A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions
[chapter]
2017
Lecture Notes in Computer Science
In this paper, we propose aggregator oblivious encryption schemes with public verifiability where the aggregator is required to generate a proof of an aggregated sum and anyone can verify whether the aggregated ...
Since the aggregator does not learn individual data that may reveal users' habits and behaviors, several applications, such as privacy-preserving smart metering, have been considered. ...
Takahiro Matsuda for his invaluable comments against the size of message space, and thank Dr. Tran Viet Xuan Phuong for her invaluable comments against related works. ...
doi:10.1007/978-3-319-59870-3_11
fatcat:wlodbsju2rbuxmqw3tr676e5f4
Differential privacy in data publication and analysis
2012
Proceedings of the 2012 international conference on Management of Data - SIGMOD '12
Since its proposal, differential privacy had been gaining attention in many fields of computer science, and is considered among the most promising paradigms for privacy-preserving data publication and ...
Recently, differential privacy has emerged as a new paradigm for privacy protection with very conservative assumptions about the adversary's prior knowledge. ...
[19] showed that it is possible to verify with high confidence whether an individual has participated in a genome-wide association study (GWAS). Soon after the publication of [19] , the U.S. ...
doi:10.1145/2213836.2213910
dblp:conf/sigmod/YangZMWX12
fatcat:uqrf46mpd5fqlgpmkjr3tp5g5y
Privacy-Preserving Vehicular Announcements Aggregation Scheme Based on Threshold Ring Signature
[article]
2014
arXiv
pre-print
In this paper, we present a novel privacy-preserving vehicular announcements aggregation scheme. ...
To our best knowledge, it is the first privacy-preserving scheme preventing the malicious users from launching the sybil attack in advance. ...
Some solutions with strong hardware-secure assumptions are used to mitigate the sybil attack in privacy-preserving VANETs. ...
arXiv:1411.3433v1
fatcat:spm4ir6f4jhrnjqkmug2rlwgcu
Defense against Sybil attack in vehicular ad hoc network based on roadside unit support
2009
MILCOM 2009 - 2009 IEEE Military Communications Conference
The timestamp series approach needs neither vehicular-based public-key infrastructure nor Internet accessible RSUs, which makes it an economical solution suitable for the initial stage of VANET. ...
Due to the differences of moving dynamics among vehicles, it is rare to have two vehicles passing by multiple RSUs at exactly the same time. ...
[13] proposed a privacy preserving method for detecting the Sybil attack with trustable roadside boxes and pseudonyms. ...
doi:10.1109/milcom.2009.5379844
fatcat:aqe3pydwljds7h34ufyrbrfdsi
Privacy-Preserving Schemes for Safeguarding Heterogeneous Data Sources in Cyber-Physical Systems
2021
IEEE Access
This paper introduces a comprehensive review of the current privacy-preserving techniques for protecting CPS systems and their data from cyber attacks. ...
privacy-preserving techniques for safeguarding system data (telemetry and transactions) from cyber attacks. ...
[47] introduced a data-aggregation scheme for privacy protection based on fault tolerance and aggregation in which the data privacy of a smart grid can be preserved by using secret sharing and setting ...
doi:10.1109/access.2021.3069737
fatcat:zcgizjkslzbonejocasygt464u
Verifiable private multi-party computation: Ranging and ranking
2013
2013 Proceedings IEEE INFOCOM
In this work, we focus on the problem of verifiable privacy preserving multiparty computation. ...
We thoroughly analyze the attacks on existing privacy preserving multi-party computation approaches and design a series of protocols for dot product, ranging and ranking, which are proved to be privacy ...
VERIFIABLE RANKING PROTOCOL Here we propose privacy-preserving verifiable ranking protocols in both participants model and aggregator model.
A. ...
doi:10.1109/infcom.2013.6566844
dblp:conf/infocom/ZhangLLJ13
fatcat:w5bvep66czdzjkhdzgmu6zh4ra
Cryptonomial: A Framework for Private Time-Series Polynomial Calculations
[article]
2021
IACR Cryptology ePrint Archive
Private Stream Aggregation (PSA) allows for the aggregation of time-series data, while still providing strong privacy guarantees, and is significantly more efficient over a network than related techniques ...
In modern times, data collected from multi-user distributed applications must be analyzed on a massive scale to support critical business objectives. ...
Any opinions, findings and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect those of the sponsor. ...
dblp:journals/iacr/KarlTMSJ21a
fatcat:x2f2c2ay4bhe3anif4j44fo6ju
Verifiable Privacy-Preserving Aggregation in People-Centric Urban Sensing Systems
2013
IEEE Journal on Selected Areas in Communications
To tackle this open challenge, this paper presents the design and evaluation of VPA, a novel peer-to-peer based solution to verifiable privacy-preserving data aggregation in PC-USSs. ...
VPA achieves strong user privacy by letting each user exchange random shares of its datum with other peers, while at the same time ensures data integrity through a combination of Trusted Platform Module ...
[6] proposed PoolView for computing community statistics of time-series data in a privacy-preserving manner without considering aggregationresult integrity. ...
doi:10.1109/jsac.2013.sup.0513024
fatcat:2ckvamwwvjgivery4ip7npe4lu
A Peer-to-Peer Protocol and System Architecture for Privacy-Preserving Statistical Analysis
[chapter]
2016
Lecture Notes in Computer Science
Acknowledgements The work described here was carried out in the context of the RADIO project. ...
This project has received funding from the European Union's Horizon 2020 research and innovation programme under grant agreement No 643892. ...
hash function, that is based on the time series. ...
doi:10.1007/978-3-319-45507-5_16
fatcat:smha7wn37je2lfbxm5o5vsun6y
PDA: Semantically Secure Time-Series Data Analytics with Dynamic User Groups
2018
IEEE Transactions on Dependable and Secure Computing
In this paper, we present a novel Privacy-preserving Data Analytics framework PDA, which allows a third-party aggregator to obliviously conduct many different types of polynomial-based analysis on private ...
However, the data in its original form often contains sensitive information about individuals, and its publication will severely breach their privacy. ...
Time-series Data: Users continuously generate data, therefore the data analysis scheme should preserve the data confidentiality even when the data is time-series and may be substantially correlated to ...
doi:10.1109/tdsc.2016.2577034
fatcat:5v7qs5ttpzgzlm6b4y4lcz3n24
Privately Finding Specifications
2008
IEEE Transactions on Software Engineering
We use a perturbation algorithm to obfuscate individual trace values while still allowing statistical trends to be mined from the data. ...
We present an algorithm by which mutually distrusting parties can work together to learn program specifications while preserving their privacy. ...
From a utility perspective, with more values of privacy p, however, more participants will be needed to estimate aggregate data. ...
doi:10.1109/tse.2007.70744
fatcat:zujupxms2jfiborbdytaldxaee
A Differentially Private Data Aggregation Method Based on Worker Partition and Location Obfuscation for Mobile Crowdsensing
2020
Computers Materials & Continua
Through using optimal estimation of noisy aggregated sensing data, the platform can finally gain better utility of aggregated data while preserving workers' privacy. ...
Trying to preserve workers' location and sensing data from the untrusted MCS platform, a differentially private data aggregation method based on worker partition and location obfuscation (DP-DAWL method ...
Data aggregation result analysis The experiment uses two sets of datasets with 5000 and 10000 workers respectively, to verify the utility of aggregated sensing data after filtering in the untrusted MCS ...
doi:10.32604/cmc.2020.07499
fatcat:wld4yktibjgblaolaza6vjvu2y
Private Personal Information Verification
2017
Journal of Information Security
This process consumes a large amount of time, money, and human resources, which leads to limited business throughput. ...
We make use of homomorphic encryption and secure multi-party computation to develop a series of protocols for private integer comparison and (non-) membership testing. ...
We showed that the proposed scheme can protect the clients privacy from both the verifier and the data keeper, and at the same time provides privacy to the former. ...
doi:10.4236/jis.2017.83015
fatcat:cvusuxnjfjh57gtmxsje6dwawa
A Survey on Privacy-preserving Schemes for Smart Grid Communications
[article]
2016
arXiv
pre-print
2) Data aggregation communications, 3) Smart grid marketing architecture, 4) Smart community of home gateways, and 5) Vehicle-to grid architecture. ...
In this paper, we present a comprehensive survey of privacy-preserving schemes for Smart Grid communications. ...
Following a different approach, authors in [67] and [55] specifically focus on how cloud computing (CC) could be used for energy management, information management and security of the Smart Grid. ...
arXiv:1611.07722v1
fatcat:rfw2j642ljajpcwxlaf5q5pmhy
Privacy-preserving crowd incident detection
2015
Proceedings of the 1st ACM SIGSPATIAL International Workshop on the Use of GIS in Emergency Management - EM-GIS '15
This view comes from a merger of infrared and Kinect camera data. ...
We describe our approach using a layered model for data aggregation and abstraction together with a workflow model for the involved software components, focusing on their functionality. ...
Acknowledgements The research reported in this paper was sponsored by the German Federal Ministry of Education and Research (BMBF) and the French Agence Nationale de la Recherche (ANR) grant, as part of ...
doi:10.1145/2835596.2835603
dblp:conf/gis/BaccelliD0VW15
fatcat:svclefl5q5fgplujxbvwhcz6de
« Previous
Showing results 1 — 15 out of 8,060 results