2019
DOI: 10.1109/tmc.2018.2861765
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Crowd-Sourced Statistical Data Publishing with An Untrusted Server

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
43
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 110 publications
(43 citation statements)
references
References 22 publications
0
43
0
Order By: Relevance
“…Leveraging agents is also considered to cope with the untrusted nature of MCS servers. With this in mind, the authors of Reference [77] propose a distributed agent-based strategy to ensure a certain level of privacy where crowd-sourced data goes through every agent following perturbation of aggregated statistics at the agents.…”
Section: Agent-based Strategiesmentioning
confidence: 99%
“…Leveraging agents is also considered to cope with the untrusted nature of MCS servers. With this in mind, the authors of Reference [77] propose a distributed agent-based strategy to ensure a certain level of privacy where crowd-sourced data goes through every agent following perturbation of aggregated statistics at the agents.…”
Section: Agent-based Strategiesmentioning
confidence: 99%
“…Many existing systems depend on the trusted server to collect the spatio-temporal crowd data [56] to disturb the collective statistics by using differential privacy mechanism in order to provide strong privacy. If the server gets hacked the privacy of users will be revealed.…”
Section: Measures For Security Specific To Untrusted Server and Imagementioning
confidence: 99%
“…Distributed agent-based privacy-preserving framework Privacy preservation for Untrusted Server [56] Identity-based Encryption Security [57] Grouper framework without trusted central servers Security [58] Privacy preserving SIFT Image Feature Extraction with Privacy preservation [59] Securing SIFT Image Feature Extraction with Privacy preservation [60]…”
Section: Proposed Work Focus Referencesmentioning
confidence: 99%
See 1 more Smart Citation
“…Due to the broadcast nature, signals from any transmitter are shared by all access receivers, which means interference channels are exposed to security risks of eavesdropping attacks. Traditionally, secure communications are achieved by using encryption algorithms [2][3]. However, with the rapid development of computing speed, once quantum computers are put into practice, traditional cryptography will be greatly challenged by brute force of quantum computing.…”
Section: Introductionmentioning
confidence: 99%