initiated at the event, others were developed since through further invitations, editing, and cross-reviewing. This contributed book contains 14 invited chapters that address side-channel attacks and fault injection, cryptographic primitives, adversarial machine learning, and intrusion detection. The chapters were evaluated based on their significance, technical quality, and relevance to the topics of security and AI, and each submission was reviewed in single-blind mode and revised.




Artificial Intelligence and Soft Computing


Book Description

The two-volume set LNAI 12854 and 12855 constitutes the refereed proceedings of the 20th International Conference on Artificial Intelligence and Soft Computing, ICAISC 2021, held in Zakopane, Poland, in June 2021. Due to COVID 19, the conference was held virtually. The 89 full papers presented were carefully reviewed and selected from 195 submissions. The papers included both traditional artificial intelligence methods and soft computing techniques as well as follows: · Neural Networks and Their Applications · Fuzzy Systems and Their Applications · Evolutionary Algorithms and Their Applications · Artificial Intelligence in Modeling and Simulation · Computer Vision, Image and Speech Analysis · Data Mining · Various Problems of Artificial Intelligence · Bioinformatics, Biometrics and Medical Applications




Metaheuristics and Nature Inspired Computing


Book Description

This volume constitutes selected papers presented during the 8th International Conference on Metaheuristics and Nature Inspired Computing, META 2021, held in Marrakech, Morocco, in October 201. Due to the COVID-19 pandemic the conference was partiqally held online. The 16 papers were thoroughly reviewed and selected from the 53 submissions. They are organized in the topical sections on ​combinatorial optimization; continuous optimization; optimization and machine learning; applications.




AI Approaches to the Complexity of Legal Systems XI-XII


Book Description

This book includes revised selected papers from the International Workshops on AI Approaches to the Complexity of Legal Systems, AICOL-XI@JURIX2018, held in Groningen, The Netherlands, on December 12, 2018; AICOL-XII@JURIX 2020, held in Brno, Czechia, on December 9, 2020; XAILA@JURIX 2020, held in in Brno, Czechia, on December 9, 2020.*The 17 full and 4 short papers included in this volume were carefully reviewed and selected form 39 submissions. They represent a comprehensive picture of the state of the art in legal informatics. The papers are logically organized in 5 blocks: ​Knowledge Representation; Logic, rules, and reasoning; Explainable AI in Law and Ethics; Law as Web of linked Data and the Rule of Law; Data protection and Privacy Modelling and Reasoning. *Due to the Covid-19 pandemic AICOL-XII@JURIX 2020 and XAILA@JURIX 2020 were held virtually.