2017
DOI: 10.1109/tii.2017.2695487
|View full text |Cite
|
Sign up to set email alerts
|

Mutual Privacy Preserving $k$ -Means Clustering in Social Participatory Sensing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
47
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 109 publications
(47 citation statements)
references
References 21 publications
0
47
0
Order By: Relevance
“…1) Data Privacy: Analytics methods for data privacy is a new perspective except for communication architecture, such as the design of privacy-preserving clustering algorithm [211] and PCA algorithm [212]. A strategic battery storage charging and discharging schedule was proposed in [213] to mask the actual electricity consumption behavior and alleviate the privacy concerns.…”
Section: E Data Privacy and Securitymentioning
confidence: 99%
“…1) Data Privacy: Analytics methods for data privacy is a new perspective except for communication architecture, such as the design of privacy-preserving clustering algorithm [211] and PCA algorithm [212]. A strategic battery storage charging and discharging schedule was proposed in [213] to mask the actual electricity consumption behavior and alleviate the privacy concerns.…”
Section: E Data Privacy and Securitymentioning
confidence: 99%
“…A safe allocation sample pointing to the nearest clustering center algorithm was proposed by Xing. 19 Vaidya and Clifton 20 proposed a privacy-preserving k-means algorithm for vertically segmenting data.…”
Section: Related Workmentioning
confidence: 99%
“…Without loss of generality, we assume that these n-1 participants are denoted by a 1 , a 2 , … , a n−1 ; they combine their information to compute the distance, after which they can calculate the cluster center according to distance U 1 . All of these n-1 colluding participants can construct the following (19) by using the received data from cloud service A and their own data.…”
Section: Collusion Among the Participantsmentioning
confidence: 99%
See 1 more Smart Citation
“…However, SPRING depends on a trusted third party (the agent). In [6][7][8][9][10], homomorphic encryption [11][12][13] is employed to hid each bidder's bidding values with a vector of cipher texts, and ensures the auctioneer to figure out the maximum value, and charge the bidders securely. However, the homomorphic encryption has a higher computational cost, which is not practical now.…”
Section: Introductionmentioning
confidence: 99%