2019
DOI: 10.1109/jiot.2018.2842773
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing Privacy and Availability for Data Clustering in Intelligent Electrical Service of IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
90
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 174 publications
(90 citation statements)
references
References 35 publications
0
90
0
Order By: Relevance
“…Various research studies have been conducted on a prediction system for power-related data [77][78][79][80][81][82]. In recent years, active research efforts have been made to investigate pattern mining such as power demand and patterns and analyze outlier for the identification of defective data from the collected data [83,84].…”
Section: Electric Power Prediction Systemmentioning
confidence: 99%
“…Various research studies have been conducted on a prediction system for power-related data [77][78][79][80][81][82]. In recent years, active research efforts have been made to investigate pattern mining such as power demand and patterns and analyze outlier for the identification of defective data from the collected data [83,84].…”
Section: Electric Power Prediction Systemmentioning
confidence: 99%
“…In the process of clustering analysis, a large amount of user-based privacy data, such as geographical location, electricity consumption data, and spatiotemporal sensing data, is collected and analyzed. [7][8][9] The security and privacy of this data depends on the security of cloud services.…”
Section: Introductionmentioning
confidence: 99%
“…6 Clustering, as one of the important research methods of data mining, aims to divide data objects into several clusters such that object similarity in a cluster is high, while the similarity between each cluster is low.In the process of clustering analysis, a large amount of user-based privacy data, such as geographical location, electricity consumption data, and spatiotemporal sensing data, is collected and analyzed. [7][8][9] The security and privacy of this data depends on the security of cloud services.The sensitive data is directly outsourced to the cloud server for calculation, at which point the user's privacy may be leaked if the cloud service provider is malicious or dishonest. If multiple users collude with each other, they combine their own information to calculate their respective distances and then calculate the cluster centers by distance.…”
mentioning
confidence: 99%
“…Second, in a mobile crowdsensing network [9], the collected sensing data may contain a significant amount of sensitive and private information with the risk of private data leakage. Therefore, users anticipate that effective measures are taken to protect their privacy when sensing data is uploaded to the service providers [11]. Third, there may be malicious activities in the course of the data transactions between the mediator and the service provider, possibly leading to loss of profits.…”
Section: Introductionmentioning
confidence: 99%