2019
DOI: 10.1155/2019/3985232
|View full text |Cite
|
Sign up to set email alerts
|

Two Secure Privacy-Preserving Data Aggregation Schemes for IoT

Abstract: As the next generation of information and communication infrastructure, Internet of Things (IoT) enables many advanced applications such as smart healthcare, smart grid, smart home, and so on, which provide the most flexibility and convenience in our daily life. However, pervasive security and privacy issues are also increasing in IoT. For instance, an attacker can get health condition of a patient via analyzing real-time records in a smart healthcare application. Therefore, it is very important for users to p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
11
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 25 publications
(11 citation statements)
references
References 45 publications
0
11
0
Order By: Relevance
“…Security is one of the important factors that must be considered when developing IoT-based healthcare systems [5,6]. This section describes the popular research projects on secure data aggregation of IoT-based healthcare applications.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Security is one of the important factors that must be considered when developing IoT-based healthcare systems [5,6]. This section describes the popular research projects on secure data aggregation of IoT-based healthcare applications.…”
Section: Related Workmentioning
confidence: 99%
“…These applications can be used to generate big data to provide new services to citizens, businesses, and public administrations to make smart decisions [3]. More in-depth understanding of IoT with its applications, challenges, and open research issues is discussed in [1][2][3][4][5][6][7]. Many benefits are provided by IoT technologies to the healthcare field, and the resulting applications can be grouped mainly in the tracking of objects and people (staff and patients); identification and authentication of persons; automatic data collection and detection [8].…”
Section: Introductionmentioning
confidence: 99%
“…In [26], the authors have proposed two schemes based on slicing for secure data aggregation. In Scheme I, for the network with n nodes, each data is sliced into n pieces and confusion is added by mixing the slices of n nodes.…”
Section: Related Workmentioning
confidence: 99%
“…Privacy Preserving (PP) has attracted much attention in many fields, such as smart grid [14], Internet of ings [15,16], edge computing [17], social network [18] and other application scenarios [19][20][21]. PP can also protect the privacy of sensing data when DA is adopted in a WSN, and some interesting schemes have been proposed in recent years [22][23][24][25].…”
Section: Introductionmentioning
confidence: 99%