2021
DOI: 10.1109/jiot.2020.3026366
|View full text |Cite
|
Sign up to set email alerts
|

LDP-Based Social Content Protection for Trending Topic Recommendation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
14
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(14 citation statements)
references
References 41 publications
0
14
0
Order By: Relevance
“…The storage of these private and sensitive information (e.g., user profiling) of massive users in cloud servers or edge devices may also raise privacy disclosure issues. For example, hackers may deduce users' privacy information by frequent queries via differential attacks [40] and even compromise the cloud/edge storage via DDoS attacks [43].…”
Section: Privacy Threatsmentioning
confidence: 99%
“…The storage of these private and sensitive information (e.g., user profiling) of massive users in cloud servers or edge devices may also raise privacy disclosure issues. For example, hackers may deduce users' privacy information by frequent queries via differential attacks [40] and even compromise the cloud/edge storage via DDoS attacks [43].…”
Section: Privacy Threatsmentioning
confidence: 99%
“…In metaverse systems, massive private and sensitive user data collected from various XR devices (e.g., helmets) are transferred via wired and wireless communications, the confidentiality of which should be prohibited from unauthorized individuals/services. Although communications are encrypted and information is confidentially transmitted, adversaries may still access the raw data by eavesdropping on the specific channel and even track users' locations via differential attacks [40] and advanced inference attacks [41].…”
Section: Privacy Threatsmentioning
confidence: 99%
“…3) Privacy-Preserving UGC Sharing and Processing: Existing privacy-preserving schemes for data sharing and processing mainly focus on four fields: differential privacy (DP), federated learning (FL), cryptographic approaches (e.g., secure multiparty computation (SMC), homomorphic encryption (HE), and zero-knowledge proof (ZKP)), and trusted computing. The following works [40], [91]- [94] discuss privacy-preserving UGC sharing in the metaverse. To offer privacy-preserving trending topic recommendation services in the metaverse, Wei et al [40] propose a graph-based local DP mechanism, where a compressive sensing indistinguishability method is devised to produce noisy social topics to prevent user-linkage association and protect keyword correlation privacy with high efficiency.…”
Section: B Data Managementmentioning
confidence: 99%
See 1 more Smart Citation
“…Table II lists some of the common computing tasks in SIoT and the literature of social-aware solutions. Trust management in SIoT [44], [45], [46], [47], [48], [49], [16], [50] Establishing trust between SIoT devices for social clustering and social community detection Social features extractions and classification [39], [38], [51], [52] Assigning social properties such as personality traits, mood, emotions and interest to SIoT users Social relationships management in SIoT [53], [54], [55], [56], [57], [58], [59] Maintaining the user-user, user-device and devicedevice social relationship history and logging the relationship properties and preferences Social-aware recommendation system in SIoT [43], [60], [61], [62], [63], [64] Services recommendation and content customization based on the social properties of SIoT entities Security and privacy in SIoT [65], [66], [67], [68], [69] Securing and preserving the privacy of social data and social context…”
Section: A Asi In Computingmentioning
confidence: 99%