2015 IEEE 39th Annual Computer Software and Applications Conference 2015
DOI: 10.1109/compsac.2015.94
|View full text |Cite
|
Sign up to set email alerts
|

DHT Extension of m-Cloud -- Scalable and Distributed Privacy Preserving Statistical Computation on Public Cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 2 publications
0
6
0
Order By: Relevance
“…Decentralized Maintenance: Maintenance of the DHT overlay and its connectivity in the edge computing solutions like [12], is done through a centralized registry. Each node registers itself to the registry server upon joining the system.…”
Section: Open Problemsmentioning
confidence: 99%
See 3 more Smart Citations
“…Decentralized Maintenance: Maintenance of the DHT overlay and its connectivity in the edge computing solutions like [12], is done through a centralized registry. Each node registers itself to the registry server upon joining the system.…”
Section: Open Problemsmentioning
confidence: 99%
“…The DHT construction protocols, however, are meant for decentralization [1], [3], i.e., a DHT overlay is capable of being constructed in a fully decentralized way by its participating nodes invoking the insertion protocol independently of each other. However, the fundamental challenge is to stabilize the constructed DHT overlay addressing the heterogeneous dynamics of the nodes in their online and offline states, which is basically handled by the centralized registry in the aforementioned solutions (i.e., [12]). Addressing the centralization problem and providing decentralized overlay construction and maintenance through the decentralized DHT stabilization algorithms [120], [121] may be considered as a potential research direction.…”
Section: Open Problemsmentioning
confidence: 99%
See 2 more Smart Citations
“…Highlighted IoT Privacy Threats cryptographic algorithms, control access management tools, data minimization techniques, and privacy or context awareness protocols (Table I). [1], [67], [44], [36], [18], [53], [22], [5], [64], [30], [7], [13], [77], [59], [73] Data minimization 3 [15], [7], [59] Access control 6 [1], [31], [30], [13], [39], [59] Privacy awareness or context awareness 12 [1], [31], [55], [5], [81], [7], [71], [70], [77], [69], [59], [8] Differential Privacy 0 Other (introspection, trust assessment and evaluation) 3 [34], [6], [40] Not Evaluated Cryptographic techniques and information manipulation 16 [24], [25], [79], [9], [20], [51], [41], [54], [43], [26], [...…”
Section: Threats Solutions Principles Perceptionsmentioning
confidence: 99%