Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security 2021
DOI: 10.1145/3460120.3485371
|View full text |Cite
|
Sign up to set email alerts
|

Packet Scheduling with Optional Client Privacy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 62 publications
0
2
0
Order By: Relevance
“…Angel et al [26] proposed a new resource allocation scheme that allocates resources to a group of clients and does not disclose to the clients whether there are other clients receiving the resources. Beams et al [10] proposed a privacypreserving packet scheduling scheme that prevents a malicious adversary from obtaining the victim's private information by launching a side-channel attack and observing how the switch schedules packets. Ahmad et al [27] proposed a new voice communication scheme that enables metadata privacy-preserving voice communication over a completely untrusted infrastructure.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Angel et al [26] proposed a new resource allocation scheme that allocates resources to a group of clients and does not disclose to the clients whether there are other clients receiving the resources. Beams et al [10] proposed a privacypreserving packet scheduling scheme that prevents a malicious adversary from obtaining the victim's private information by launching a side-channel attack and observing how the switch schedules packets. Ahmad et al [27] proposed a new voice communication scheme that enables metadata privacy-preserving voice communication over a completely untrusted infrastructure.…”
Section: Related Workmentioning
confidence: 99%
“…The metadata of edge computing contain sensitive information, such as when a user publishes a task, what kind of resource they request, and how much computation resource they need. Unprotected metadata will expose the end device's private information; e.g., a malicious adversary can launch a side-channel attack by observing how the gateway performs the resource allocation to obtain the user's privacy information [10]. Some research has shown that it is possible to get a detailed and private picture of a person's contacts and interests just by analyzing metadata, and it is technically much more accessible to search massive amounts of metadata than to listen in on millions of phone calls [11].…”
Section: Introductionmentioning
confidence: 99%