2019
DOI: 10.1109/tsusc.2017.2715038
|View full text |Cite
|
Sign up to set email alerts
|

A Differential Privacy-Based Query Model for Sustainable Fog Data Centers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 39 publications
(11 citation statements)
references
References 42 publications
0
11
0
Order By: Relevance
“…Wang et al [12] proposed a three-layer privacy protection framework; however, they did not consider the problem of local equipment failure, in which case users would not be able to query complete data. Du et al [13] proposed a fog computing support data center query model based on differential privacy and proved, through rigorous mathematical deduction, that it ensured the reliability and effectiveness of privacy protection. Lyu et al [14] proposed the PPFA privacy protection aggregation system that uses the stability of a Gauss mechanism to ensure the differential privacy of the statistical results and reduces the loss of privacy by combining a stream cipher with a public key cipher to maintain practicability.…”
Section: Sensitive Data Protection Based On Fog Computingmentioning
confidence: 99%
“…Wang et al [12] proposed a three-layer privacy protection framework; however, they did not consider the problem of local equipment failure, in which case users would not be able to query complete data. Du et al [13] proposed a fog computing support data center query model based on differential privacy and proved, through rigorous mathematical deduction, that it ensured the reliability and effectiveness of privacy protection. Lyu et al [14] proposed the PPFA privacy protection aggregation system that uses the stability of a Gauss mechanism to ensure the differential privacy of the statistical results and reduces the loss of privacy by combining a stream cipher with a public key cipher to maintain practicability.…”
Section: Sensitive Data Protection Based On Fog Computingmentioning
confidence: 99%
“…Yao [12] introduced the concept of α-mutual information security and showed that statistical security meant mutual information security. Du and Wang [13] proposed a query model and implemented differential privacy by Laplace noise. Tsou and Chen [17] quantified the disclosure risk and linked the differential privacy with k-anonymity.…”
Section: Research On the Basicmentioning
confidence: 99%
“…At present, most of the proposed privacy protection schemes use anonymous fuzzy or data distortion processing (such as adding random noise) and other technologies and use mathematical regression analysis, data distortion adjustment, and noise scale parameter adjustment to reduce the error caused by noise, so as to improve the availability of data [12][13][14]. However, these schemes also have some shortcomings; that is, the same query results will cause the disclosure of privacy information when the query users with different permissions and reputation levels query the sensitive data.…”
Section: Introductionmentioning
confidence: 99%
“…The solution preserves data confidentiality, integrity, mutual authentication, privacy, and anonymity. Differential privacy preserving query model is proposed in [13], and Laplacian noise is added to ensure the robustness of the proposed solution. In [14], a secure fog orchestrator is presented based on secure-bydesign protocols.…”
Section: Related Workmentioning
confidence: 99%