2018
DOI: 10.1155/2018/6285719
|View full text |Cite
|
Sign up to set email alerts
|

Abstract: In the Internet of Things (IoT), aggregation and release of real-time data can often be used for mining more useful information so as to make humans lives more convenient and efficient. However, privacy disclosure is one of the most concerning issues because sensitive information usually comes with users in aggregated data. Thus, various data encryption technologies have emerged to achieve privacy preserving. These technologies may not only introduce complicated computing and high communication overhead but al… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
21
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 30 publications
(21 citation statements)
references
References 39 publications
(52 reference statements)
0
21
0
Order By: Relevance
“…Among them, trajectory information is very important to user as well as adversary. Because it carries a lot of information for data mining and scientific analysis, if the trajectory is obtained illegally or released without protection, it is easy to reveal the user's personal privacy, such as home address and behavior mode, which will endanger the personal security of the user [2][3][4]. Once the information is leaked into an attacker, it will cause immeasurable loss to the user, resulting in threats to personal safety and property.…”
Section: Introductionmentioning
confidence: 99%
“…Among them, trajectory information is very important to user as well as adversary. Because it carries a lot of information for data mining and scientific analysis, if the trajectory is obtained illegally or released without protection, it is easy to reveal the user's personal privacy, such as home address and behavior mode, which will endanger the personal security of the user [2][3][4]. Once the information is leaked into an attacker, it will cause immeasurable loss to the user, resulting in threats to personal safety and property.…”
Section: Introductionmentioning
confidence: 99%
“…When storing sensitive data like personal health records to cloud servers, the security and privacy of these data are still challenges in the fog computing paradigm [10][11][12]. To solve this problem, applying access control mechanism is an essential method to protect the sensitive data from unauthorized users.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, the privacy preservation becomes important for the CSP, because the crowds care about the disclosure of their sensitive information in recent years [18][19][20][21]. Only the CSP who preserves the privacy can maintain sufficient participants.…”
Section: Introductionmentioning
confidence: 99%