메뉴 건너뛰기




Volumn 8, Issue 12, 2013, Pages 2021-2033

Extended capabilities for a privacy-enhanced participatory sensing infrastructure (PEPSI)

Author keywords

Participatory sensing; Privacy; Security

Indexed keywords

COMMUNICATION OVERHEADS; COMPUTATIONAL COSTS; INNOVATIVE COMPUTING; LARGE-SCALE DEPLOYMENT; PARTICIPATORY SENSING; PERSONAL INFORMATION; SECURITY; TRAFFIC CONDITIONS;

EID: 84888309373     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2013.2287092     Document Type: Article
Times cited : (59)

References (52)
  • 4
    • 77954977772 scopus 로고    scopus 로고
    • Stanford University Stanford, CA, USA [Online]. Available
    • Stanford University. (2010). Quake-Catcher Network, Stanford, CA, USA [Online]. Available: http://qcn.stanford.edu
    • (2010) Quake-Catcher Network
  • 5
    • 45849092597 scopus 로고    scopus 로고
    • Automatic collection of fuel prices from a network of mobile cameras
    • Jun
    • Y. Dong, S. S. Kanhere, C. T. Chou, and N. Bulusu, "Automatic collection of fuel prices from a network of mobile cameras," in Proc. 4th IEEE Int. Conf. DCOSS, Jun. 2008, pp. 140-156.
    • (2008) Proc. 4th IEEE Int. Conf. DCOSS , pp. 140-156
    • Dong, Y.1    Kanhere, S.S.2    Chou, C.T.3    Bulusu, N.4
  • 6
    • 84891364043 scopus 로고    scopus 로고
    • MobiShop: Using mobile phones for sharing consumer pricing information
    • S. Sehgal, S. S. Kanhere, and C. T. Chou, "MobiShop: Using mobile phones for sharing consumer pricing information," in Proc. DCOSS, 2008, pp. 1-2.
    • (2008) Proc. DCOSS , pp. 1-2
    • Sehgal, S.1    Kanhere, S.S.2    Chou, C.T.3
  • 7
    • 77956355366 scopus 로고    scopus 로고
    • Nokia Research Center Sunnyvale, CA, USA [Online]. Available
    • Nokia Research Center. (2010). SensorPlanet, Sunnyvale, CA, USA [Online]. Available: http://research.nokia.com/research/ projects/sensorplanet
    • (2010) SensorPlanet
  • 11
    • 77954021717 scopus 로고    scopus 로고
    • Four billion little brothers?: Privacy, mobile phones, and ubiquitous data collection
    • Aug.
    • K. Shilton, "Four billion little brothers?: Privacy, mobile phones, and ubiquitous data collection," Commun. ACM, vol. 52, no. 11, pp. 48-53, Aug. 2009.
    • (2009) Commun. ACM , vol.52 , Issue.11 , pp. 48-53
    • Shilton, K.1
  • 13
    • 77958449487 scopus 로고    scopus 로고
    • Security and privacy objectives for sensing applications in wireless community networks
    • Aug
    • D. Christin, M. Hollick, and M. Manulis, "Security and privacy objectives for sensing applications in wireless community networks," in Proc. IEEE ICCCN, Aug. 2010, pp. 1-6.
    • (2010) Proc. IEEE ICCCN , pp. 1-6
    • Christin, D.1    Hollick, M.2    Manulis, M.3
  • 14
    • 80052696161 scopus 로고    scopus 로고
    • A survey on privacy in mobile participatory sensing applications
    • D. Christin, A. Reinhardt, S. S. Kanhere, and M. Hollick, "A survey on privacy in mobile participatory sensing applications," J. Syst. Softw., vol. 84, no. 11, pp. 1928-1946, 2011.
    • (2011) J. Syst. Softw. , vol.84 , Issue.11 , pp. 1928-1946
    • Christin, D.1    Reinhardt, A.2    Kanhere, S.S.3    Hollick, M.4
  • 17
    • 77955274113 scopus 로고    scopus 로고
    • Preserving privacy in participatory sensing systems
    • Jul.
    • K. L. Huang, S. S. Kanhere, and W. Hu, "Preserving privacy in participatory sensing systems," Comput. Commun., vol. 33, no. 11, pp. 1266-1280, Jul. 2010.
    • (2010) Comput. Commun. , vol.33 , Issue.11 , pp. 1266-1280
    • Huang, K.L.1    Kanhere, S.S.2    Hu, W.3
  • 18
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • Feb.
    • D. L. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms," Commun. ACM, vol. 24, no. 2, pp. 84-88, Feb. 1981.
    • (1981) Commun. ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.L.1
  • 21
    • 84870510126 scopus 로고    scopus 로고
    • Virtual individual servers as privacy-preserving proxies for mobile devices
    • Syst., Appl Mobile Handhelds
    • R. Cáceres, L. P. Cox, H. Lim, A. Shakimov, and A. Varshavsky, "Virtual individual servers as privacy-preserving proxies for mobile devices," in Proc. 1st ACM Workshop Netw., Syst., Appl. Mobile Handhelds, 2009, pp. 37-42.
    • (2009) Proc. 1st ACM Workshop Netw. , pp. 37-42
    • Cáceres, R.1    Cox, L.P.2    Lim, H.3    Shakimov, A.4    Varshavsky, A.5
  • 24
    • 77953308558 scopus 로고    scopus 로고
    • PriSense: Privacy-preserving data aggregation in people-centric urban sensing systems
    • Mar
    • J. Shi, R. Zhang, Y. Liu, and Y. Zhang, "PriSense: Privacy-preserving data aggregation in people-centric urban sensing systems," in Proc. IEEE INFOCOM, Mar. 2010, pp. 758-766.
    • (2010) Proc. IEEE INFOCOM , pp. 758-766
    • Shi, J.1    Zhang, R.2    Liu, Y.3    Zhang, Y.4
  • 29
    • 85076493348 scopus 로고    scopus 로고
    • The phantom tollbooth: Privacy-preserving electronic toll collection in the presence of driver collusion
    • S. Meiklejohn, K. Mowery, S. Checkoway, and H. Shacham, "The phantom tollbooth: Privacy-preserving electronic toll collection in the presence of driver collusion," in Proc. USENIX Sec. Symp., 2011, pp. 1-16.
    • (2011) Proc. USENIX Sec. Symp. , pp. 1-16
    • Meiklejohn, S.1    Mowery, K.2    Checkoway, S.3    Shacham, H.4
  • 30
    • 84874324906 scopus 로고    scopus 로고
    • Identity-Based Encryption from the Weil Pairing
    • Advances in Cryptology - CRYPTO 2001
    • D. Boneh and M. K. Franklin, "Identity-based encryption from the Weil pairing," in Proc. 21st Annu. Int. Cryptol. Conf., Aug. 2001, pp. 213-229. (Pubitemid 33317917)
    • (2001) Lecture Notes In Computer Science , Issue.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 31
    • 38149091799 scopus 로고    scopus 로고
    • Blind identity-based encryption and simulatable oblivious transfer
    • New York NY, USA: Springer-Verlag, Jun
    • M. Green and S. Hohenberger, "Blind identity-based encryption and simulatable oblivious transfer," in ASIACRYPT. New York, NY, USA: Springer-Verlag, Jun. 2007, pp. 265-282.
    • (2007) ASIACRYPT , pp. 265-282
    • Green, M.1    Hohenberger, S.2
  • 32
    • 24144488603 scopus 로고    scopus 로고
    • Keyword search and oblivious pseudorandom functions
    • Theory of Cryptography - Second Theory of Cryptography Conference, TCC 2005
    • M. J. Freedman, Y. Ishai, B. Pinkas, and O. Reingold, "Keyword search and oblivious pseudorandom functions," in Theory of Cryptography, New York, NY, USA: Springer-Verlag, 2005, pp. 303-324. (Pubitemid 41231171)
    • (2005) Lecture Notes in Computer Science , vol.3378 , pp. 303-324
    • Freedman, M.J.1    Ishai, Y.2    Pinkas, B.3    Reingold, O.4
  • 33
    • 0031332843 scopus 로고    scopus 로고
    • Number-theoretic constructions of efficient pseudo-random functions
    • M. Naor and O. Reingold, "Number-theoretic constructions of efficient pseudo-random functions," in Proc. FOCS, 1997, pp. 458-467.
    • (1997) Proc. FOCS , pp. 458-467
    • Naor, M.1    Reingold, O.2
  • 34
    • 67650320950 scopus 로고    scopus 로고
    • A survey of computational location privacy
    • Aug
    • J. Krumm, "A survey of computational location privacy," Pers. Ubiquitous Comput., vol. 13, no. 6, pp. 391-399, Aug. 2009.
    • (2009) Pers. Ubiquitous Comput. , vol.13 , Issue.6 , pp. 391-399
    • Krumm, J.1
  • 35
    • 2942524994 scopus 로고    scopus 로고
    • Location privacy in pervasive computing
    • Jan.
    • A. Beresford and F. Stajano, "Location privacy in pervasive computing," IEEE Pervas. Comput., vol. 2, no. 1, pp. 46-55, Jan. 2003.
    • (2003) IEEE Pervas. Comput. , vol.2 , Issue.1 , pp. 46-55
    • Beresford, A.1    Stajano, F.2
  • 38
    • 77958056561 scopus 로고    scopus 로고
    • Fast secure computation of set intersection
    • S. Jarecki and X. Liu, "Fast secure computation of set intersection," in Proc. 7th Int. Conf. SCN, 2010, pp. 418-435.
    • (2010) Proc. 7th Int. Conf. SCN , pp. 418-435
    • Jarecki, S.1    Liu, X.2
  • 39
    • 79960850152 scopus 로고    scopus 로고
    • Privacy-preserving multi-keyword ranked search over encrypted cloud data
    • Apr
    • N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, "Privacy-preserving multi-keyword ranked search over encrypted cloud data," in Proc. IEEE INFOCOM, Apr. 2011, pp. 829-837.
    • (2011) Proc. IEEE INFOCOM , pp. 829-837
    • Cao, N.1    Wang, C.2    Li, M.3    Ren, K.4    Lou, W.5
  • 41
    • 84888336663 scopus 로고    scopus 로고
    • Salus: A system for server-aided secure function evaluation
    • S. Kamara, P. Mohassel, and B. Riva, "Salus: A system for server-aided secure function evaluation," in Proc. CCS, 2012, pp. 1-26.
    • (2012) Proc. CCS , pp. 1-26
    • Kamara, S.1    Mohassel, P.2    Riva, B.3
  • 42
    • 84883080924 scopus 로고    scopus 로고
    • ARTSense: Anonymous reputation and trust in participatory sensing
    • X. O. Wang, W. Cheng, P. Mohapatra, and T. Abdelzaher, "ARTSense: Anonymous reputation and trust in participatory sensing," in Proc. INFOCOM, 2013, pp. 1-9.
    • (2013) Proc. INFOCOM , pp. 1-9
    • Wang, X.O.1    Cheng, W.2    Mohapatra, P.3    Abdelzaher, T.4
  • 43
    • 84943315771 scopus 로고    scopus 로고
    • Are you contributing trustworthy data? The case for a reputation system in participatory sensing
    • K. L. Huang, S. S. Kanhere, and W. Hu, "Are you contributing trustworthy data? The case for a reputation system in participatory sensing," in Proc. MSWiM, 2010, pp. 1-9.
    • (2010) Proc. MSWiM , pp. 1-9
    • Huang, K.L.1    Kanhere, S.S.2    Hu, W.3
  • 44
    • 62449110159 scopus 로고    scopus 로고
    • Static security optimization for real time systems
    • Feb.
    • M. Lin, L. Xu, L. T. Yang, X. Qin, N. Zheng, Z. Wu, et al., "Static security optimization for real time systems," IEEE Trans. Ind. Inf., vol. 5, no. 1, pp. 22-37, Feb. 2009.
    • (2009) IEEE Trans. Ind. Inf. , vol.5 , Issue.1 , pp. 22-37
    • Lin, M.1    Xu, L.2    Yang, L.T.3    Qin, X.4    Zheng, N.5    Wu, Z.6
  • 45
    • 33645215766 scopus 로고    scopus 로고
    • Security protection and checking for embedded system integration against buffer overflow attacks via hardware/software
    • Apr.
    • Z. Shao, C. Xue, Q. Zhuge, M. K. Q. Xiao, and E. H.-M. Sha, "Security protection and checking for embedded system integration against buffer overflow attacks via hardware/software," IEEE Trans. Comput., vol. 55, no. 4, pp. 443-453, Apr. 2006.
    • (2006) IEEE Trans. Comput. , vol.55 , Issue.4 , pp. 443-453
    • Shao, Z.1    Xue, C.2    Zhuge, Q.3    Xiao, M.K.Q.4    Sha, E.H.-M.5
  • 46
    • 84875212881 scopus 로고    scopus 로고
    • Securityaware optimization for ubiquitous computing systems with seat graph approach
    • M. Qiu, L. Zhang, Z. Ming, Z. Chen, X. Qin, and L. T. Yang, "Securityaware optimization for ubiquitous computing systems with seat graph approach," J. Comput. Syst. Sci., vol. 79, no. 5, pp. 518-529, 2013.
    • (2013) J. Comput. Syst. Sci. , vol.79 , Issue.5 , pp. 518-529
    • Qiu, M.1    Zhang, L.2    Ming, Z.3    Chen, Z.4    Qin, X.5    Yang, L.T.6
  • 47
    • 20544449100 scopus 로고    scopus 로고
    • The one-more-RSA-inversion problems and the security of chaum's blind signature scheme
    • DOI 10.1007/s00145-002-0120-1
    • M. Bellare, C. Namprempre, D. Pointcheval, and M. Semanko, "The one-more-RSA-inversion problems and the security of Chaum's blind signature scheme," J. Cryptol., vol.16, no. 3, pp. 185-215, 2003. (Pubitemid 41201209)
    • (2003) Journal of Cryptology , vol.16 , Issue.3 , pp. 185-215
    • Bellare, M.1    Namprempre, C.2    Pointcheval, D.3    Semanko, M.4
  • 52
    • 33846834126 scopus 로고    scopus 로고
    • A survey of trust and reputation systems for online service provision
    • DOI 10.1016/j.dss.2005.05.019, PII S0167923605000849
    • A. Jøsang, R. Ismail, and C. Boyd, "A survey of trust and reputation systems for online service provision," Decision Support Syst., vol. 43, no. 2, pp. 618-644, 2007. (Pubitemid 46216533)
    • (2007) Decision Support Systems , vol.43 , Issue.2 , pp. 618-644
    • Josang, A.1    Ismail, R.2    Boyd, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.