메뉴 건너뛰기




Volumn 10, Issue 9, 2010, Pages 8375-8397

Data collection framework for energy efficient privacy preservation in wireless sensor networks having many-to-many structures

Author keywords

K anonymity; Privacy preserving data publishing; Wireless sensor networks

Indexed keywords

DATA COLLECTION MODEL; INFORMATION FLOWS; K-ANONYMITY; PRIVACY PRESERVATION; PRIVACY PRESERVING DATA PUBLISHING; PRIVACY REQUIREMENTS; TRIVIAL SOLUTIONS; WIRELESS SENSOR NETWORK (WSNS);

EID: 77957998365     PISSN: 14248220     EISSN: None     Source Type: Journal    
DOI: 10.3390/s100908375     Document Type: Article
Times cited : (4)

References (31)
  • 1
    • 0142103313 scopus 로고    scopus 로고
    • Security and privacy in sensor networks
    • Chan, H.; Perrig, A. Security and privacy in sensor networks. Computer 2003, 36, 103-105.
    • (2003) Computer , vol.36 , pp. 103-105
    • Chan, H.1    Perrig, A.2
  • 3
    • 34548038583 scopus 로고    scopus 로고
    • A survey of key management schemes in wireless sensor networks
    • Xiao, Y.; Rayi, V.K.; Sun, B.; Du, X.; Hu, F.; Galloway, M.; A survey of key management schemes in wireless sensor networks, Comput. Commun. 2007, 30, 2314-2341.
    • (2007) Comput. Commun , vol.30 , pp. 2314-2341
    • Xiao, Y.1    Rayi, V.K.2    Sun, B.3    Du, X.4    Hu, F.5    Galloway, M.6
  • 4
    • 77951201056 scopus 로고    scopus 로고
    • Privacy-preserving data publishing: A Survey on recent developments
    • Fung, B.C.M.; Wang, K.; Chen, R.; Yu, P.S. Privacy-preserving data publishing: A Survey on recent developments. ACM Comput. Surv. 2009, 42, 1-53.
    • (2009) ACM Comput. Surv , vol.42 , pp. 1-53
    • Fung, B.C.M.1    Wang, K.2    Chen, R.3    Yu, P.S.4
  • 6
    • 84937564790 scopus 로고    scopus 로고
    • Anonymity, unobservability, and pseudonymity-A proposal for terminology
    • Springer: Berlin, Germany
    • Pfitzmann, A.; Khntopp, M.; Anonymity, unobservability, and pseudonymity-A proposal for terminology. In Designing Privacy Enhancing Technologies; Springer: Berlin, Germany, 2001; Volume 2009/2001, pp. 1-9.
    • (2001) Designing Privacy Enhancing Technologies , vol.2009 , Issue.2001 , pp. 1-9
    • Pfitzmann, A.1    Khntopp, M.2
  • 7
    • 80052799499 scopus 로고    scopus 로고
    • A general survey of privacy preserving data mining models and algorithms
    • Aggarwal, C.C.; Yu, P.S. A general survey of privacy preserving data mining models and algorithms. Priv. Preserving Data Min. Models Algorithm. 2008, 34, 11-52.
    • (2008) Priv. Preserving Data Min. Models Algorithm , vol.34 , pp. 11-52
    • Aggarwal, C.C.1    Yu, P.S.2
  • 8
    • 78650779631 scopus 로고    scopus 로고
    • An overview of rrivacy preserving data mining
    • doi: 10.1145/1558897.1558903
    • Gkoulalas-Divanis, A.; Verykiosc, V.S. An overview of rrivacy preserving data mining. Crossroads 2009, 15, doi: 10.1145/1558897.1558903.
    • (2009) Crossroads , vol.15
    • Gkoulalas-Divanis, A.1    Verykiosc, V.S.2
  • 9
    • 77949498395 scopus 로고    scopus 로고
    • K-Anonymity based framework for privacy preserving data collection in wireless sensor networks
    • Bahsi, H.; Levi, A. k-Anonymity based framework for privacy preserving data collection in wireless sensor networks. Turk. J. Electr. Eng. Comput. Sci. 2010, 18, 241-271.
    • (2010) Turk. J. Electr. Eng. Comput. Sci , vol.18 , pp. 241-271
    • Bahsi, H.1    Levi, A.2
  • 10
    • 0347412078 scopus 로고    scopus 로고
    • Software clustering based on information loss minimization
    • Victoria, Canada,13-16 November 2003; IEEE Computer Society: Washington, DC, USA
    • Andritsos, P.; Tzerpos, V. Software clustering based on information loss minimization. In Proceedings of the 10th Working Conference on Reverse Engineering(WCRE'03), Victoria, Canada, 13-16 November 2003; IEEE Computer Society: Washington, DC, USA, 2003; p. 334.
    • (2003) In Proceedings of the 10th Working Conference On Reverse Engineering(WCRE'03) , pp. 334
    • Andritsos, P.1    Tzerpos, V.2
  • 11
    • 34548850872 scopus 로고    scopus 로고
    • A survey on clustering algorithms for wireless sensor networks
    • Abbasi, A.A.; Younis, M. A survey on clustering algorithms for wireless sensor networks. Comput. Commun. 2007, 30, 2826-2841.
    • (2007) Comput. Commun , vol.30 , pp. 2826-2841
    • Abbasi, A.A.1    Younis, M.2
  • 15
    • 0035517699 scopus 로고    scopus 로고
    • Protecting respondents' identities in microdata release
    • Samarati, P. Protecting respondents' identities in microdata release. IEEE Trans. Know. Data Eng. 2005, 13, 1010-1027.
    • (2005) IEEE Trans. Know. Data Eng , vol.13 , pp. 1010-1027
    • Samarati, P.1
  • 21
    • 34548805858 scopus 로고    scopus 로고
    • Venkatasubramanian, S. t-Closeness: Privacy beyond k-anonymity and l-diversity
    • Istanbul, Turkey, April, Available on line, doi=10.1.1.92.587 (accessed on 30 July 2010)
    • Li, N.; Li, T.; Venkatasubramanian, S. t-Closeness: Privacy beyond k-anonymity and l-diversity. In Proceedings of IEEE 23rd International Conference on Data Engineering (ICDE07), Istanbul, Turkey, April 2007; Available on line: http://citeseerx.ist.psu.edu/viewdoc/summary? doi=10.1.1.92.587 (accessed on 30 July 2010).
    • Proceedings of IEEE 23rd International Conference On Data Engineering (ICDE07)
    • Li, N.1    Li, T.2
  • 22
    • 0023861309 scopus 로고
    • The dining cryptographers problem: Unconditional sender and receipent untraceability
    • Chaum, D. The dining cryptographers problem: Unconditional sender and receipent untraceability. J. Cryptol. 1988, 1, 65-75.
    • (1988) J. Cryptol , vol.1 , pp. 65-75
    • Chaum, D.1
  • 23
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • Chaum, D. Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. Associations Comput. Mach. 1981, 24, 84-88.
    • (1981) Commun. Associations Comput. Mach , vol.24 , pp. 84-88
    • Chaum, D.1
  • 25
    • 0001777423 scopus 로고    scopus 로고
    • Anonymous web transactions with crowds
    • Reiter, M.K. Rubin, A.D. Anonymous web transactions with crowds. Commun. ACM 1999, 42, 32-48.
    • (1999) Commun. ACM , vol.42 , pp. 32-48
    • Reiter, M.K.1    Rubin, A.D.2
  • 31
    • 36549043405 scopus 로고    scopus 로고
    • Protecting location privacy with personalized k-anonymity: Architecture and algorithms
    • Gedik, B.; Liu, L. Protecting location privacy with personalized k-anonymity: Architecture and algorithms. IEEE Trans. Mob. Comput. 2008, 7, 1-18.
    • (2008) IEEE Trans. Mob. Comput , vol.7 , pp. 1-18
    • Gedik, B.1    Liu, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.