Open Access

A study of user data privacy protection algorithms in the context of metaverse based on emotional AI IoT


Cite

Wang, Y., Liang, X., Hei, X., Ji, W., & Zhu, L. (2021). Deep learning data privacy protection based on homomorphic encryption in aiot. Mobile Information Systems, 2021(2), 1-11. Search in Google Scholar

Alraja, M. N., Barhamgi, H., Rattrout, A., & Barhamgi, M. (2021). An integrated framework for privacy protection in iot — applied to smart healthcare. Computers & Electrical Engineering, 91(1), 107060. Search in Google Scholar

Zhang, L., Huo, Y., Ge, Q., Ma, Y., Liu, Q., & Ouyang, W. (2021). A privacy protection scheme for iot big data based on time and frequency limitation. Wireless Communications and Mobile Computing. Search in Google Scholar

Campbell, A., Mccarty, D., Rieckmann, T., Mcneely, J., Rotrosen, J., & Wu, L. T., et al. (2019). Interpretation and integration of the federal substance use privacy protection rule in integrated health systems: a qualitative analysis. Journal of substance abuse treatment, 97, 41-46. Search in Google Scholar

Li, Y., & Hu, X. (2019). Social network analysis of law information privacy protection of cybersecurity based on rough set theory. Library Hi Tech, ahead-of-print (ahead-of-print). Search in Google Scholar

Rodriguez-Priego, N., Porcu, L., & Kitchen, P. J. (2022). Sharing but caring: location based mobile applications (lbma) and privacy protection motivation. Journal of business research (Feb.), 140. Search in Google Scholar

Tawalbeh, L. A., Muheidat, F., Tawalbeh, M., & Quwaider, M. (2020). IoT Privacy and security: Challenges and solutions. Applied Sciences, 10(12), 4102. Search in Google Scholar

Hassan, M. U., Rehmani, M. H., & Chen, J. (2019). Privacy preservation in blockchain based IoT systems: Integration issues, prospects, challenges, and future research directions. Future Generation Computer Systems, 97, 512-529. Search in Google Scholar

Kshetri, N. (2017). Blockchain’s roles in strengthening cybersecurity and protecting privacy. Telecommunications policy, 41(10), 1027-1038. Search in Google Scholar

Abouelmehdi, K., Beni-Hessane, A., & Khaloufi, H. (2018). Big healthcare data: preserving security and privacy. Journal of big data, 5(1), 1-18. Search in Google Scholar

Gao, S., Ma, J., Shi, W., & Zhan, G. (2017). Ltppm: a location and trajectory privacy protection mechanism in participatory sensing. Wireless Communications and Mobile Computing, 15(1), 155-169. Search in Google Scholar

Singh, N. K., & Mahajan, V. (2021). End-user privacy protection scheme from cyber intrusion in smart grid advanced metering infrastructure. International Journal of Critical Infrastructure Protection, 100410. Search in Google Scholar

Zhang, P., Durresi, M., & Durresi, A. (2019). Multi-access edge computing aided mobility for privacy protection in internet of things. Computing, 101(7), 729-742. Search in Google Scholar

Li, H., Xue, X., Li, Z., Li, L., & Xiong, J. (2021). Location privacy protection scheme for lbs in iot. Wireless Communications and Mobile Computing. Search in Google Scholar

Mothukuri, V., Parizi, R. M., Pouriyeh, S., Huang, Y., Dehghantanha, A., & Srivastava, G. (2021). A survey on security and privacy of federated learning. Future Generation Computer Systems, 115, 619-640. Search in Google Scholar

Prince, P. B., & Lovesum, S. J. (2020). Privacy enforced access control model for secured data handling in cloud-based pervasive health care system. SN Computer Science, 1(5), 239. Search in Google Scholar

Hu, Z., & Yang, J. (2020). Differential privacy protection method based on published trajectory cross-correlation constraint. PLoS ONE, 15(8), e0237158. Search in Google Scholar

Zhang, Q., Zhang, X., Wang, M., & Li, X. (2021). Dplq: location-based service privacy protection scheme based on differential privacy. IET information security (6), 15. Search in Google Scholar

Zhou, J., Cao, Z., Dong, X., & Vasilakos, A. V. (2017). Security and privacy for cloud-based IoT: Challenges. IEEE Communications Magazine, 55(1), 26-33. Search in Google Scholar

Gai, K., Wu, Y., Zhu, L., Xu, L., & Zhang, Y. (2019). Permissioned blockchain and edge computing empowered privacy-preserving smart grid networks. IEEE Internet of Things Journal, 6(5), 7992-8004. Search in Google Scholar

Wei, K., Li, J., Ding, M., Ma, C., Yang, H. H., Farokhi, F., & Poor, H. V. (2020). Federated learning with differential privacy: Algorithms and performance analysis. IEEE Transactions on Information Forensics and Security, 15, 3454-3469. Search in Google Scholar

eISSN:
2444-8656
Language:
English
Publication timeframe:
Volume Open
Journal Subjects:
Life Sciences, other, Mathematics, Applied Mathematics, General Mathematics, Physics