2015 IEEE Conference on Communications and Network Security (CNS) 2015
DOI: 10.1109/cns.2015.7346807
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-aware and trustworthy data aggregation in mobile sensing

Abstract: With the increasing capabilities of mobile devices such as smartphones and tablets, there are more and more mobile sensing applications such as air pollution monitoring and healthcare. These applications usually aggregate the data contributed by mobile users to infer about people's activities or surroundings. Mobile sensing can only work properly if the data provided by users is adequate and trustworthy. However, mobile users may not be willing to submit data due to privacy concerns, and they may be malicious … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(1 citation statement)
references
References 26 publications
(39 reference statements)
0
1
0
Order By: Relevance
“…Chan et al 36 proposed a new mechanism to use differential privacy to provide reliable guarantee of user privacy in untrusted cloud platform and improve the accuracy of aggregate statistics in data streams. Fan et al 37 proposed to use reasonable value vector to prevent malicious users from uploading forged sensory data and homomorphic encryption technology to protect users' data privacy, thus realize trustworthy privacy data aggregation. Wu et al 19 proposed to use multikey setting additive homomorphic encryption technology combined with fog computing architecture to support a wide range of nonadditive aggregation (such as average, variance, and minimum), and only task requesters can decrypt the results of the aggregation.…”
Section: Related Workmentioning
confidence: 99%
“…Chan et al 36 proposed a new mechanism to use differential privacy to provide reliable guarantee of user privacy in untrusted cloud platform and improve the accuracy of aggregate statistics in data streams. Fan et al 37 proposed to use reasonable value vector to prevent malicious users from uploading forged sensory data and homomorphic encryption technology to protect users' data privacy, thus realize trustworthy privacy data aggregation. Wu et al 19 proposed to use multikey setting additive homomorphic encryption technology combined with fog computing architecture to support a wide range of nonadditive aggregation (such as average, variance, and minimum), and only task requesters can decrypt the results of the aggregation.…”
Section: Related Workmentioning
confidence: 99%