2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications 2013
DOI: 10.1109/trustcom.2013.23
|View full text |Cite
|
Sign up to set email alerts
|

A Privacy-Preserved Joint Group Time Scheduling Mechanism for Mobile Social Applications

Abstract: In this paper, we develop a privacy preserving mechanism for a scheduling service for a group of users, which can compute the joint available time based on users' calendar information. We also propose a weighted voting game with partially homomorphic encryption (WVGPHE) scheme to protect the privacy of users' calendar information as well as users' weight. Even with the privacy protection, our experimental results show that the proposed scheme is still very computational and bandwidth efficient enough to provid… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2018
2018

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 21 publications
0
2
0
Order By: Relevance
“…As with other human activities that generate data, ensuring the privacy and confidentiality is important [3]. On the one hand, an enterprise would like to keep confidential the ongoing projects and people working on them, and, on the other, members of the group may wish to not be tracked by non-group members (for their meeting times, places, etc.).…”
Section: G Privacy and Confidentiality-preserved Calendar Activitiesmentioning
confidence: 99%
“…As with other human activities that generate data, ensuring the privacy and confidentiality is important [3]. On the one hand, an enterprise would like to keep confidential the ongoing projects and people working on them, and, on the other, members of the group may wish to not be tracked by non-group members (for their meeting times, places, etc.).…”
Section: G Privacy and Confidentiality-preserved Calendar Activitiesmentioning
confidence: 99%
“…There have been some researches on the design of secure weighted voting protocol by adopting cryptographic approach such as homomorphic encryption (Nakanishi et al 2004;Chen, Lin, and Wang 2013;Zhang et al 2016), but these works have limits on the controlled assumption about collusion, and/or on the setting of additional trusted servers.…”
Section: Introductionmentioning
confidence: 99%