Privacy Requirement Engineering Based on Modified Evidence Combination Approach 

Abstract

A major challenge in the field of software engineering is to make users trust the software that they use in their every day professional or recreational activities. Trusting software depends on various elements, one of which is the protection of user privacy. Protecting privacy can be defined as the right to determine when, how and to what information about them extends is communicated to others. The paper introduces the Privacy Safeguard (PriS) method. The method aims to include privacy requirements early in the system development process. Each privacy requirement is treated as a separate goal to be met during the system design process. The PriS method can be extended to address the degree of participation of every privacy requirements. It can be done by fuzzifiying privacy variables that maps degree of participation of each privacy variables to the [0, 1] interval. Dempster Shafer rule of combination is proposed to combine the evidences needed to select the implementation of the privacy requirement. A modified combination rule is proposed based on ambiguity measure (AM). The combination results based on the proposed approach can be more reasonable. 

Authors and Affiliations

Nithya V. P , R. Subha

Keywords

Related Articles

A Survey on Image Mining Techniques for Image Retrieval

Image mining is an expansion of data mining in the field of image processing. Image mining handles with the hidden knowledge extraction, image data association and additional patterns which are not clearly gathered i...

POLY HYBRID CRYPTOGRAPHY 

This research paper discusses the Poly Hybrid Cryptography which is the science of data encryption, a technology that provides for a safe, secure, and private information exchange. It is the combination of many cryptog...

Energy Efficient Protocol for Clustered Cooperative Sensor Network

Energy efficiency is the major problem in wireless sensor networks. We introduced the Cooperative communication protocol in wireless sensor networks (WSN) for establishment of cooperative clusters during transmission of...

Design Of ARM Based Face Recognition System using Open CV Library  

Face Recognition is a very active research area specializing on how to recognize faces within images or videos. Face recognition compliments Face Detection. Face Detection is the process of finding a 'face' within...

Improving the Efficiency of Ranked keyword Search over Cloud Data

In this paper we define and solve the effective yet secure ranked keyword search over encrypted cloud data. We used order preserving symmetric encryption to protect the cloud data. Even though there are lots of searching...

Download PDF file
  • EP ID EP93590
  • DOI -
  • Views 122
  • Downloads 0

How To Cite

Nithya V. P, R. Subha (2013). Privacy Requirement Engineering Based on Modified Evidence Combination Approach . International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 2(2), 600-605. https://europub.co.uk/articles/-A-93590