2019
DOI: 10.1109/tsp.2018.2880722
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Preserving Collaborative Computing: Heterogeneous Privacy Guarantee and Efficient Incentive Mechanism

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 40 publications
(20 citation statements)
references
References 40 publications
0
20
0
Order By: Relevance
“…Docker, Kubernetes. A two phased framework supporting heterogeneous privacy for personal data was proposed in [9]. The nodes hosting user data utilised one-shot noise perturbation to reach heterogeneous privacy protection over various data servers.…”
Section: Fig 1: Overview Of the Research Approachmentioning
confidence: 99%
“…Docker, Kubernetes. A two phased framework supporting heterogeneous privacy for personal data was proposed in [9]. The nodes hosting user data utilised one-shot noise perturbation to reach heterogeneous privacy protection over various data servers.…”
Section: Fig 1: Overview Of the Research Approachmentioning
confidence: 99%
“…Afifi and Zhou et al in [9] constructed a new multivariate privacy feature quantification model, analyzed the sensitivity of identifiers, and proposed two different measurement methods to quantify privacy disclosure; however, there is a lack of optimization research on the information publication. Wang and He et al in [10] proposed a two-stage framework to calculate the average value, which can achieve the optimal calculation accuracy on the premise of meeting the privacy requirements; however, the influence of the node on the calculation accuracy still needed further study.…”
Section: A Privacy Metrics and Managementmentioning
confidence: 99%
“…ij q represents the ith service and jth attribute, we can get the following expression: (9) In the attributes matrix QoS , the larger the value of some attributes, the lower the quality of service; the larger the value of some attributes, the higher the quality of service, such as confidentiality, reliability, etc. These values need to be normalized, each element in the QoS can be normalized in formula (10): The normalized attribute value is used to calculate the QoS , as shown in formula (11):…”
Section: A Service Trustmentioning
confidence: 99%
“…Another recent contribution [34] proposes a hybrid architecture where a set of servers collect data from a set of nodes and compute the average. The paper focuses on providing nodes with heterogeneous privacy guarantees with respect to different privacy violators.…”
Section: Averaging Performancementioning
confidence: 99%