2021
DOI: 10.1016/j.future.2021.07.027
|View full text |Cite
|
Sign up to set email alerts
|

Cloud-based privacy- and integrity-protecting density peaks clustering

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 27 publications
0
3
0
Order By: Relevance
“…Now, more and more people begin to use cloud computing, and various applications based on cloud platforms emerge in endlessly. Baidu cloud disk, 360 cloud disk, and other applications are becoming more and more popular, which also confirms this situation [7]. However, because the application data in the cloud platform are stored in the server, in this case, if the system data is lost or damaged, it will have a disastrous impact on a large number of users [8].…”
Section: Cloud Computing Technology Has Been Involved In Manymentioning
confidence: 76%
“…Now, more and more people begin to use cloud computing, and various applications based on cloud platforms emerge in endlessly. Baidu cloud disk, 360 cloud disk, and other applications are becoming more and more popular, which also confirms this situation [7]. However, because the application data in the cloud platform are stored in the server, in this case, if the system data is lost or damaged, it will have a disastrous impact on a large number of users [8].…”
Section: Cloud Computing Technology Has Been Involved In Manymentioning
confidence: 76%
“…The Brakerski/Fan-Vercauteren (BFV) plan [29] is the most effective fully homomorphic encryption program and encourages arbitrary multiplication and addition to encrypted messages [30]. The elegant/simple BFV approach performs well in cloud-based and secure technology [31,32].…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, DSNs are widely used due to their significant advantages, such as flexible nodes, reliable transmission, multiple data transmission paths, and simple network layout [5]. In multisensor information fusion systems, both centralized and distributed architectures are commonly employed [6][7][8][9]. In a centralized data fusion structure, sensor data are sent directly to the data fusion center for processing, which minimizes information loss.…”
Section: Introduction 1backgroundmentioning
confidence: 99%