2014
DOI: 10.1007/978-3-319-12280-9_20
|View full text |Cite
|
Sign up to set email alerts
|

Private and Dynamic Time-Series Data Aggregation with Trust Relaxation

Abstract: Abstract. With the advent of networking applications collecting user data on a massive scale, the privacy of individual users appears to be a major concern. The main challenge is the design of a solution that allows the data analyzer to compute global statistics over the set of individual inputs that are protected by some confidentiality mechanism. Joye et al. [8] recently suggested a solution that allows a centralized party to compute the sum of encrypted inputs collected through a smart metering network. The… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
18
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
6
3
1

Relationship

1
9

Authors

Journals

citations
Cited by 40 publications
(19 citation statements)
references
References 11 publications
1
18
0
Order By: Relevance
“…There have been several studies on privacy preserving aggregation such as [7,11,17] whereby all players are considered as honest-but-curious. In [12], authors study a stronger threat model in which the adversary is the aggregator and may tamper with the aggregated result.…”
Section: Related Workmentioning
confidence: 99%
“…There have been several studies on privacy preserving aggregation such as [7,11,17] whereby all players are considered as honest-but-curious. In [12], authors study a stronger threat model in which the adversary is the aggregator and may tamper with the aggregated result.…”
Section: Related Workmentioning
confidence: 99%
“…Reference [18] propose a solution with a fully trusted dealer which may not be suitable for real world applications due to increased communication overheads necessary for their static key management scheme. Emerging work in [19] proposes to eliminate the need for key redistribution following a user join or leave as well as the need for fully trusted key dealer thus moving to a more P2P paradigm which is core to our approach too.…”
Section: Mobile Information Systemsmentioning
confidence: 99%
“…Joye and Libert [15] proposed a solution to efficiently decrypt the sum based on the idea of splitting the exponent. Leontiadis et al [16] introduced a secure protocol for aggregation of time-series data that is based on Joye's scheme [15] and the requirements for key updates and for the trusted dealer are eliminated. The main idea of it is to introduce a semitrusted collector which plays the role of an intermediary between the users and the aggregator.…”
Section: Related Workmentioning
confidence: 99%