2020
DOI: 10.1016/j.future.2018.07.026
|View full text |Cite
|
Sign up to set email alerts
|

BES: Differentially private event aggregation for large-scale IoT-based systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 14 publications
0
8
0
Order By: Relevance
“…The spectrum of possible solutions for hardly separable sets includes, e.g., the method to add the calibrated noise component to data; this concept was discussed in the paper [35], which was devoted to the problem of events aggregation in large-scale IoT systems. However, the guaranteed mathematically correct method of arbitrary data separation is proposed in Section 3 to be based on MVL function.…”
Section: Actual Methods Of Data Clusteringmentioning
confidence: 99%
See 2 more Smart Citations
“…The spectrum of possible solutions for hardly separable sets includes, e.g., the method to add the calibrated noise component to data; this concept was discussed in the paper [35], which was devoted to the problem of events aggregation in large-scale IoT systems. However, the guaranteed mathematically correct method of arbitrary data separation is proposed in Section 3 to be based on MVL function.…”
Section: Actual Methods Of Data Clusteringmentioning
confidence: 99%
“…, if and only if both conditions are true: As in the notation 1 * (35,59) , the first product term is included into the second one and can be deleted, thus it was crossed out.…”
Section: The Minimization Methods For Aga Functionsmentioning
confidence: 99%
See 1 more Smart Citation
“…They present a theoretical framework and empirically investigate how changing the properties of the available data would change an attacker's success. Also, differential privacy has been suggested to protect customers [67], where Tudor et al design and evaluate a prototype based on a streaming framework to scale to very large data. By adding noise, there is a risk that the usefulness of the data collected will decrease.…”
Section: Related Workmentioning
confidence: 99%
“…However, one disadvantage with the above approaches is that for billing, privacy will cost. Changing the granularity of the collected data as in [66] or using differential privacy as in [67], mean that a customer is not charged for her actual consumption. It should be noted that limiting the consequences to the utility of noise-adding techniques is an ongoing research challenge (see, e.g., [35]).…”
Section: Related Workmentioning
confidence: 99%