98%
921
2 minutes
20
Various methods such as k-anonymity and differential privacy have been proposed to safeguard users' private information in the publication of location service data. However, these typically employ a rigid "all-or-nothing" privacy standard that fails to accommodate users' more nuanced and multi-level privacy-related needs. Data is irrecoverable once anonymized, leading to a permanent reduction in location data quality, in turn significantly diminishing data utility. In the paper, a novel, bidirectional and multi-layered location privacy protection method based on attribute encryption is proposed. This method offers layered, reversible, and fine-grained privacy safeguards. A hierarchical privacy protection scheme incorporates various layers of dummy information, using an access structure tree to encrypt identifiers for these dummies. Multi-level location privacy protection is achieved after adding varying amounts of dummy information at different hierarchical levels N. This allows for precise control over the de-anonymization process, where users may adjust the granularity of anonymized data based on their own trust levels for multi-level location privacy protection. This method includes an access policy which functions via an attribute encryption-based access control system, generating decryption keys for data identifiers according to user attributes, facilitating a reversible transformation between data anonymity and de-anonymity. The complexities associated with key generation, distribution, and management are thus markedly reduced. Experimental comparisons with existing methods demonstrate that the proposed method effectively balances service quality and location privacy, providing users with multi-level and reversible privacy protection services.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC11379367 | PMC |
http://journals.plos.org/plosone/article?id=10.1371/journal.pone.0309990 | PLOS |
Eur Spine J
September 2025
Johns Hopkins University, Baltimore, USA.
Cell Rep Methods
August 2025
School of Computing and Data Science, The University of Hong Kong, Hong Kong 999077, China. Electronic address:
Advancements in sequencing technologies grant individuals unprecedented access to their genomic data. However, existing data management systems or protocols are inadequate in privacy protection, limiting individuals' control over their genomic information, hindering data sharing, and posing challenges for biomedical research. Therefore, demand exists for an owner-governed system fulfilling owner authority, life cycle data encryption, and verifiability simultaneously.
View Article and Find Full Text PDFCureus
August 2025
Anaesthesiology, Base Hospital, Thambuththegama, Thambuththegama, LKA.
Medical photography is crucial in modern medicine, and this article offers a five-step framework to help healthcare workers take clear, professional clinical photos. It is widely used globally for diagnosis, documentation, education, and publication. Smartphones have made capturing medical images easier, even without formal training, but quality varies without proper guidance.
View Article and Find Full Text PDFBDJ Open
September 2025
Operative Dentistry & Endodontics, Department of Surgery, Aga Khan University Hospital, Karachi, Pakistan.
Background: Artificial Intelligence (AI) has become increasingly integrated into dental diagnostics, particularly for detecting carious lesions. While AI offers benefits such as improved accuracy and efficiency, its use raises important ethical concerns, including transparency, patient privacy, autonomy, diversity and accountability. This scoping review aims to identify these ethical concerns using a structured ethical framework.
View Article and Find Full Text PDFJ Med Internet Res
September 2025
College of Nursing, Yonsei University, Seoul, Republic of Korea.
Background: Mobile health (mHealth) interventions can be effective for people living with HIV, who are sensitive to privacy breach risks. Understanding the perceived experiences of intervention participants can provide comprehensive insights into potential users and predict intervention effectiveness. Thus, it is necessary to plan engagement measurement and consider ways to enhance engagement during the app development phase.
View Article and Find Full Text PDF