2019
DOI: 10.1109/jiot.2018.2874473
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Preserving Data Aggregation Scheme for Mobile Edge Computing Assisted IoT Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
120
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 177 publications
(120 citation statements)
references
References 34 publications
0
120
0
Order By: Relevance
“…IoT devices are responsible for acquiring, storing, and transferring data. Currently, many IoT devices are located on the edge of a network and lack of protection measures to resist various attacks [38][39][40][41][42][43]. Therefore, these devices are more vulnerable to some attacks, such as device theft, device manipulation, identity theft, data eavesdropping and so on.…”
Section: Resultsmentioning
confidence: 99%
“…IoT devices are responsible for acquiring, storing, and transferring data. Currently, many IoT devices are located on the edge of a network and lack of protection measures to resist various attacks [38][39][40][41][42][43]. Therefore, these devices are more vulnerable to some attacks, such as device theft, device manipulation, identity theft, data eavesdropping and so on.…”
Section: Resultsmentioning
confidence: 99%
“…In [3] a scheme for privacy preserving data aggregation is proposed by Xiong Li et al for mobile computing edge assisted IoT applications , where there is a necessity of privacy of data at terminal level. This approach involves three devices namely terminal device, edge server and the public cloud center.…”
Section: Related Workmentioning
confidence: 99%
“…Hence it is suggested to have more VMs for a higher number of user nodes for efficient performance of the approach. We have compared the efficiency of our proposed EPAS scheme with few existing approaches [2,3].These approaches also proposes data aggregation methods for cloud environment and have been discussed in section II. The total time taken for the approaches compared includes time taken for encryption in user nodes, data transfer timebetween the user nodes and cloudsim and the time taken for decryption and aggregation in Data Center.…”
Section: Fig 4 Time Taken For Pgene Data Aggregation V/s Number Of Nmentioning
confidence: 99%
See 1 more Smart Citation
“…The network enriches the way people access information, and technologies such as wireless sensor networks (WSN) [1][2][3][4], multi-hop wireless networks [5,6], and the Internet of Things (IoT) [7][8][9] have greatly advanced the intelligence level of peoples' lives. Benefiting from the development of telecommunication technologies such as 4G, 5G, and Wi-Fi, wireless and mobile communication [10][11][12] have become the most popular means of communication.…”
Section: Introductionmentioning
confidence: 99%