2019
DOI: 10.1109/jsac.2019.2904349
|View full text |Cite
|
Sign up to set email alerts
|

P2DCA: A Privacy-Preserving-Based Data Collection and Analysis Framework for IoMT Applications

Abstract: The concept of Internet of Multimedia Things (IoMT) is becoming popular nowadays, and can be used in various smart city applications, such as traffic management, ehealth, and surveillance. In IoMT applications, multimedia data is generated from devices with sensing capabilities, e.g., Multimedia Sensor Nodes (MSNs). These devices come with limited computational and storage resources, and cannot hold captured multimedia data for a long time if the connection between a base station and cloud server is down. In t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
35
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 69 publications
(36 citation statements)
references
References 45 publications
1
35
0
Order By: Relevance
“…The performance analysis indicates that the proposed framework is secured and effective. Another privacy-based data collection framework was proposed by Usman et al [97]. The result reveals that the proposed framework can be beneficial in collecting multimedia data in applications.…”
Section: Data Collection In Iotmentioning
confidence: 96%
“…The performance analysis indicates that the proposed framework is secured and effective. Another privacy-based data collection framework was proposed by Usman et al [97]. The result reveals that the proposed framework can be beneficial in collecting multimedia data in applications.…”
Section: Data Collection In Iotmentioning
confidence: 96%
“…The result shows some promise. A framework named an efficient privacy-preserving-based data collection and analysis (P2DCA) for IoMT applications was proposed by Usman et al [44]. Hence, the proposed framework is aimed to protect against privacy issues when collecting data to the cloud.…”
Section: B Rq2:what Are the Contributions Been Proposed By The Selecmentioning
confidence: 99%
“…Later, we may use artifact to denote artifact class since we focus on the model level in this work. In the age of cloud computing, workflows are often deployed in cloud, in which data security is especially significant. Thus, the privacy property of data is considered in the specification.…”
Section: Formal Model For Artifact‐centric Business Processesmentioning
confidence: 99%
“…An artifact object O = (id, , q) is initial if q = s 0 (initial state) and is undefined for every data attribute and final if q ∈ F. Later, we may use artifact to denote artifact class since we focus on the model level in this work. In the age of cloud computing, workflows are often deployed in cloud, [19][20][21][22][23][24][25][26] in which data security is especially significant.…”
Section: Definition 1 (Artifact Class)mentioning
confidence: 99%