Search Results

Results (36)

Search Parameters:

Keyword: Privacy
Order results
Results per page
Open AccessArticle
18 Pages, 2,322 KB Download PDF

Multi Attribute Stratified Sampling: An Automated Framework for Privacy-Preserving Healthcare Data Publishing with Multiple Sensitive Attributes

Advances in Science, Technology and Engineering Systems Journal, Volume 11, Issue 1, Page # 51–68, 2026; DOI: 10.25046/aj110106
Abstract:

The accumulation and analysis of large-scale patient data have led to breakthrough discoveries in potential flags for diseases based on pattern recognition, highlight medication efficacy, and local population health trends that would be impossible with traditional paper-based records. However, these benefits come with unique challenges posed by the application of data sharing for research and…

Read More
(This article belongs to the SP20 (Special Issue on Multidisciplinary Frontiers in Engineering, Computing and Applied Sciences 2026) & Section Theory & Methods in Computer Science (CTM))
Open AccessArticle
12 Pages, 1,302 KB Download PDF

Federated Learning with Differential Privacy and Blockchain for Security and Privacy in IoMT A Theoretical Comparison and Review

Advances in Science, Technology and Engineering Systems Journal, Volume 10, Issue 6, Page # 65–76, 2025; DOI: 10.25046/aj100606
Abstract:

The growing integration of the Internet of Medical Things (IoMT) into healthcare has amplified the need for secure and privacy-preserving artificial intelligence. Federated Learning (FL) has emerged as a pivotal paradigm for decentralized medical data processing; however, it still faces challenges concerning data confidentiality, trust management, and scalability. This review presents an extended theoretical comparison…

Read More
(This article belongs to the SP19 (Special Issue on Innovation in Computing, Engineering Science & Technology 2025-26) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
10 Pages, 1,102 KB Download PDF

Exploring Current Challenges on Security and Privacy in an Operational eHealth Information System

Advances in Science, Technology and Engineering Systems Journal, Volume 9, Issue 2, Page # 45–54, 2024; DOI: 10.25046/aj090206
Abstract:

Bearing in mind that patient data is extremely sensitive, it is crucial to establish strong protection when the security and privacy of healthcare data are concerned. Prioritizing data security and privacy is essential for the overall healthcare industry in order to maintain the reliability of electronic healthcare (eHealth) information systems. This study explores the gathered…

Read More
(This article belongs to the SP16 (Special Issue on Computing, Engineering and Multidisciplinary Sciences 2024) & Section Medicine (MED))
Open AccessArticle
9 Pages, 1,013 KB Download PDF

Ontology Based Privacy Preservation over Encrypted Data using Attribute-Based Encryption Technique

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 378–386, 2021; DOI: 10.25046/aj060244
Abstract:

The web documents are automatically interacting to discover the information by web mining, which is one of the applications of Cloud Computing (CC) technologies. These documents may be in the form of structured, semi-structured, or unstructured formats. In current web technologies, the Semantic Web is an extension for better enabling the people and computers to…

Read More
(This article belongs to Section Cybernetics in Computer Science (CCY))
Open AccessArticle
8 Pages, 886 KB Download PDF

Time Granularity-based Privacy Protection for Cloud Metering Systems

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 6, Page # 1278–1285, 2020; DOI: 10.25046/aj0506152
Abstract:

Due to the advent of cloud computing and Internet of Things, smart meters have become a crucial part of smart cities. Smart meters generate vast amounts of fine-grained data that can immediately provide useful information to electricity consumers, such as automatic billing, load monitoring, and dynamic time pricing. This will make the electricity consumers more…

Read More
(This article belongs to Section Network Engineering (ENW))
Open AccessArticle
11 Pages, 1,074 KB Download PDF

Evolution of Privacy Preservation Models in Location-Based Services

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 82–92, 2020; DOI: 10.25046/aj050311
Abstract:

Location-based services have become increasingly prevalent with the advancement in the positioning capabilities of smart devices and their emergence in social networking. In order to acquire a service, users must submit their identity, query interest and location details to service providers. Such information shared by users are accumulated continuously, stored and analyzed in order to…

Read More
(This article belongs to Section Software Engineering in Computer Science (CSE))
Open AccessArticle
7 Pages, 746 KB Download PDF

Comparison Analysis between Mobile Banking and Mobile Payment as Determinant Factors of Customer Privacy

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 469–475, 2020; DOI: 10.25046/aj050260
Abstract:

Mobile banking and mobile payment are currently always used by customers for financial payments. With customer payments, it is usually easier to make payments with mobile payment, because it is more practical and direct than mobile banking. However, is the privacy of both platforms understood by the customer? Research questions to be answered: 1) What…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
6 Pages, 883 KB Download PDF

A Comprehensive Study of Privacy Preserving Techniques in Cloud Computing Environment

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 419–424, 2020; DOI: 10.25046/aj050254
Abstract:

The huge growth in cloud storage utilization over the past years has made a big demand for an advanced technique and strong tools to make services even more practical and secure. Data privacy in cloud computing has become one of the biggest concerns for both individuals and organizations which adds more pressure on cloud service…

Read More
(This article belongs to Section Cybernetics in Computer Science (CCY))
Open AccessArticle
12 Pages, 264 KB Download PDF

Using Privacy Enhancing and Fine-Grained Access Controlled eKYC to implement Privacy Aware eSign

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 4, Page # 347–358, 2019; DOI: 10.25046/aj040443
Abstract:

eSign is an online electronic signature service which is recently gaining more prominence in India. eSign is based on two online services from UIDAI, viz. a viz., Aadhaar based authentication and retrieval of resident’s eKYC information after taking his/her consent. With increased adoption of Aadhaar based services, privacy of user data has become more and…

Read More
(This article belongs to the SP7 (Special Issue on Advancement in Engineering and Computer Science 2019) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
10 Pages, 992 KB Download PDF

Holistic Access Control and Privacy Infrastructure in Distributed Environment

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 6, Page # 46–55, 2018; DOI: 10.25046/aj030604
Abstract:

This article discusses IoT security in situations whereby devices do not share the same security domains, which raises security, privacy and safety concerns. It then presents an Access Control and Privacy infrastructure for addressing these concerns in the context of distributed environments. IoT deployments allow billions of connected physical devices to collect, process and share…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
15 Pages, 1,137 KB Download PDF

Privacy-by-Design (PbD) IoT Framework : A Case of Location Privacy Mitigation Strategies for Near Field Communication (NFC) Tag Sensor

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 1, Page # 134–148, 2017; DOI: 10.25046/aj020116
Abstract:

Near Field Communication (NFC) technology is a short range (range about 10cm) standard extended from the core standard Radio Frequency Identifier (RFID). These technologies are a portion of wireless communication technology. Even though NFC technologies benefit in various field, but it’s still exposed to multiple type of privacy attacks and threat as well since the…

Read More
(This article belongs to the SP2 (Special Issue on Computer Systems, Information Technology, Electrical and Electronics Engineering 2017) & Section Telecommunications (TEL))
Open AccessArticle
11 Pages, 872 KB Download PDF

Cross layers security approach via an implementation of data privacy and by authentication mechanism for mobile WSNs

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 1, Page # 97–107, 2017; DOI: 10.25046/aj020112
Abstract:

To implement a new secure network with high mobility and low energy consumption, we use smart sensors. These sensors are powered by micro batteries generally non rechargeable. So, to extend their lifetime, it is necessary to implement new energy conservation techniques. Existing works separate the two features (security, energy conservation) and are interested specifically in…

Read More
(This article belongs to the SP2 (Special Issue on Computer Systems, Information Technology, Electrical and Electronics Engineering 2017) & Section Network Engineering (ENW))
Open AccessArticle
9 Pages, 1,700 KB Download PDF

A Multi-class Acoustic Dataset and Interactive Tool for Analyzing Drone Signatures in Real-World Environments

Advances in Science, Technology and Engineering Systems Journal, Volume 10, Issue 6, Page # 88–96, 2025; DOI: 10.25046/aj100608
Abstract:

The rapid proliferation of drones across various industries has introduced significant challenges related to privacy, security, and noise pollution. Current drone detection systems, primarily based on visual and radar technologies, face limitations under certain conditions, highlighting the need for effective acoustic-based detection methods. This paper presents a unique and comprehensive dataset of drone acoustic signatures,…

Read More
(This article belongs to the SP19 (Special Issue on Innovation in Computing, Engineering Science & Technology 2025-26) & Section Acoustics (ACO))
Open AccessArticle
12 Pages, 1,413 KB Download PDF

Multi-Layered Machine Learning Model For Mining Learners Academic Performance

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 1, Page # 850–861, 2021; DOI: 10.25046/aj060194
Abstract:

Different colleges and universities have different approaches to dealing with low-performance learners. However, in most cases, analgesics do not deal with root problems. This research suggests a model of three layers of variables sequentially adaptable to a deep-root issue. The suggested model can identify early pupils who could be at risk because of inaccurate or…

Read More
(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
9 Pages, 2,432 KB Download PDF

Profiling Attack on WiFi-based IoT Devices using an Eavesdropping of an Encrypted Data Frames

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 6, Page # 49–57, 2022; DOI: 10.25046/aj070606
Abstract:

The rapid advancement of the Internet of Things (IoT) is distinguished by heterogeneous technologies that provide cutting-edge services across a range of application domains. However, by eavesdropping on encrypted WiFi network traflc, attackers can infer private information such as the types and working status of IoT devices in a business or residential home. Moreover, since…

Read More
(This article belongs to the SP13 (Special Issue on Innovation in Computing, Engineering Science & Technology 2022) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
15 Pages, 366 KB Download PDF

Leakage-abuse Attacks Against Forward Private Searchable Symmetric Encryption

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 2, Page # 156–170, 2022; DOI: 10.25046/aj070216
Abstract:

Dynamic Searchable Symmetric Encryption (DSSE) methods address the problem of securely outsourcing updating private data into a semi-trusted cloud server. Furthermore, Forward Privacy (FP) notion was introduced to limit data leakage and thwart the related attacks on DSSE approaches. FP schemes ensure previous search queries cannot be linked to future updates and newly added files.…

Read More
(This article belongs to the SP12 (Special Issue on Multidisciplinary Sciences and Engineering 2021-22) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
6 Pages, 724 KB Download PDF

Ethical Implications and Challenges in using Social Media: A Comprehensive Study

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 1, Page # 47–52, 2022; DOI: 10.25046/aj070105
Abstract:

The technological revolution penetrates every aspect of our dailylives; it changed our lives in different fields such as communication, decision-making, information access and work environment. These changes have benefits, but they also have costs. These costs include many ethical and social problems that need more investigation. The human element is the most affected part of…

Read More
(This article belongs to Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
7 Pages, 848 KB Download PDF

Node-Node Data Exchange in IoT Devices Using Twofish and DHE

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 622–628, 2021; DOI: 10.25046/aj060271
Abstract:

Internet of Things provides the support for devices, people and things to collaborate in collecting, analyzing and sharing sensitive information from one device onto the other through the internet. The internet of things is thriving largely due to access, connectivity, artificial intelligence and machine learning approaches that it supports. The stability and enhanced speed of…

Read More
(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
10 Pages, 1,188 KB Download PDF

Factors Affecting Behavioural Intention to Shop in Self-Service Retail Case Study: JD.ID X Mart

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 285–294, 2021; DOI: 10.25046/aj060233
Abstract:

This paper aims to measure the acceptance level of Indonesian customers to JD.ID X retail and to reveal the driving factors of behavioral intention to shop at the retail. JD.ID X is new retail that implements a new shopping technology called Just walk-out technology (JWOT) also known as retail without a cashier. JWOT is one…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
12 Pages, 546 KB Download PDF

Modified Blockchain based Hardware Paradigm for Data Provenance in Academia

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 1, Page # 66–77, 2021; DOI: 10.25046/aj060108
Abstract:

Educational organizations often need to distribute academic transcripts and certificates upon student’s request since they are mandatory for admission into new scholarly programs including placement activities. Manual procedures involved with the transmission process of academic document is indeed a tedious task that results in substantial overhead. Thus the necessity for an autonomous electronic system for…

Read More
(This article belongs to Section Electronic Engineering (EEE))
Open AccessArticle
7 Pages, 767 KB Download PDF

An Anonymity Preserving Framework for Associating Personally Identifying Information with a Digital Wallet

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 1, Page # 36–42, 2021; DOI: 10.25046/aj060104
Abstract:

Growing adoption of cryptocurrencies by institutional investors coupled with recurring incidents of loss of access to digital wallets have resulted in emergence of custodial services for high net worth individuals and institutions. However, such services are not economically feasible for the wider community of crypto owners who are left with no recourse for recovery of…

Read More
(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
7 Pages, 999 KB Download PDF

5G, Vehicle to Everything Communication: Opportunities, Constraints and Future Directions

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 6, Page # 1089–1095, 2020; DOI: 10.25046/aj0506132
Abstract:

The 5G, as a new source of telecommunication infrastructure technology, has attracted many stakeholders to promote the progress of its standards and the development of its technology industry. The 5G reinforces new technologies and delivers vehicles for everything services (V2X) to drivers and passengers. It also offers several advantages. On the other hand, due to…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Telecommunications (TEL))
Open AccessArticle
6 Pages, 568 KB Download PDF

An Overview on CryptDb and Word2vec Approaches

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 5, Page # 1282–1287, 2020; DOI: 10.25046/aj0505154
Abstract:

Big data is a vast data set that was used in many areas. Online applications are subject to theft of confidential information because opponents can exploit software errors to access private data, and because curious or malicious officials can capture and lose data. CryptDB is a functional system that provides security and confidentiality through a…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
6 Pages, 846 KB Download PDF

Multi-layered Security Design and Evaluation for Cloud-based Web Application: Case Study of Human Resource Management System

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 5, Page # 674–679, 2020; DOI: 10.25046/aj050583
Abstract:

Cloud computing is the development of information technology to provides resources that can be accessed through network. Security and privacy in cloud computing are major concern for companies. Therefore, cloud computing architecture strategy and design are needed to reduce costs and ensure the security of company assets in cloud computing. In this study, we are…

Read More
(This article belongs to Section Hardware & Architecture in Computer Science (CHA))
Open AccessArticle
7 Pages, 750 KB Download PDF

Risk Management: The Case of Intrusion Detection using Data Mining Techniques

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 529–535, 2020; DOI: 10.25046/aj050365
Abstract:

Every institution nowadays relies on their online system and framework to do businesses. Such procedures need more attention due to the massive amount of attacks that occurs. These procedures have to go first through the management team of the institution, in order to prevent exploits of the attackers. Thus, the risk management can easily control…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Indigenous Knowledge Systems of the Tribal Communities of the Asia Pacific
Guest Editors: Dr. Anurag Hazarika
Deadline: 31 October 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026