2010 Proceedings IEEE INFOCOM 2010
DOI: 10.1109/infcom.2010.5462147
|View full text |Cite
|
Sign up to set email alerts
|

PriSense: Privacy-Preserving Data Aggregation in People-Centric Urban Sensing Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
136
0
1

Year Published

2012
2012
2020
2020

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 186 publications
(137 citation statements)
references
References 20 publications
0
136
0
1
Order By: Relevance
“…There are many existing works (e.g., [17]) on privacy-preserving data aggregation, but most of them assume a trusted aggregator. Shi et al [18] proposed an aggregation scheme for mobile sensing, but the scheme does not consider time-series data. The two constructions [19,20] based on additive homomorphic encryption [17] do not guarantee differential privacy.…”
Section: Related Workmentioning
confidence: 99%
“…There are many existing works (e.g., [17]) on privacy-preserving data aggregation, but most of them assume a trusted aggregator. Shi et al [18] proposed an aggregation scheme for mobile sensing, but the scheme does not consider time-series data. The two constructions [19,20] based on additive homomorphic encryption [17] do not guarantee differential privacy.…”
Section: Related Workmentioning
confidence: 99%
“…The concepts of data slicing and mixing are used in Shi et al (2010) to support statistical additive and non-additive aggregation functions. For additive aggregation functions, the key idea is that each node slices its data into n C 1 slices.…”
Section: Data Aggregationmentioning
confidence: 99%
“…The work in Erfani et al (2013) tries to mitigate the shortcomings of the approach in Shi et al (2010). The aggregator and the mobile nodes are assumed to be untrusted.…”
Section: Data Aggregationmentioning
confidence: 99%
“…Our work builds upon two main domains, in order to provide the privacy and incentives for the users and data aggregators: (1) privacy-preserving aggregation [14,36,37,46], and (2) privacy-preserving monetization of user profiles [4,19,35,41]. Hereafter we discuss these two sets of works.…”
Section: Related Workmentioning
confidence: 99%