2013
DOI: 10.1007/978-3-642-39077-7_4
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Privacy-Preserving Stream Aggregation in Mobile Sensing with Low Aggregation Error

Abstract: Abstract. Aggregate statistics computed from time-series data contributed by individual mobile nodes can be very useful for many mobile sensing applications. Since the data from individual node may be privacy-sensitive, the aggregator should only learn the desired statistics without compromising the privacy of each node. To provide strong privacy guarantee, existing approaches add noise to each node's data and allow the aggregator to get a noisy sum aggregate. However, these approaches either have high computa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
40
0
1

Year Published

2013
2013
2023
2023

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 48 publications
(42 citation statements)
references
References 27 publications
1
40
0
1
Order By: Relevance
“…Nonetheless, this solution calls for a fully trusted dealer that is able to decrypt users' individual data. The authors in [10] presented a solution to tackle the issue of key redistribution after a user joins or leaves. The propounded solution is based on a ring based grouping technique in which users are clustered into disjoint groups, and consequently, whenever a user joins or leaves only a fraction of the users is affected.…”
Section: Dynamic Group Managementmentioning
confidence: 99%
“…Nonetheless, this solution calls for a fully trusted dealer that is able to decrypt users' individual data. The authors in [10] presented a solution to tackle the issue of key redistribution after a user joins or leaves. The propounded solution is based on a ring based grouping technique in which users are clustered into disjoint groups, and consequently, whenever a user joins or leaves only a fraction of the users is affected.…”
Section: Dynamic Group Managementmentioning
confidence: 99%
“…due to user failures, was first addressed by Chan et al [8], whose solution we briefly describe in Section VII, but incurs a high aggregation error, which impacts the accuracy of the result. In an effort to minimize the accumulated aggregation error, Li and Cao [29] have each user add very small amounts of noise and order the participants in an interleaved ring structure such that only a subset of users have to update their cryptographic key when the number of active participants changes due to leaves or joins. However, the resulting communication cost is higher compared to [8] and therefore creates a trade-off between accuracy and communication cost.…”
Section: Related Workmentioning
confidence: 99%
“…In contrast, our scheme does not incur such a trade-off. Additionally, Li and Cao's [29] scheme (and its extension to computing the minimum in [30]) relies on symmetric-key cryptography.…”
Section: Related Workmentioning
confidence: 99%
“…Table 1 summarizes our protocol with major related protocols in the literatures. Besides, there are also several works [17][18][19][20][21][22] on privacy-preserving aggregation of time-series data. Some of them leverage the differential privacy [23] in various ways to achieve privacy as well as collusion (or fault) tolerance.…”
Section: Related Workmentioning
confidence: 99%