8,060 Hits in 7.2 sec

Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions [chapter]

Keita Emura
2017 Lecture Notes in Computer Science  
In this paper, we propose aggregator oblivious encryption schemes with public verifiability where the aggregator is required to generate a proof of an aggregated sum and anyone can verify whether the aggregated  ...  Since the aggregator does not learn individual data that may reveal users' habits and behaviors, several applications, such as privacy-preserving smart metering, have been considered.  ...  Takahiro Matsuda for his invaluable comments against the size of message space, and thank Dr. Tran Viet Xuan Phuong for her invaluable comments against related works.  ... 
doi:10.1007/978-3-319-59870-3_11 fatcat:wlodbsju2rbuxmqw3tr676e5f4

Differential privacy in data publication and analysis

Yin Yang, Zhenjie Zhang, Gerome Miklau, Marianne Winslett, Xiaokui Xiao
2012 Proceedings of the 2012 international conference on Management of Data - SIGMOD '12  
Since its proposal, differential privacy had been gaining attention in many fields of computer science, and is considered among the most promising paradigms for privacy-preserving data publication and  ...  Recently, differential privacy has emerged as a new paradigm for privacy protection with very conservative assumptions about the adversary's prior knowledge.  ...  [19] showed that it is possible to verify with high confidence whether an individual has participated in a genome-wide association study (GWAS). Soon after the publication of [19] , the U.S.  ... 
doi:10.1145/2213836.2213910 dblp:conf/sigmod/YangZMWX12 fatcat:uqrf46mpd5fqlgpmkjr3tp5g5y

Privacy-Preserving Vehicular Announcements Aggregation Scheme Based on Threshold Ring Signature [article]

Yichen Jiang
2014 arXiv   pre-print
In this paper, we present a novel privacy-preserving vehicular announcements aggregation scheme.  ...  To our best knowledge, it is the first privacy-preserving scheme preventing the malicious users from launching the sybil attack in advance.  ...  Some solutions with strong hardware-secure assumptions are used to mitigate the sybil attack in privacy-preserving VANETs.  ... 
arXiv:1411.3433v1 fatcat:spm4ir6f4jhrnjqkmug2rlwgcu

Defense against Sybil attack in vehicular ad hoc network based on roadside unit support

Soyoung Park, Baber Aslam, Damla Turgut, Cliff C. Zou
2009 MILCOM 2009 - 2009 IEEE Military Communications Conference  
The timestamp series approach needs neither vehicular-based public-key infrastructure nor Internet accessible RSUs, which makes it an economical solution suitable for the initial stage of VANET.  ...  Due to the differences of moving dynamics among vehicles, it is rare to have two vehicles passing by multiple RSUs at exactly the same time.  ...  [13] proposed a privacy preserving method for detecting the Sybil attack with trustable roadside boxes and pseudonyms.  ... 
doi:10.1109/milcom.2009.5379844 fatcat:aqe3pydwljds7h34ufyrbrfdsi

Privacy-Preserving Schemes for Safeguarding Heterogeneous Data Sources in Cyber-Physical Systems

Marwa Keshk, Benjamin Turnbull, Elena Sitnikova, Dinusha Vatsalan, Nour Moustafa
2021 IEEE Access  
This paper introduces a comprehensive review of the current privacy-preserving techniques for protecting CPS systems and their data from cyber attacks.  ...  privacy-preserving techniques for safeguarding system data (telemetry and transactions) from cyber attacks.  ...  [47] introduced a data-aggregation scheme for privacy protection based on fault tolerance and aggregation in which the data privacy of a smart grid can be preserved by using secret sharing and setting  ... 
doi:10.1109/access.2021.3069737 fatcat:zcgizjkslzbonejocasygt464u

Verifiable private multi-party computation: Ranging and ranking

Lan Zhang, Xiang-Yang Li, Yunhao Liu, Taeho Jung
2013 2013 Proceedings IEEE INFOCOM  
In this work, we focus on the problem of verifiable privacy preserving multiparty computation.  ...  We thoroughly analyze the attacks on existing privacy preserving multi-party computation approaches and design a series of protocols for dot product, ranging and ranking, which are proved to be privacy  ...  VERIFIABLE RANKING PROTOCOL Here we propose privacy-preserving verifiable ranking protocols in both participants model and aggregator model. A.  ... 
doi:10.1109/infcom.2013.6566844 dblp:conf/infocom/ZhangLLJ13 fatcat:w5bvep66czdzjkhdzgmu6zh4ra

Cryptonomial: A Framework for Private Time-Series Polynomial Calculations [article]

Ryan Karl, Jonathan Takeshita, Alamin Mohammed, Aaron Striegel, Taeho Jung
2021 IACR Cryptology ePrint Archive  
Private Stream Aggregation (PSA) allows for the aggregation of time-series data, while still providing strong privacy guarantees, and is significantly more efficient over a network than related techniques  ...  In modern times, data collected from multi-user distributed applications must be analyzed on a massive scale to support critical business objectives.  ...  Any opinions, findings and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect those of the sponsor.  ... 
dblp:journals/iacr/KarlTMSJ21a fatcat:x2f2c2ay4bhe3anif4j44fo6ju

Verifiable Privacy-Preserving Aggregation in People-Centric Urban Sensing Systems

Rui Zhang, Jing Shi, Yanchao Zhang, Chi Zhang
2013 IEEE Journal on Selected Areas in Communications  
To tackle this open challenge, this paper presents the design and evaluation of VPA, a novel peer-to-peer based solution to verifiable privacy-preserving data aggregation in PC-USSs.  ...  VPA achieves strong user privacy by letting each user exchange random shares of its datum with other peers, while at the same time ensures data integrity through a combination of Trusted Platform Module  ...  [6] proposed PoolView for computing community statistics of time-series data in a privacy-preserving manner without considering aggregationresult integrity.  ... 
doi:10.1109/jsac.2013.sup.0513024 fatcat:2ckvamwwvjgivery4ip7npe4lu

A Peer-to-Peer Protocol and System Architecture for Privacy-Preserving Statistical Analysis [chapter]

Katerina Zamani, Angelos Charalambidis, Stasinos Konstantopoulos, Maria Dagioglou, Vangelis Karkaletsis
2016 Lecture Notes in Computer Science  
Acknowledgements The work described here was carried out in the context of the RADIO project.  ...  This project has received funding from the European Union's Horizon 2020 research and innovation programme under grant agreement No 643892.  ...  hash function, that is based on the time series.  ... 
doi:10.1007/978-3-319-45507-5_16 fatcat:smha7wn37je2lfbxm5o5vsun6y

PDA: Semantically Secure Time-Series Data Analytics with Dynamic User Groups

Taeho Jung, Junze Han, Xiang-Yang Li
2018 IEEE Transactions on Dependable and Secure Computing  
In this paper, we present a novel Privacy-preserving Data Analytics framework PDA, which allows a third-party aggregator to obliviously conduct many different types of polynomial-based analysis on private  ...  However, the data in its original form often contains sensitive information about individuals, and its publication will severely breach their privacy.  ...  Time-series Data: Users continuously generate data, therefore the data analysis scheme should preserve the data confidentiality even when the data is time-series and may be substantially correlated to  ... 
doi:10.1109/tdsc.2016.2577034 fatcat:5v7qs5ttpzgzlm6b4y4lcz3n24

Privately Finding Specifications

W. Weimer, N. Mishra
2008 IEEE Transactions on Software Engineering  
We use a perturbation algorithm to obfuscate individual trace values while still allowing statistical trends to be mined from the data.  ...  We present an algorithm by which mutually distrusting parties can work together to learn program specifications while preserving their privacy.  ...  From a utility perspective, with more values of privacy p, however, more participants will be needed to estimate aggregate data.  ... 
doi:10.1109/tse.2007.70744 fatcat:zujupxms2jfiborbdytaldxaee

A Differentially Private Data Aggregation Method Based on Worker Partition and Location Obfuscation for Mobile Crowdsensing

Shuyu Li, Guozheng Zhang
2020 Computers Materials & Continua  
Through using optimal estimation of noisy aggregated sensing data, the platform can finally gain better utility of aggregated data while preserving workers' privacy.  ...  Trying to preserve workers' location and sensing data from the untrusted MCS platform, a differentially private data aggregation method based on worker partition and location obfuscation (DP-DAWL method  ...  Data aggregation result analysis The experiment uses two sets of datasets with 5000 and 10000 workers respectively, to verify the utility of aggregated sensing data after filtering in the untrusted MCS  ... 
doi:10.32604/cmc.2020.07499 fatcat:wld4yktibjgblaolaza6vjvu2y

Private Personal Information Verification

Hoang Giang Do, Wee Keong Ng
2017 Journal of Information Security  
This process consumes a large amount of time, money, and human resources, which leads to limited business throughput.  ...  We make use of homomorphic encryption and secure multi-party computation to develop a series of protocols for private integer comparison and (non-) membership testing.  ...  We showed that the proposed scheme can protect the clients privacy from both the verifier and the data keeper, and at the same time provides privacy to the former.  ... 
doi:10.4236/jis.2017.83015 fatcat:cvusuxnjfjh57gtmxsje6dwawa

A Survey on Privacy-preserving Schemes for Smart Grid Communications [article]

Mohamed Amine Ferrag, Leandros A. Maglaras, Helge Janicke, Jianmin Jiang
2016 arXiv   pre-print
2) Data aggregation communications, 3) Smart grid marketing architecture, 4) Smart community of home gateways, and 5) Vehicle-to grid architecture.  ...  In this paper, we present a comprehensive survey of privacy-preserving schemes for Smart Grid communications.  ...  Following a different approach, authors in [67] and [55] specifically focus on how cloud computing (CC) could be used for energy management, information management and security of the Smart Grid.  ... 
arXiv:1611.07722v1 fatcat:rfw2j642ljajpcwxlaf5q5pmhy

Privacy-preserving crowd incident detection

Emmanuel Baccelli, Alexandra Danilkina, Sebastian Müller, Agnès Voisard, Matthias Wählisch
2015 Proceedings of the 1st ACM SIGSPATIAL International Workshop on the Use of GIS in Emergency Management - EM-GIS '15  
This view comes from a merger of infrared and Kinect camera data.  ...  We describe our approach using a layered model for data aggregation and abstraction together with a workflow model for the involved software components, focusing on their functionality.  ...  Acknowledgements The research reported in this paper was sponsored by the German Federal Ministry of Education and Research (BMBF) and the French Agence Nationale de la Recherche (ANR) grant, as part of  ... 
doi:10.1145/2835596.2835603 dblp:conf/gis/BaccelliD0VW15 fatcat:svclefl5q5fgplujxbvwhcz6de
« Previous Showing results 1 — 15 out of 8,060 results