2016
DOI: 10.1002/sec.1546
|View full text |Cite
|
Sign up to set email alerts
|

An efficient privacy preserving data aggregation approach for mobile sensing

Abstract: The advances in sensing capabilities of smartphones give rise to a variety of mobile participatory sensing applications that collect users' personal data. Because of the existence of both sensitive, private personal data, and untrusted aggregator, serious privacy concerns on users arise. Currently, existing privacy preserving data collection methods either require bidirectional communications between an untrusted aggregator and mobile users in every aggregation period, or have high computation or communication… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 23 publications
(13 citation statements)
references
References 33 publications
0
13
0
Order By: Relevance
“…Similarly, Zhang et al employed Paillier homomorphism encryption for data privacy preservation and designed a data summation protocol [81]. Utilization of homomorphism encryption protects data privacy and supports data accountability.…”
Section: Data Privacy Preservation (Da)mentioning
confidence: 99%
“…Similarly, Zhang et al employed Paillier homomorphism encryption for data privacy preservation and designed a data summation protocol [81]. Utilization of homomorphism encryption protects data privacy and supports data accountability.…”
Section: Data Privacy Preservation (Da)mentioning
confidence: 99%
“…Attackers not only want to infer privacy information, but also try to do it efficiently [39]. In order to save energy, Yadav et al [21] proposed their low cost GSM-based localization method based on Cell Broadcast Messages and war-driving.…”
Section: Related Workmentioning
confidence: 99%
“…Meanwhile, individual privacy issues on smartphones are increasingly receiving attentions due to the risk of disclosure of user's privacy sensitive information. Various approaches have been proposed to protect users' sensitive information in location-based services (LBSs) and participatory sensing applications [11]. In fact, most previous privacy protection techniques focus on the static scenarios [12][13][14][15][16][17][18][19], in which the instant sensitive location information is protected without consideration of temporal correlations among locations.…”
Section: Related Workmentioning
confidence: 99%