2015
DOI: 10.1109/tmc.2014.2352253
|View full text |Cite
|
Sign up to set email alerts
|

Privacy and Quality Preserving Multimedia Data Aggregation for Participatory Sensing Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
36
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 67 publications
(36 citation statements)
references
References 51 publications
0
36
0
Order By: Relevance
“…SLICER integrates a data coding technique and message transfer strategies to support strong protection of participants' privacy, while maintaining high data quality [111].…”
Section: Secure and Privacy-preserving Data Reportingmentioning
confidence: 99%
“…SLICER integrates a data coding technique and message transfer strategies to support strong protection of participants' privacy, while maintaining high data quality [111].…”
Section: Secure and Privacy-preserving Data Reportingmentioning
confidence: 99%
“…In [11]'s work, they using erasure code technology to slice the sensing data in their SLICER framework to meet the k-anonymity requirement. They take the sensing data as entirety and then using the erasure coding technology to code the sensing data which is inspired us.…”
Section: Sensing Data Slicing Solutionmentioning
confidence: 99%
“…In our work, we use RS code for the sensing data slicing work. Different from [11]'s work, the location data will be replaced by location anonymous algorithm like before the slicing step. That because the location is one of the most sensitive data, if the accurate location can be anonymous after data sensing step, it means that if the data slice are obtained by illegible users, they cannot acquired the true location data.…”
Section: Sensing Data Slicing Solutionmentioning
confidence: 99%
“…For example, a house agency may know Bob desire to buy a house in a particular area if Bob releases tasks to collect traffic condition and noise level in the neighborhood. To preserve the privacy for both customers and mobile users, several privacy-preserving mobile crowdsensing schemes [10], [11], [12], [13] have been proposed by utilizing anonymity techniques. Nevertheless, anonymity is insufficient for privacy preservation, since the mobile users may be traced from travel routes and social relations.…”
Section: Introductionmentioning
confidence: 99%