메뉴 건너뛰기




Volumn , Issue , 2010, Pages 99-112

Privacy-aware regression modeling of participatory sensing data

Author keywords

Linear regression; Participatory sensing; Privacy

Indexed keywords

DATA PRIVACY; HUMAN COMPUTER INTERACTION; PERTURBATION TECHNIQUES;

EID: 78650862901     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1869983.1869994     Document Type: Conference Paper
Times cited : (59)

References (42)
  • 1
    • 34247336855 scopus 로고    scopus 로고
    • Mobiscopes for human spaces
    • T. Abdelzaher et al. Mobiscopes for human spaces. IEEE Pervasive Computing, 6(2):20-29, 2007.
    • (2007) IEEE Pervasive Computing , vol.6 , Issue.2 , pp. 20-29
    • Abdelzaher, T.1
  • 2
    • 0024914229 scopus 로고
    • Security-control methods for statistical databases: A comparative study
    • N. R. Adam and J. C. Worthmann. Security-control methods for statistical databases: a comparative study. ACM Comput. Surv., 21(4):515-556, 1989.
    • (1989) ACM Comput. Surv. , vol.21 , Issue.4 , pp. 515-556
    • Adam, N.R.1    Worthmann, J.C.2
  • 3
    • 0034827009 scopus 로고    scopus 로고
    • On the design and quantification of privacy preserving data mining algorithms
    • D. Agrawal and C. C. Aggarwal. On the design and quantification of privacy preserving data mining algorithms. In Proc. of SIGMOD'01, pages 247-255, 2001.
    • (2001) Proc. of SIGMOD'01 , pp. 247-255
    • Agrawal, D.1    Aggarwal, C.C.2
  • 4
    • 0041783510 scopus 로고    scopus 로고
    • Privacy preserving data mining
    • R. Agrawal and R. Srikant. Privacy preserving data mining. In Proc. of SIGMOD'00, pages 439-450, 2000.
    • (2000) Proc. of SIGMOD'00 , pp. 439-450
    • Agrawal, R.1    Srikant, R.2
  • 8
    • 33749525209 scopus 로고    scopus 로고
    • Efficient aggregation of encrypted data in wireless sensor networks
    • C. Castelluccia, E. Mykletun, and G. Tsudik. Efficient aggregation of encrypted data in wireless sensor networks. In Mobiquitous, pages 109-117, 2005.
    • (2005) Mobiquitous , pp. 109-117
    • Castelluccia, C.1    Mykletun, E.2    Tsudik, G.3
  • 12
    • 0242496951 scopus 로고    scopus 로고
    • Secure multi-party computation problems and their applications: A review and open problems
    • Cloudcroft, NM
    • W. Du and M. J. Atallah. Secure multi-party computation problems and their applications: a review and open problems. In Workshop on New security paradigms (NSPW'01), pages 13-22, Cloudcroft, NM, 2001.
    • (2001) Workshop on New Security Paradigms (NSPW'01) , pp. 13-22
    • Du, W.1    Atallah, M.J.2
  • 13
    • 2942529194 scopus 로고    scopus 로고
    • Privacy-preserving multivariate statistical analysis: Linear regression and classification
    • W. Du, S. Chen, and Y. S. Han. Privacy-preserving multivariate statistical analysis: Linear regression and classification. In Proc. of 4th SIAM International Conference on Data Mining, pages 222-233, 2004.
    • (2004) Proc. of 4th SIAM International Conference on Data Mining , pp. 222-233
    • Du, W.1    Chen, S.2    Han, Y.S.3
  • 15
    • 33746037200 scopus 로고    scopus 로고
    • Our data, ourselves: Privacy via distributed noise generation
    • C. Dwork, K. Kenthapadi, F.McSherry, I.Mironov, and M. Naor. Our data, ourselves: Privacy via distributed noise generation. In Eurocrypt, pages 486-503, 2006.
    • (2006) Eurocrypt , pp. 486-503
    • Dwork, C.1    Kenthapadi, K.2    McSherry, F.3    Mironov, I.4    Naor, M.5
  • 16
    • 45849122114 scopus 로고    scopus 로고
    • The bikenet mobile sensing system for cyclist experience mapping
    • Sydney, Australia, Nov.
    • S. B. Eisenman et al. The bikenet mobile sensing system for cyclist experience mapping. In Proc. of Sen- Sys'07, Sydney, Australia, Nov. 2007.
    • (2007) Proc. of Sen- Sys'07
    • Eisenman, S.B.1
  • 17
    • 15744373612 scopus 로고    scopus 로고
    • Randomization in privacy preserving data mining
    • December
    • A. Evfimievski. Randomization in privacy preserving data mining. ACM SIGKDD Explorations Newsletter, 4(2):43-48, December 2002.
    • (2002) ACM SIGKDD Explorations Newsletter , vol.4 , Issue.2 , pp. 43-48
    • Evfimievski, A.1
  • 18
    • 0000983892 scopus 로고
    • Masking procedures for microdata disclosure limitation
    • W. A. Fuller. Masking procedures for microdata disclosure limitation. Official Statistics, 9(2):383-406, 1993.
    • (1993) Official Statistics , vol.9 , Issue.2 , pp. 383-406
    • Fuller, W.A.1
  • 19
    • 77954992140 scopus 로고    scopus 로고
    • Greengps: A participatory sensing fuelefficient maps application
    • San Francisco, CA
    • R. K. Ganti, N. Pham, H. Ahmadi, S. Nangia, and T. F. Abdelzaher. Greengps: a participatory sensing fuelefficient maps application. In Proc. of MobiSys'10, pages 151-164, San Francisco, CA, 2010.
    • (2010) Proc. of MobiSys'10 , pp. 151-164
    • Ganti, R.K.1    Pham, N.2    Ahmadi, H.3    Nangia, S.4    Abdelzaher, T.F.5
  • 20
    • 84866489655 scopus 로고    scopus 로고
    • Poolview: Stream privacy for grassroots participatory sensing
    • R. K. Ganti, N. Pham, Y. Tsai, and T. F. Abdelzaher. Poolview: Stream privacy for grassroots participatory sensing. In Proc. of SenSys'08, pages 281-294, 2008.
    • (2008) Proc. of SenSys'08 , pp. 281-294
    • Ganti, R.K.1    Pham, N.2    Tsai, Y.3    Abdelzaher, T.F.4
  • 21
    • 85162603715 scopus 로고    scopus 로고
    • Fuel consumption data set
    • GreenGPS Data Set. Fuel consumption data set. http://smart-attire.cs. uiuc.edu/raghukiran/obd/.
    • GreenGPS Data Set
  • 22
    • 29844458622 scopus 로고    scopus 로고
    • Deriving private information fromrandomized data
    • Z. Huang,W. Du, and B. Chen. Deriving private information fromrandomized data. In Proc. of SIGMOD'05, pages 37-48, 2005.
    • (2005) Proc. of SIGMOD'05 , pp. 37-48
    • Huang, Z.1    Du, W.2    Chen, B.3
  • 24
    • 85024429815 scopus 로고
    • A new approach to linear filtering and prediction problems
    • R. E. Kalman. A new approach to linear filtering and prediction problems. Trans. of the ASME-Journal of Basic Eng., 82(Series D):35-45, 1960.
    • (1960) Trans. of the ASME-Journal of Basic Eng. , vol.82 , Issue.SERIES D , pp. 35-45
    • Kalman, R.E.1
  • 25
    • 78149340011 scopus 로고    scopus 로고
    • On the privacy preserving properties of random data perturbation techniques
    • H. Kargupta, S. Datta, Q.Wang, and K. Sivakumar. On the privacy preserving properties of random data perturbation techniques. In Proc. of ICDM, page 99, 2003.
    • (2003) Proc. of ICDM , pp. 99
    • Kargupta, H.1    Datta, S.2    Wang, Q.3    Sivakumar, K.4
  • 26
    • 20744460179 scopus 로고    scopus 로고
    • Secure regression on distributed databases
    • A. F. Karr et al. Secure regression on distributed databases. J. Computational and Graphical Statist, 14:263-279, 2004.
    • (2004) J. Computational and Graphical Statist , vol.14 , pp. 263-279
    • Karr, A.F.1
  • 28
    • 85162582887 scopus 로고    scopus 로고
    • KNITRO. http://www.ziena.com/knitro.htm.
  • 31
    • 0022130080 scopus 로고
    • A data distortion by probability distribution
    • C. K. Liew, U. J. Choi, and C. J. Liew. A data distortion by probability distribution. ACM Trans. Database Syst., 10(3):395-411, 1985.
    • (1985) ACM Trans. Database Syst. , vol.10 , Issue.3 , pp. 395-411
    • Liew, C.K.1    Choi, U.J.2    Liew, C.J.3
  • 34
    • 79958737442 scopus 로고    scopus 로고
    • Privacy-preserving reconstruction of multidimensional datamaps in vehicular participatory sensing
    • Coimbra, Portugal, Feb.
    • N. Pham, R. Ganti, M. Y. Uddin, S. Nath, and T. Abdelzaher. Privacy-preserving reconstruction of multidimensional datamaps in vehicular participatory sensing. In Proc. of EWSN'10, Coimbra, Portugal, Feb. 2010.
    • (2010) Proc. of EWSN'10
    • Pham, N.1    Ganti, R.2    Uddin, M.Y.3    Nath, S.4    Abdelzaher, T.5
  • 35
    • 4544312695 scopus 로고    scopus 로고
    • Cryptographic techniques for privacypreserving data mining
    • B. Pinkas. Cryptographic techniques for privacypreserving data mining. SIGKDD Explor. Newsl., 4(2):12-19, 2002.
    • (2002) SIGKDD Explor. Newsl. , vol.4 , Issue.2 , pp. 12-19
    • Pinkas, B.1
  • 36
    • 77954711910 scopus 로고    scopus 로고
    • Differentially private aggregation of distributed time-series with transformation and encryption
    • V. Rastogi and S. Nath. Differentially private aggregation of distributed time-series with transformation and encryption. In Proc. of SIGMOD'10, 2010.
    • (2010) Proc. of SIGMOD'10
    • Rastogi, V.1    Nath, S.2
  • 37
    • 0001223006 scopus 로고
    • Computationally related problems
    • S. Sahni. Computationally related problems. SIAM Journal on Computing, 3(4):262-279, 1974.
    • (1974) SIAM Journal on Computing , vol.3 , Issue.4 , pp. 262-279
    • Sahni, S.1
  • 38
    • 12244286332 scopus 로고    scopus 로고
    • Privacy preserving regressionmodelling via distributed computation
    • A. P. Sanil, A. F. Karr, X. Lin, and J. P. Reiter. Privacy preserving regressionmodelling via distributed computation. In Proc. of KDD'04, pages 677-682, 2004.
    • (2004) Proc. of KDD'04 , pp. 677-682
    • Sanil, A.P.1    Karr, A.F.2    Lin, X.3    Reiter, J.P.4
  • 39
    • 0242709355 scopus 로고    scopus 로고
    • Privacy preserving association rule mining in vertically partitioned data
    • Edmonton, Canada
    • J. Vaidya and C. Clifton. Privacy preserving association rule mining in vertically partitioned data. In Proc. of KDD'02, pages 639-644, Edmonton, Canada, 2002.
    • (2002) Proc. of KDD'02 , pp. 639-644
    • Vaidya, J.1    Clifton, C.2
  • 40
    • 0013776710 scopus 로고
    • Randomized response: A survey technique for eliminating evasive answer bias
    • S. L. Warner. Randomized response: A survey technique for eliminating evasive answer bias. Journal of the American Stat. Assoc., 60(309):63-69, 1965.
    • (1965) Journal of the American Stat. Assoc. , vol.60 , Issue.309 , pp. 63-69
    • Warner, S.L.1
  • 41
    • 34250680246 scopus 로고    scopus 로고
    • Personalized privacy preservation
    • June
    • X. Xiao and Y. Tao. Personalized privacy preservation. In Proc. of SIGMOD'06, pages 229-240, June 2006.
    • (2006) Proc. of SIGMOD'06 , pp. 229-240
    • Xiao, X.1    Tao, Y.2
  • 42
    • 0020312165 scopus 로고
    • Protocols for secure computations (extended abstract)
    • A. C.-C. Yao. Protocols for secure computations (extended abstract). In FOCS, pages 160-164, 1982.
    • (1982) FOCS , pp. 160-164
    • Yao, A.C.-C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.