2017
DOI: 10.1109/access.2017.2748956
|View full text |Cite
|
Sign up to set email alerts
|

PCP: A Privacy-Preserving Content-Based Publish–Subscribe Scheme With Differential Privacy in Fog Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
30
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
4
1

Relationship

2
7

Authors

Journals

citations
Cited by 56 publications
(31 citation statements)
references
References 37 publications
0
30
0
Order By: Relevance
“…To be more specific, in Liang et al 's scheme [14], the number of pairing and exponentiation operations in both search and decryption phases increases linearly with the complexity of access policy hidden in the ciphertext and the ciphertext size also follows the linear relationship with the complexity of access policy. Although the scheme [15] improves the search efficiency compared to [14], it does not solve the prohibitive computation and communication cost problem like [14,22]. Besides, this scheme only provides data users with search function but does not support data sharing.…”
Section: Related Workmentioning
confidence: 99%
“…To be more specific, in Liang et al 's scheme [14], the number of pairing and exponentiation operations in both search and decryption phases increases linearly with the complexity of access policy hidden in the ciphertext and the ciphertext size also follows the linear relationship with the complexity of access policy. Although the scheme [15] improves the search efficiency compared to [14], it does not solve the prohibitive computation and communication cost problem like [14,22]. Besides, this scheme only provides data users with search function but does not support data sharing.…”
Section: Related Workmentioning
confidence: 99%
“…Similarly, Basudan et al [72] present an encryption scheme to ensure privacy when monitoring road conditions. Other works explore privacy-preserving publish-subscribe mechanisms at the edge [73] or how edge infrastructures can help in the dissemination of information containing certificate revocations [74].…”
Section: A Promises Benefits and Drawbacks Of Edge Computingmentioning
confidence: 99%
“…Therefore, we assume that the variation of monitoring data conform to t-distribution [51]. Then, the compliance interval can be constructed by (10) and (11):…”
Section: Compliance Assessmentmentioning
confidence: 99%
“…Nevertheless, there is little literature on the IoT security and compliance assessment [8]. The traditional existing literatures with respect to security of IoT focus on dealing with wireless networks [2,9,10]. Therefore, the premise of securing the cloud-based IoT context is to evaluate the security and compliance of cloud service.…”
Section: Introductionmentioning
confidence: 99%