• List of Articles Privacy

      • Open Access Article

        1 - An access control model for online social networks using user-to-user relationships
        Mohamad Javad Piran mahmud deypir
        With the pervasiveness of social networks and the growing information shared on them, users of these networks are exposed to potential threats to data security and privacy. The privacy settings included in these networks do not give users complete control over the manag More
        With the pervasiveness of social networks and the growing information shared on them, users of these networks are exposed to potential threats to data security and privacy. The privacy settings included in these networks do not give users complete control over the management and privatization of access to their shared information by other users. In this article, using the concept of social graph, a new model of user access control was proposed to the user, which allows the expression of privacy policies and more accurate and professional access control in terms of pattern and depth of relationships between users in social networks. In this article, by using the regular index method, indirect relationships among users are examined and analyzed, and more precise policies than previous models are presented. The evaluation of the results showed that for 10 neighbors for each user, the probability accumulation of a qualified path for the first three counter loops is 1, 10.5 and 67.3%, respectively, and finally for the fourth counter it reaches 100%. As the defined counting characteristic increases, the average execution time of the proposed algorithm and previously proposed algorithms increases. However, for the higher limits of the counting characteristic, the proposed algorithm performs better than the previous ones. Manuscript profile
      • Open Access Article

        2 - Privacy Preserving Big Data Mining: Association Rule Hiding
        Golnar Assadat  Afzali shahriyar mohammadi
        Data repositories contain sensitive information which must be protected from unauthorized access. Existing data mining techniques can be considered as a privacy threat to sensitive data. Association rule mining is one of the utmost data mining techniques which tries to More
        Data repositories contain sensitive information which must be protected from unauthorized access. Existing data mining techniques can be considered as a privacy threat to sensitive data. Association rule mining is one of the utmost data mining techniques which tries to cover relationships between seemingly unrelated data in a data base.. Association rule hiding is a research area in privacy preserving data mining (PPDM) which addresses a solution for hiding sensitive rules within the data problem. Many researches have be done in this area, but most of them focus on reducing undesired side effect of deleting sensitive association rules in static databases. However, in the age of big data, we confront with dynamic data bases with new data entrance at any time. So, most of existing techniques would not be practical and must be updated in order to be appropriate for these huge volume data bases. In this paper, data anonymization technique is used for association rule hiding, while parallelization and scalability features are also embedded in the proposed model, in order to speed up big data mining process. In this way, instead of removing some instances of an existing important association rule, generalization is used to anonymize items in appropriate level. So, if necessary, we can update important association rules based on the new data entrances. We have conducted some experiments using three datasets in order to evaluate performance of the proposed model in comparison with Max-Min2 and HSCRIL. Experimental results show that the information loss of the proposed model is less than existing researches in this area and this model can be executed in a parallel manner for less execution time Manuscript profile
      • Open Access Article

        3 - Safe Use of the Internet of Things for Privacy Enhancing
        Hojatallah Hamidi
        New technologies and their uses have always had complex economic, social, cultural, and legal implications, with accompanying concerns about negative consequences. So it will probably be with the IoT and their use of data and attendant location privacy concerns. It must More
        New technologies and their uses have always had complex economic, social, cultural, and legal implications, with accompanying concerns about negative consequences. So it will probably be with the IoT and their use of data and attendant location privacy concerns. It must be recognized that management and control of information privacy may not be sufficient according to traditional user and public preferences. Society may need to balance the benefits of increased capabilities and efficiencies of the IoT against a possibly inevitably increased visibility into everyday business processes and personal activities. Much as people have come to accept increased sharing of personal information on the Web in exchange for better shopping experiences and other advantages, they may be willing to accept increased prevalence and reduced privacy of information. Because information is a large component of IoT information, and concerns about its privacy are critical to widespread adoption and confidence, privacy issues must be effectively addressed. The purpose of this paper is which looks at five phases of information flow, involving sensing, identification, storage, processing, and sharing of this information in technical, social, and legal contexts, in the IoT and three areas of privacy controls that may be considered to manage those flows, will be helpful to practitioners and researchers when evaluating the issues involved as the technology advances. Manuscript profile
      • Open Access Article

        4 - Preserving Data Clustering with Expectation Maximization Algorithm
        Leila Jafar Tafreshi Farzin Yaghmaee
        Data mining and knowledge discovery are important technologies for business and research. Despite their benefits in various areas such as marketing, business and medical analysis, the use of data mining techniques can also result in new threats to privacy and informatio More
        Data mining and knowledge discovery are important technologies for business and research. Despite their benefits in various areas such as marketing, business and medical analysis, the use of data mining techniques can also result in new threats to privacy and information security. Therefore, a new class of data mining methods called privacy preserving data mining (PPDM) has been developed. The aim of researches in this field is to develop techniques those could be applied to databases without violating the privacy of individuals. In this work we introduce a new approach to preserve sensitive information in databases with both numerical and categorical attributes using fuzzy logic. We map a database into a new one that conceals private information while preserving mining benefits. In our proposed method, we use fuzzy membership functions (MFs) such as Gaussian, P-shaped, Sigmoid, S-shaped and Z-shaped for private data. Then we cluster modified datasets by Expectation Maximization (EM) algorithm. Our experimental results show that using fuzzy logic for preserving data privacy guarantees valid data clustering results while protecting sensitive information. The accuracy of the clustering algorithm using fuzzy data is approximately equivalent to original data and is better than the state of the art methods in this field. Manuscript profile
      • Open Access Article

        5 - AI based Computational Trust Model for Intelligent Virtual Assistant
        Babu Kumar Ajay Vikram Singh Parul  Agarwal
        The Intelligent virtual assistant (IVA) also called AI assistant or digital assistant is software developed as a product by organizations like Google, Apple, Microsoft and Amazon. Virtual assistant based on Artificial Intelligence which works and processes on natural la More
        The Intelligent virtual assistant (IVA) also called AI assistant or digital assistant is software developed as a product by organizations like Google, Apple, Microsoft and Amazon. Virtual assistant based on Artificial Intelligence which works and processes on natural language commands given by humans. It helps the user to work more efficiently and also saves time. It is human friendly as it works on natural language commands given by humans. Voice-controlled Intelligent Virtual Assistants (IVAs) have seen gigantic development as of late on cell phones and as independent gadgets in individuals’ homes. The intelligent virtual assistant is very useful for illiterate and visually impaired people around the world. While research has analyzed the expected advantages and downsides of these gadgets for IVA clients, barely any investigations have exactly assessed the need of security and trust as a singular choice to use IVAs. In this proposed work, different IPA users and non-users (N=1000) are surveyed to understand and analyze the barriers and motivations to adopting IPAs and how users are concerned about data privacy and trust with respect to organizational compliances and social contract related to IPA data and how these concerns have affected the acceptance and use of IPAs. We have used Naïve Byes Classifier to compute trust in IVA devices and further evaluate probability of using different trusted IVA devices. Manuscript profile
      • Open Access Article

        6 - Proposing a New Framework to Decreasing Delay in the Internet of Things by Using Computing Power of Fog
        Mohammad Taghi Shaykhan kianoosh azadi
        As the Internet of Things (IoT) expands and becomes more widespread, we will soon see the dependence of human life on its services. At that time, it would be difficult to imagine the survival without the IoT, and disruption of its services would cause great loss of life More
        As the Internet of Things (IoT) expands and becomes more widespread, we will soon see the dependence of human life on its services. At that time, it would be difficult to imagine the survival without the IoT, and disruption of its services would cause great loss of life and property. Disruption of IoT services can occur for two reasons: network errors due to congestion, collision, interruption and noise, and disruption due to the malicious activities of infiltrator. Also, the destructive activities of infiltrators can lead to various cyber attacks and violation of the privacy of individuals. Therefore, before the interdependence between human life and IoT, it is necessary to consider measures to ensure the quality and security of service and privacy. In this study, a solution to reduce service delay (improve quality) and ensure security and privacy of things by relying on the computing power of nodes available in the Fog Layer has been proposed. The proposed solution simultaneously improves service quality and maintains security and privacy. Other features of presented algorithm in proposed solution of fairness between objects are in terms of the quality of service received and minimizing overhead processing and transfer of expired packages (packages that will certainly experience a consumedly threshold delay). Adherence to fairness ensures that the quality of service of any of the things does not be a subject of the reduction of the delay of the service of the entire network; These aforementioned objects may be subjects of critical applications, such as health. Manuscript profile
      • Open Access Article

        7 - Protecting privacy in cyberspace by emphasizing ethical and legal principles
        hasan badini qafour khoeini hamzeh karami
        Educating privacy and adhering to code of ethics in cyberspace is an important and challenging issue because it is a global, high-speed, accessible, transcendent, transcendental, fluid, augmented and dense reality; Ethical rules and order become more important. At the l More
        Educating privacy and adhering to code of ethics in cyberspace is an important and challenging issue because it is a global, high-speed, accessible, transcendent, transcendental, fluid, augmented and dense reality; Ethical rules and order become more important. At the lower level, at least in the national cyberspace, binding ethical codes need to be approved by the Majlis to become binding law. However, in the cyber space, the issue of disseminating information that is the nature of this environment seems to conflict with the right to privacy. The principles, rules and softwares of the cyber environment have been formulated primarily to facilitate and expedite communication. Whereas in the real environment, the core of morality is the provision of material and spiritual well-being. Thus, in cyber-space privacy violations, especially where the breach is merely cyber-infringement and not real-life cyberbullying, there appears to be an inherent philosophy of cyberspace that facilitates the enforcement of law, which facilitates Is the diffusion and exchange of information, Deterrence should be considered ethical as far as possible, but assumed that breach of privacy in cyberspace will result in material and intellectual damages to individuals; It used civil and criminal bail guarantees in response to them Manuscript profile
      • Open Access Article

        8 - Investigating privacy in the open spaces of traditional houses in Mazandaran using space syntax technique
        Rouhollah Rahimi Seyed Mohsen  Moosavi Mahdieh Beyshami Sahar  Amini Goharrizi
        Home is the most important place to restore peace and revitalize human life. It is a place to be with family, social interactions, relax, do favorite activities and get rid of daily human tensions. With the passage of time and the advancement of technology, many definit More
        Home is the most important place to restore peace and revitalize human life. It is a place to be with family, social interactions, relax, do favorite activities and get rid of daily human tensions. With the passage of time and the advancement of technology, many definitions of our daily lives have changed. A concept that is still firmly preserved is the concept of human privacy. Traditional Iranian architects have tried to design houses while maintaining the principles of privacy in open and closed spaces of houses, but over time, with the growth of apartment living, development of construction technology and the integration of Western culture with Iranian-Islamic culture, observance of privacy in homes, especially in open spaces, has declined. Mazandaran province is one of the regions that has undergone many inappropriate construction changes. The main purpose of this study is to investigate the role and knowledge of the components affecting the syntax of space on the open spaces of traditional houses in Mazandaran. This study seeks to find physical patterns of privacy in the open spaces of Mazandaran houses by extracting patterns of privacy in Mazandaran houses. In this research, first, through field studies, patterns are found and then, using the space syntax technique and Depthmap software, the indices of depth, connection and interconnection and isoust in the building will be studied. The results of the present study showed that open space has an important and fundamental role on the level of spatial privacy and also the geometry and location of the yard relative to the building has a double effect on the visibility of observers to different spaces of the house. In such a way that the yards that have irregular geometry and are located in the middle, back and side sections, the visibility of the entrance door to different parts of the house is minimized and also the privacy is increased by increasing the depth and caution index in traditional open house he does. Manuscript profile
      • Open Access Article

        9 - Mutual Continuous Lightweight Authentication Based on Node Prioritization Using Traffic Rates for Internet of Things
        reza sarabi miyanaji sam jabbehdari nasser modiri
        Today, billions of devices are connected via the Internet of Things, often through insecure communications. Therefore, security and privacy issues of these devices are a major concern. Since devices in IoT are typically resource-constrained devices, the security solutio More
        Today, billions of devices are connected via the Internet of Things, often through insecure communications. Therefore, security and privacy issues of these devices are a major concern. Since devices in IoT are typically resource-constrained devices, the security solutions of this environment in terms of processing and memory must be secure and lightweight. However, many existing security solutions are not particularly suitable for IoT due to high computation. So there is a need for a lightweight authentication protocol for IoT devices. In this paper, a mutual lightweight authentication protocol between nodes with limited resources and IoT servers is introduced that uses node prioritization based on traffic rates. This scheme is light due to the use of lightweight XOR and Hash operations. The proposed is resistant to cyber-attacks such as eavesdropping attack, and replay attack. The proposed is also secure using the AVISPA tool in the Dolev-Yao threat model. The security risks of this scheme are low compared to other lightweight methods. In addition, the proposal is compared with existing authentication schemes reduces the computational cost, protects privacy through anonymity of nodes, and provides forward secrecy. In our method, the execute time of authentication is reduced by 15% compared to the other methods. Manuscript profile
      • Open Access Article

        10 - Reviewing the Children's Privacy in the Family Considering Conditions of the Corona Pandemic
        zeinab meisami
        Background and Aim: Privacy is considered one of the most important dimensions related to children's rights, especially during the pandemic and quarantine, it is necessary to pay more attention to respecting it in the family environment. This research was done with the More
        Background and Aim: Privacy is considered one of the most important dimensions related to children's rights, especially during the pandemic and quarantine, it is necessary to pay more attention to respecting it in the family environment. This research was done with the aim of explaining the concept, examples and issues of child privacy in the family with emphasis on pandemic conditions. Method: The present research was done with descriptive-analytical method using library resources. Results: The Covid Pandemic highlights the need for new ways of thinking about data protection. This is especially true of child-related health research. Responsible use of children's information plays a key role in promoting children's health and guaranteeing their right to health and privacy. With the widespread outbreak of the coronavirus worldwide, governments have put protocols, such as quarantine, in place to reduce the prevalence of the virus. With children quarantined at home and social activities shut down, the home is no longer the only place to relax and socialize with family. With the limitation of children's daily activities to the home environment, the issue of respecting the child's privacy is becoming more and more important in various aspects. Conclusion: For many children, school, extracurricular classes, socializing with peers, fun, etc. are summarized at home. Concentrating children's activities at home does not mean that all aspects of a child's life are observable for parents; rather, it should be noted that the child still has privacy and all his/her rights in private solitude, physical privacy, information privacy, communication privacy and personal privacy are still protected. Manuscript profile
      • Open Access Article

        11 - The role of territorial behavior in improving the desirability of students' social interactions in academic environments (Case study: Shahid Rajaee University)
        MONA MOHAMMADI hamidreza azemati
        The desirability of students' social interactions plays a fundamental role in enhancing the quality of formal and informal academic spaces. The present study aims to investigate the territorial behavior in the academic environment concerning the concept of "boundary" to More
        The desirability of students' social interactions plays a fundamental role in enhancing the quality of formal and informal academic spaces. The present study aims to investigate the territorial behavior in the academic environment concerning the concept of "boundary" to improve students' social interactions. This study is applied and mixed-method research, in which a survey study is applied to A) evaluate the individuals' views and develop the objective table and contents. Through data collection and employing written sources and semi-structured interviews with psychology and architecture professors B) develop a visual questionnaire, according to the table and distribute them among the research population. In the present study, to fill out the questionnaire, 17 professors are interviewed, and 45 architecture students of Shahid Rajaee University are asked. Data are collected using interviews, observations, and questionnaires. The statistical population includes architecture students of Shahid Rajaee University. Also, the samples are selected by a cluster sampling technique. After classifying the obtained data using SPSS software, they are investigated and analyzed to extract desired boundaries from the students' views utilizing a t-test. Findings indicate that students consider in-between boundaries to be more desirable for spatial privacy in the presence of individuals and friendly gatherings. Manuscript profile
      • Open Access Article

        12 - Legal Protections of Children Under 8 on Instagram
        Fatemeh  abdi
        Background and Aim: Children are one of the most vulnerable sections of the society and are exposed to all kinds of abuses due to the violation of their rights. Also, children's privacy in cyberspace is a very important issue. In this research, at first, the relationshi More
        Background and Aim: Children are one of the most vulnerable sections of the society and are exposed to all kinds of abuses due to the violation of their rights. Also, children's privacy in cyberspace is a very important issue. In this research, at first, the relationship between the publication of children's pictures on Instagram by parents and their privacy, and then the damage of publishing children's pictures on their personality, was discussed, and then the scope of legal protection of children's privacy on Instagram was examined. The purpose of this research is to address the necessity of legal protection of children's privacy in cyberspace in order to maintain their mental health in the future. Method: This research has been done using documents and library resources and descriptive-analytical method. Results: Cyberspace is a mixture of opportunities and threats. Today, a number of parents by violating some of their children's rights such as image rights, increase the number of followers on their Instagram page and thereby attract advertisements and generate income. Also, the findings indicate that there are significant legal gaps in the field of protecting children's privacy in cyberspace, which will cause serious damage to the various aspects of the children's personality in the future. Conclusion: Supporting children is necessary and unavoidable due to their unequal position when playing a role in cyber space. The advancement of technology and stepping into the digital age requires the establishment of protective laws and specific legal mechanisms. Manuscript profile
      • Open Access Article

        13 - Secure Computing on the Internet of Everything
        Seyed Omid Azarkasb Seyed Hossein Khasteh
        With the advancement of technology and the remarkable growth of the Internet of Things (IoT), the need for secure computing in this domain has increased. The Internet of Everything enables the connection and communication among objects, data, processes, and individuals, More
        With the advancement of technology and the remarkable growth of the Internet of Things (IoT), the need for secure computing in this domain has increased. The Internet of Everything enables the connection and communication among objects, data, processes, and individuals, including systems, smart devices, industrial systems, and many others. With the immense number of connected objects, information security, and privacy have become significant challenges in IoT computing. This article explores the concept of secure computing in the Internet of Everything. It investigates the impact of the Internet of Things on the concept of security and its related needs. Furthermore, the methods and technologies used to establish secure computing in the Internet of Everything are discussed, including topics such as data encryption, identification and authentication, access management, privacy protection, and threat detection. Additionally, the challenges and drawbacks of secure computing in the Internet of Everything are examined, addressing issues such as the complexity of the connected environment, dynamic security threats, the need for standards and security-related concerns, and the influence of technological changes on secure computing. Finally, solutions and recommendations are provided to enhance secure computing in the Internet of Everything, including the use of strong encryption, centralized access management, user education and awareness, and advanced threat detection and monitoring systems. This article aims to provide a better understanding of secure computing in the Internet of Everything and to develop suitable security solutions for this domain. Manuscript profile
      • Open Access Article

        14 - Supporting Privacy of Individuals in View of Verses of Quran and Hadiths
        سجاد  شهباز قهفرخی
        Abstract The right to privacy is one of the most respected rights in all societies and Islamic teachings also emphasize it. Privacy is the state of being free from being observed, or one that the individual does not like to be revealed to others. People do not tolera More
        Abstract The right to privacy is one of the most respected rights in all societies and Islamic teachings also emphasize it. Privacy is the state of being free from being observed, or one that the individual does not like to be revealed to others. People do not tolerate others entering their private space and react to it. The existence of teachings in Islam like the need for respecting others’ inherent dignity, the necessity of keeping a secret, respect for others’ self-esteem on the one hand and the emphasis in verses and Hadiths on the unlawfulness of inquisitiveness in other people’s private life indicate the important position of the right of privacy in Islam’s legal system. In this research, conducted in descriptive-analytical method, the concept of privacy is clarified and its status in verses of the Quran and Hadiths (narrations from the infallibles (AS)) is investigated. Manuscript profile
      • Open Access Article

        15 - U.S. Judicial Opinion on Civil Liability Resulting from Breaches in Privacy
        Masoumeh  Mazaheri Mahsa Jamshidi Shahmiri
        Civil liability rights play a significant role in supporting privacy rights of people. Civil liability laws shall guarantee fair indemnification of losses sustained to people and shall prevent emergence of tort in the society. In U.S. law, along with conventional civil More
        Civil liability rights play a significant role in supporting privacy rights of people. Civil liability laws shall guarantee fair indemnification of losses sustained to people and shall prevent emergence of tort in the society. In U.S. law, along with conventional civil liability, modern civil liability has clarified the fundamentals and pillars of various types of civil liability resulting from breaches in privacy. This paper, developed through descriptive-analytical method, reviews fundamentals, pillars and exceptions of various types of civil liability resulting from breaches in privacy in the legal system of the United States. Findings of the paper indicate that in the civil liability resulting from breaches in privacy, the U.S. legal system has duly recognized privacy right as an independent right and has accordingly established an integrated judicial procedure related to civil liability resulting from breaches in privacy. Manuscript profile
      • Open Access Article

        16 - Explanation the role of standardization in the proposed solutions for privacy protection in health data
        batool mehrshad Mohammad mehraeen Mohammad Khansari saeed mortazavi
        Introduction: Due to the importance of data sharing in the digital era and the two main considerations related to it that are; standardization and privacy protection,this article aims to answer a critical question that is,does standardization play a role in the proposed More
        Introduction: Due to the importance of data sharing in the digital era and the two main considerations related to it that are; standardization and privacy protection,this article aims to answer a critical question that is,does standardization play a role in the proposed solutions for health data privacy protection? Methods: The present study is a systematic review conducted by searching databases such as Web of Science, PubMed, ScienceDirect, Springer, Magiran and SID and by applying a time limit filter.After applying the criteria for inclusion and exclusion and evaluating the results,relevant studies were selected. Findings: Articles addressing standardization and privacy protection in health data have been analyzed by taking 5 indicators into account. The need for standardization and its role to preserve privacy in health data have also been explained by examining the findings and discussing various laws related to privacy in the health field and its relationship with standardization.After the investigation,our study reveals that due to the technical structure of the fourth and fifth generation of health care, which has facilitated standardization, privacy protection can also be achieved through standardization.Finally,directions for future research on this topic are also suggested. Conclusion: The results of this research showed that the fourth- and fifth-generation health care systems that are technology-oriented; are formed based on standards,and these standards provide the possibility of their evaluation. Thus if laws related to health data privacy protection are developed based on standards,they will have a high execution guarantee. This further highlights the critical role of standard development organizations in this field. Manuscript profile
      • Open Access Article

        17 - Explanation of Standardization Role in the Proposed Solutions for Privacy Protection in Health Data
        batool mehrshad mohammad mehraeen Mohammad Khansari saeed mortazavi
        Due to the importance of data sharing in the digital era and the two main considerations related to it that are; standardization and privacy protection, this article aims to answer a critical question that is, does standardization play a role in the proposed solutions f More
        Due to the importance of data sharing in the digital era and the two main considerations related to it that are; standardization and privacy protection, this article aims to answer a critical question that is, does standardization play a role in the proposed solutions for health data privacy protection? The present study is a systematic review conducted by searching databases such as Web of Science, PubMed, ScienceDirect, Springer, Magiran and SID and by applying a time limit filter. After applying the criteria for inclusion and exclusion and evaluating the results, relevant studies were selected. Articles addressing standardization and privacy protection in health data have been analyzed by taking 5 indicators into account. The need for standardization and its role to preserve privacy in health data have also been explained by examining the findings and discussing various laws related to privacy in the health field and its relationship with standardization. After the investigation, our study reveals that due to the technical structure of the fourth and fifth generation of health care, which has facilitated standardization, privacy protection can also be achieved through standardization. Finally, directions for future research on this topic are also suggested. The results of this research shows that the fourth- and fifth-generation health care systems that are technology-oriented; are formed based on standards, and these standards provide the possibility of their evaluation. Thus if laws related to health data privacy protection are developed based on standards, they will have a high execution guarantee. This further highlights the critical role of standard development organizations in this field. Manuscript profile