2018
DOI: 10.1007/978-3-319-94268-1_14
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Privacy-Preserving Data Aggregation Scheme for IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 29 publications
0
8
0
Order By: Relevance
“…Then the immediate result after computation is reported to the aggregator. Analysis signifies that both data integrity and confidentiality can be achieved here thus it helps to defy external, internal and colluding attack, and likewise [18].…”
Section: Related Workmentioning
confidence: 99%
“…Then the immediate result after computation is reported to the aggregator. Analysis signifies that both data integrity and confidentiality can be achieved here thus it helps to defy external, internal and colluding attack, and likewise [18].…”
Section: Related Workmentioning
confidence: 99%
“…We consider the architecture in Figure 1 as the basis of our following discussion. Figure 1 reproduced from Hu et al [44]. ere are three entities, including server, aggregator, and devices in our system model of the proposed schemes.…”
Section: System Modelmentioning
confidence: 99%
“…e previous work [44] was published in International Conference on Wireless Algorithms, Systems, and Applications 2018.…”
Section: Data Availabilitymentioning
confidence: 99%
“…Their construction relies on fog nodes computation resources to perform heavy computation-consuming functions. Later, Hu et al introduced a privacy preserving data aggregation scheme for IoT applications [10]. The proposed scheme relies on Secure Multiparty Computation (SMC) techniques, such that each device has to first divide sensory data, locally keeps one piece, and sends the remaining pieces to other group devices.…”
Section: Related Workmentioning
confidence: 99%
“…Then each IoT device adds the received shares and the held piece together to get immediate result. The [10] construction provides heavy computation and communication costs. Hence, it makes it unsuitable for resource-constrained devices.…”
Section: Related Workmentioning
confidence: 99%