2018
DOI: 10.3390/s18072037
|View full text |Cite
|
Sign up to set email alerts
|

An Exception Handling Approach for Privacy-Preserving Service Recommendation Failure in a Cloud Environment

Abstract: Service recommendation has become an effective way to quickly extract insightful information from massive data. However, in the cloud environment, the quality of service (QoS) data used to make recommendation decisions are often monitored by distributed sensors and stored in different cloud platforms. In this situation, integrating these distributed data (monitored by remote sensors) across different platforms while guaranteeing user privacy is an important but challenging task, for the successful service reco… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
36
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
9

Relationship

3
6

Authors

Journals

citations
Cited by 50 publications
(36 citation statements)
references
References 37 publications
0
36
0
Order By: Relevance
“…Recently, a lot of efforts have been focused on task allocation [15][16][17] and generally can be divided into two categories: rule-based task allocation method [18][19][20] and map-based task allocation method [21][22][23][24]. The rule-based task allocation mainly allocates task according to each node's sensing capability, such as position and power of perception.…”
Section: Related Workmentioning
confidence: 99%
“…Recently, a lot of efforts have been focused on task allocation [15][16][17] and generally can be divided into two categories: rule-based task allocation method [18][19][20] and map-based task allocation method [21][22][23][24]. The rule-based task allocation mainly allocates task according to each node's sensing capability, such as position and power of perception.…”
Section: Related Workmentioning
confidence: 99%
“…The literature 29 proposed and implemented the ArrayTrack system. 30,31 It uses MIMO technology to track wireless customers in real time and combines FPGA and general calculation methods. The results show that the location of smaller errors can be obtained.…”
Section: Related Workmentioning
confidence: 99%
“…Due to the large number of IoT terminals and complex application environments, the security protection capability is weak, which brings threats to the entire IoT system. Once IoT is under attack, it may cause shutdown of factories, disorder of society and even the safety of human life [9,10]. Attacks against IoT have already emerged and their scope and impact have increased year by year.…”
Section: Introductionmentioning
confidence: 99%