2010
DOI: 10.4304/jcp.5.11.1678-1685
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Preserving Aggregate Query of OLAP for Accurate Answers

Abstract: <p class="MsoNormal" style="margin: 0cm 0cm 0pt; mso-mirror-indents: yes;">In recent years, privacy protection has become an important topic when cooperative computation is performed in distributed environments. This paper puts forward efficient protocols for computing the multi-dimensional aggregates in distributed environments while keeping privacy preserving. We propose a novel model, which contains two crucial stages: local computation and cooperative computation based on secure multiparty computatio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 19 publications
0
4
0
Order By: Relevance
“…If the elements of vectors are negative, we can transform negative elements to positive elements, then perform scalar product of positive elements. For example, we would like to compute the scalar product of two vectors ( 2,3,6,7) − − and (4, 5,2, 6) − − in 15 Z , we can firstly transform them to (13,3,9,7) and (4,10,2,9) , then compute (…”
Section: A Secure Scalar Product Protocol In Fieldmentioning
confidence: 99%
See 3 more Smart Citations
“…If the elements of vectors are negative, we can transform negative elements to positive elements, then perform scalar product of positive elements. For example, we would like to compute the scalar product of two vectors ( 2,3,6,7) − − and (4, 5,2, 6) − − in 15 Z , we can firstly transform them to (13,3,9,7) and (4,10,2,9) , then compute (…”
Section: A Secure Scalar Product Protocol In Fieldmentioning
confidence: 99%
“…In secure multiparty computation (SMC) [1][2], a set of parties want to jointly compute a function of their inputs over the Internet or any computer network without revealing to the other participants any information about their private inputs. A secure scalar product protocol [3][4][5][6][7][8] is a type of specific SMC problem, and its goal is that two parties jointly compute the scalar product of their private vectors, but no party will reveal any information about his private vector to another party. As a building block, secure scalar product protocol has found various applications in many areas such as privacy-preserving data mining [3][4], privacy-preserving cooperative statistical analysis [5], and privacy-preserving geometry computation [6].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations