2020
DOI: 10.1109/tetc.2017.2771251
|View full text |Cite
|
Sign up to set email alerts
|

privy: Privacy Preserving Collaboration Across Multiple Service Providers to Combat Telecom Spams

Abstract: Nuisance or unsolicited calls and instant messages come at any time in a variety of different ways. These calls would not only exasperate recipients with the unwanted ringing, impacting their productivity, but also lead to a direct financial loss to users and service providers. Telecommunication Service Providers (TSPs) often employ standalone detection systems to classify call originators as spammers or non-spammers using their behavioral patterns. These approaches perform well when spammers target a large nu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
8

Relationship

3
5

Authors

Journals

citations
Cited by 21 publications
(10 citation statements)
references
References 38 publications
0
10
0
Order By: Relevance
“…This method is used to preserve the data from unauthorized disclosure during transmission. The aim of the method is to make the data difficult to understand by malicious entities [24], [25], [26], [27], [28], [29], [30], [31], [32], [33], [34], [35], [36], [37], [38], [39]. Kao et.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…This method is used to preserve the data from unauthorized disclosure during transmission. The aim of the method is to make the data difficult to understand by malicious entities [24], [25], [26], [27], [28], [29], [30], [31], [32], [33], [34], [35], [36], [37], [38], [39]. Kao et.…”
Section: Related Workmentioning
confidence: 99%
“…al. [34], [35] for the effective blocking of spammers who target multiple TSPs. The systems have evaluated the performance using the synthetic and real call detail records.…”
Section: Related Workmentioning
confidence: 99%
“…The establishment of pairwise secure channels is complex to realize in practice [19]. For these reasons, researchers normally propose specific MPC solutions to efficiently solve specific problems, e.g., e-voting [18], secure network statistics aggregation [1,2,8,16], secure function computation [12] and secure auctions [23] etc.…”
Section: Multiparty Computationmentioning
confidence: 99%
“…The PrivBox system can also be applied in other domains such as collaborative intrusion detection systems [26,27], where multiple Internet service providers could collaborate for the effective and early identification of attackers; collaborative filtering of spammers in online social networks, where multiple service providers collaborate with each other [28,29,30,31] for the quick detection of stealthy and smart spammers; and the private statistics aggregation in the private and secure surveys [32,33]. Currently, the trustworthiness of a cloud marketplace is estimated based on the service level agreement by the cloud service provider; however, it is necessary that the trustworthiness estimation should be take into account feedback from consumers of the cloud provider.…”
Section: Introductionmentioning
confidence: 99%