2016
DOI: 10.1016/j.jnca.2016.06.001
|View full text |Cite
|
Sign up to set email alerts
|

PAgIoT – Privacy-preserving Aggregation protocol for Internet of Things

Abstract: Modern society highly relies on the use of cyberspace to perform a huge variety of activities, such as social networking or e-commerce, and new technologies are continuously emerging. As such, computer systems may store a huge amount of information, which makes data analysis and storage a challenge. Information aggregation and correlation are two basic mechanisms to reduce the problem size, for example by filtering out redundant data or grouping similar one. These processes require high processing capabilities… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 31 publications
(11 citation statements)
references
References 43 publications
0
11
0
Order By: Relevance
“…They introduced the Dummy Location Privacy-Preserving (DLP) algorithm which chooses the optimal dummy locations to prevent the attacker from extracting real users’ locations. Finally, Gonzalez-Manzano et al [16] designed PagIoT, a privacy-preserving aggregation protocol that contributes to the aggregation of data and the correlation between the values. However, the aforementioned protocols have not been tested to real-world operational environments that differ greatly from simulation environments and strong limitations have been assumed to evaluate these.…”
Section: Related Workmentioning
confidence: 99%
“…They introduced the Dummy Location Privacy-Preserving (DLP) algorithm which chooses the optimal dummy locations to prevent the attacker from extracting real users’ locations. Finally, Gonzalez-Manzano et al [16] designed PagIoT, a privacy-preserving aggregation protocol that contributes to the aggregation of data and the correlation between the values. However, the aforementioned protocols have not been tested to real-world operational environments that differ greatly from simulation environments and strong limitations have been assumed to evaluate these.…”
Section: Related Workmentioning
confidence: 99%
“…Several recent researches have been conducted for the privacy-preserving for the IoT based services [28][29][30][31][32][33][34][35][36]. In order to handle the massive amount of data, the most convincing solution is the federation of the IoT and cloud computing.…”
Section: Privacy-preserving For Iotmentioning
confidence: 99%
“…Henze, et al presented an user-driven privacy enforcement appraoch for cloud-based services in the IoT, which focuses on privacy preserving for individual end-users [28]. The authors in [29] proposed PAgIoT, a Privacy preserving Aggregation protocol suitable for IoT settings and enables multi-attribute aggregation for groups of entities while allowing for privacy-preserving value correlation. A lightweight privacy-preserving trust model had been designed for minimizing privacy loss in the presence of untrusted service providers, so that providers can be prevented from disclosing information to third parties for secondary uses [30].…”
Section: Privacy-preserving For Iotmentioning
confidence: 99%
“…PAgIoT is proposed, which is a privacy-preserving aggregation protocol. 9 In PAgIoT, data are decomposed into a set of attributes which are aggregated separately. A central node (sink) queries for the value of certain attributes, and remainder nodes respond depending on whether they possess or not these attributes.…”
Section: Related Workmentioning
confidence: 99%