메뉴 건너뛰기




Volumn 2016-July, Issue , 2016, Pages

Privacy-preserving verifiable data aggregation and analysis for cloud-assisted mobile crowdsourcing

Author keywords

Cloud Computing; Mobile Crowdsourcing; Security and Privacy; Verifiable Computation

Indexed keywords

AGGREGATES; CLOUD COMPUTING; CROWDSOURCING; DIGITAL STORAGE; SMARTPHONES;

EID: 84983314455     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFOCOM.2016.7524547     Document Type: Conference Paper
Times cited : (76)

References (34)
  • 2
    • 84904437867 scopus 로고    scopus 로고
    • Privacy-preserving highquality map generation with participatory sensing
    • X. Chen, X. Wu, X.-Y. Li, Y. He, and Y. Liu, "Privacy-preserving highquality map generation with participatory sensing," in INFOCOM, 2014 Proceedings IEEE. IEEE, 2014, pp. 2310-2318.
    • (2014) INFOCOM, 2014 Proceedings IEEE. IEEE , pp. 2310-2318
    • Chen, X.1    Wu, X.2    Li, X.-Y.3    He, Y.4    Liu, Y.5
  • 5
    • 84898685015 scopus 로고    scopus 로고
    • Efficient and privacy-aware data aggregation in mobile sensing
    • March
    • Q. Li, G. Cao, and T. La Porta, "Efficient and privacy-aware data aggregation in mobile sensing," Dependable and Secure Computing, IEEE Transactions on, vol. 11, no. 2, pp. 115-129, March 2014.
    • (2014) Dependable and Secure Computing, IEEE Transactions on , vol.11 , Issue.2 , pp. 115-129
    • Li, Q.1    Cao, G.2    La Porta, T.3
  • 6
    • 84883432332 scopus 로고    scopus 로고
    • Verifiable privacy-preserving aggregation in people-centric urban sensing systems
    • September
    • R. Zhang, J. Shi, Y. Zhang, and C. Zhang, "Verifiable privacy-preserving aggregation in people-centric urban sensing systems," Selected Areas in Communications, IEEE Journal on, vol. 31, no. 9, pp. 268-278, September 2013.
    • (2013) Selected Areas in Communications, IEEE Journal on , vol.31 , Issue.9 , pp. 268-278
    • Zhang, R.1    Shi, J.2    Zhang, Y.3    Zhang, C.4
  • 7
    • 84958038878 scopus 로고    scopus 로고
    • Crowdsourcing in cyber-physical systems: Stochastic optimization with strong stability
    • M. Li and P. Li, "Crowdsourcing in cyber-physical systems: Stochastic optimization with strong stability," Emerging Topics in Computing, IEEE Transactions on, vol. 1, no. 2, pp. 218-231, 2013.
    • (2013) Emerging Topics in Computing, IEEE Transactions on , vol.1 , Issue.2 , pp. 218-231
    • Li, M.1    Li, P.2
  • 9
    • 85041436451 scopus 로고    scopus 로고
    • Ppdm: Privacy-preserving protocol for dynamic medical text mining and image feature extraction from secure data aggregation in cloud-assisted e-healthcare systems
    • J. Zhou, Z. Cao, X. Dong, and X. Lin, "Ppdm: Privacy-preserving protocol for dynamic medical text mining and image feature extraction from secure data aggregation in cloud-assisted e-healthcare systems," Selected Topics in Signal Processing, IEEE Journal of, vol. PP, no. 99, pp. 1-1, 2015.
    • (2015) Selected Topics in Signal Processing, IEEE Journal of , Issue.99 , pp. 1
    • Zhou, J.1    Cao, Z.2    Dong, X.3    Lin, X.4
  • 13
    • 84904430840 scopus 로고    scopus 로고
    • Fine: A fine-grained privacy-preserving location-based service framework for mobile devices
    • J. Shao, R. Lu, and X. Lin, "Fine: A fine-grained privacy-preserving location-based service framework for mobile devices," in INFOCOM, 2014 Proceedings IEEE. IEEE, 2014, pp. 244-252.
    • (2014) INFOCOM, 2014 Proceedings IEEE. IEEE , pp. 244-252
    • Shao, J.1    Lu, R.2    Lin, X.3
  • 16
    • 85075489334 scopus 로고    scopus 로고
    • Privacypreserving aggregation of time-series data
    • E. Shi, T.-H. H. Chan, E. G. Rieffel, R. Chow, and D. Song, "Privacypreserving aggregation of time-series data." in NDSS, vol. 2, no. 3, 2011, p. 4.
    • (2011) NDSS , vol.2 , Issue.3 , pp. 4
    • Shi, E.1    Chan, T.-H.H.2    Rieffel, E.G.3    Chow, R.4    Song, D.5
  • 18
    • 77957005936 scopus 로고    scopus 로고
    • Non-interactive verifiable computing: Outsourcing computation to untrusted workers
    • Springer
    • R. Gennaro, C. Gentry, and B. Parno, "Non-interactive verifiable computing: Outsourcing computation to untrusted workers," in Advances in Cryptology-CRYPTO 2010. Springer, 2010, pp. 465-482.
    • (2010) Advances in Cryptology-CRYPTO 2010 , pp. 465-482
    • Gennaro, R.1    Gentry, C.2    Parno, B.3
  • 19
  • 22
    • 84954232998 scopus 로고    scopus 로고
    • Verifiable privacy-preserving monitoring for cloud-assisted mhealth systems
    • L. Guo, Y. Fang, M. Li, and P. Li, "Verifiable privacy-preserving monitoring for cloud-assisted mhealth systems," in INFOCOM, 2015 Proceedings IEEE. IEEE, 2015.
    • (2015) INFOCOM, 2015 Proceedings IEEE. IEEE
    • Guo, L.1    Fang, Y.2    Li, M.3    Li, P.4
  • 23
    • 84964898936 scopus 로고    scopus 로고
    • Privacy-preserving verifiable proximity test for location-based services
    • San Diego, USA, Dec
    • G. Zhuo, Q. Jia, L. Guo, M. Li, and Y. Fang, "Privacy-preserving verifiable proximity test for location-based services," in GC' 15-Security, San Diego, USA, Dec. 2015.
    • (2015) GC' 15-Security
    • Zhuo, G.1    Jia, Q.2    Guo, L.3    Li, M.4    Fang, Y.5
  • 25
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Springer
    • D. Boneh and M. Franklin, "Identity-based encryption from the weil pairing," in Advances in CryptologyCRYPTO 2001. Springer, 2001, pp. 213-229.
    • (2001) Advances in CryptologyCRYPTO 2001 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 27
    • 0027662341 scopus 로고
    • Reducing elliptic curve logarithms to logarithms in a finite field
    • A. J. Menezes, T. Okamoto, S. Vanstone et al., "Reducing elliptic curve logarithms to logarithms in a finite field," Information Theory, IEEE Transactions on, vol. 39, no. 5, pp. 1639-1646, 1993.
    • (1993) Information Theory, IEEE Transactions on , vol.39 , Issue.5 , pp. 1639-1646
    • Menezes, A.J.1    Okamoto, T.2    Vanstone, S.3
  • 29
    • 80051986706 scopus 로고    scopus 로고
    • Fully homomorphic encryption from ring-lwe and security for key dependent messages
    • Springer
    • Z. Brakerski and V. Vaikuntanathan, "Fully homomorphic encryption from ring-lwe and security for key dependent messages," in Advances in Cryptology-CRYPTO 2011. Springer, 2011, pp. 505-524.
    • (2011) Advances in Cryptology-CRYPTO 2011 , pp. 505-524
    • Brakerski, Z.1    Vaikuntanathan, V.2
  • 33
    • 84983291037 scopus 로고    scopus 로고
    • access June 20
    • S. Halevi and V. Shoup, "Helib, http://shaih.github.io/HElib/," access June 20, 2015.
    • (2015) Helib
    • Halevi, S.1    Shoup, V.2
  • 34
    • 84983291024 scopus 로고    scopus 로고
    • access December 31
    • UCLA, "Socr data mlb heightsweights, http://wiki.stat.ucla.edu/socr/ index.php/SOCR Data MLB HeightsWeights," access December 31, 2015.
    • (2015) Socr Data Mlb Heightsweights


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.