2018
DOI: 10.1109/access.2018.2817523
|View full text |Cite
|
Sign up to set email alerts
|

Machine Learning Differential Privacy With Multifunctional Aggregation in a Fog Computing Architecture

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
41
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
7
1

Relationship

2
6

Authors

Journals

citations
Cited by 59 publications
(41 citation statements)
references
References 22 publications
0
41
0
Order By: Relevance
“…road units) collect and preprocess traffic flow data from multiple vehicles and then send them to a cloud server. Owing to privacy concern, homomorphic encryption [77]- [79] and differential privacy [42], [80] were applied to achieve privacy-preserving data aggregation in edge computing.…”
Section: B Secure Data Processing In Edge Computingmentioning
confidence: 99%
“…road units) collect and preprocess traffic flow data from multiple vehicles and then send them to a cloud server. Owing to privacy concern, homomorphic encryption [77]- [79] and differential privacy [42], [80] were applied to achieve privacy-preserving data aggregation in edge computing.…”
Section: B Secure Data Processing In Edge Computingmentioning
confidence: 99%
“…Therefore, the requirement of middleware technology using edge computing is put forward to achieve cross-layer context sharing and localized context processing in smart home scenarios. Fog computing (10) viewed as SDN middleware inherits the advantages of not only cloud computing but also edge computing, which can give full play to the cross-layer capability and provide an effective way for local context processing in home scenarios.…”
Section: Introductionmentioning
confidence: 99%
“…It employs a differential privacy model to resist differential attacks that most existing data aggregation schemes have suffered from. Yang et al in [14] also proposed a differential privacy model based on machine learning algorithms. The model can reduce communication overhead as well as protect the privacy of sensitive data rigorously for the fog computing architecture.…”
Section: Related Workmentioning
confidence: 99%
“…We compare the performance of the proposed Re-ADP strategy with MLDP in [14] and the RescueDP strategy in [26] over two real datasets. The MLDP is a privacy-preserving data aggregation scheme under fog computing based on machine learning, while the RescueDP is the latest strategy that provides -event privacy for realtime aggregate data publishing.…”
Section: Numerical Simulationmentioning
confidence: 99%
See 1 more Smart Citation