2020
DOI: 10.1002/ett.3900
|View full text |Cite
|
Sign up to set email alerts
|

Fog computing‐based privacy preserving data aggregation protocols

Abstract: As the number of active Internet of Things (IoT) devices increases, managing and securing the enormous amount of data generated by these devices become harder. With their always-connected smart meters and internet-enabled electrical appliances, smart grids (SGs) are major data generation sources in IoT. Traditional SGs store and process their collected data in centralized cloud servers. Secure data aggregation (SDA) protocols play an essential role in efficient and private data collection and storage in cloud-… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
8
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 68 publications
0
8
0
Order By: Relevance
“…Result of extensive performance evaluation and analysis shows that in comparison to cloudassisted schemes which involves no data aggregation the proposed protocols are far superior considering data transmission and storage efficiency. Besides, it was verified in privacy analysis that these two protocols ensure each layer's data privacy in an effective way [12].…”
Section: Related Workmentioning
confidence: 97%
See 1 more Smart Citation
“…Result of extensive performance evaluation and analysis shows that in comparison to cloudassisted schemes which involves no data aggregation the proposed protocols are far superior considering data transmission and storage efficiency. Besides, it was verified in privacy analysis that these two protocols ensure each layer's data privacy in an effective way [12].…”
Section: Related Workmentioning
confidence: 97%
“…Now this time is to use the Calculate the Dynamic key using calculation matrix and formula for this is like Step Dynamic key (x) = calculation matrix [key(x)] [Plain text(x)]For every character of plain text and key we will trace character for dynamic key. By taking the key in X-axis and Plain text in Y-Axis Taking this example forward as we have the Numeric Plain text as[22,1,12, 21,5, 19]…”
mentioning
confidence: 99%
“…Take the first pass as an example, as the first super-bin corresponds to the two least significant bits, pattern is initialized as (Line 5 in Algorithm 2): pattern ←0000 … 000011 (64-bit) By conducting bitwise AND operation over pattern and each column imprint (ie, imps[i]), we can determine whether corresponding cacheline contains values that fall into the first partition. If positive, each value v in that cacheline is accessed, and only probed when v is within the range of the first partition, that is, (− ∞,bins [1]). After examining all the imprints, pattern is modified and ready for the next pass.…”
Section: Multi-passmentioning
confidence: 99%
“…The volume of data collected from those edge devices are huge and thus big data processing becomes an emerging topic in telecommunication fields these years. And in such a big data scenario, many researchers has studied data aggregation, 1 data indexing, 2 data communication, 3 data collection, 4 and data sharing 5 in emerging telecommunication fields. Beside those data techniques, data storing has also attracted wide attentions, and it has witnessed the increasing popularity of modern main-memory column-stores like SAP HANA, 6 MonetDB, 7 Vectorwise, 8 and Oracle Exalytics.…”
Section: Introductionmentioning
confidence: 99%
“…After the introduction of FOG computing by Cisco [1], considering the capability of FOG to provide computing at the edge of the network while preserving the advantages of cloud computing such as ubiquity, decentralized management, and so on, FOG-assisted CPS (FOG-CPS) [2][3][4][5][6][7][8] is emerging as a new research domain to address the data management issues of CPS.…”
Section: Introductionmentioning
confidence: 99%