메뉴 건너뛰기




Volumn , Issue , 2014, Pages 499-510

Privacy preserving similarity evaluation of time series data

Author keywords

Privacy preserving; Similarity; Time series database

Indexed keywords

CRYPTOGRAPHY; DATA PRIVACY; DATABASE SYSTEMS; FUNCTION EVALUATION; TIME SERIES;

EID: 85014376145     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.5441/002/edbt.2014.45     Document Type: Conference Paper
Times cited : (27)

References (39)
  • 2
    • 1642327704 scopus 로고    scopus 로고
    • Secure and private sequence comparisons
    • M. J. Atallah, F. Kerschbaum, and W. Du. Secure and private sequence comparisons. In WPES, pages 39-44, 2003.
    • (2003) WPES , pp. 39-44
    • Atallah, M.J.1    Kerschbaum, F.2    Du, W.3
  • 4
    • 85135872226 scopus 로고    scopus 로고
    • On the marriage of lp-norms and edit distance
    • L. Chen and R. T. Ng. On the marriage of lp-norms and edit distance. In VLDB, pages 792-803, 2004.
    • (2004) VLDB , pp. 792-803
    • Chen, L.1    Ng, R.T.2
  • 5
    • 84861595370 scopus 로고    scopus 로고
    • Publishing set-valued data via differential privacy
    • R. Chen, N. Mohammed, B. C. M. Fung, B. C. Desai, and L. Xiong. Publishing set-valued data via differential privacy. PVLDB, 4(11), 2011.
    • (2011) PVLDB , vol.4 , Issue.11
    • Chen, R.1    Mohammed, N.2    Fung, B.C.M.3    Desai, B.C.4    Xiong, L.5
  • 7
    • 33750795715 scopus 로고
    • Computing discrete fréchet distance
    • Technische UniversitÃd'Wien
    • T. Eiter and H. Mannila. Computing discrete fréchet distance. Technical Report CD-TR 94/64, Technische UniversitÃd'Wien, 1994.
    • (1994) Technical Report CD-TR 94/64
    • Eiter, T.1    Mannila, H.2
  • 9
    • 78650518102 scopus 로고    scopus 로고
    • Boosting the accuracy of differentially private histograms through consistency
    • M. Hay, V. Rastogi, G. Miklau, and D. Suciu. Boosting the accuracy of differentially private histograms through consistency. PVLDB, 3(1):1021-1032, 2010.
    • (2010) PVLDB , vol.3 , Issue.1 , pp. 1021-1032
    • Hay, M.1    Rastogi, V.2    Miklau, G.3    Suciu, D.4
  • 11
    • 84863503836 scopus 로고    scopus 로고
    • Differentially private search log sanitization with optimal output utility
    • Y. Hong, J. Vaidya, H. Lu, and M. Wu. Differentially private search log sanitization with optimal output utility. In EDBT, pages 50-61, 2012.
    • (2012) EDBT , pp. 50-61
    • Hong, Y.1    Vaidya, J.2    Lu, H.3    Wu, M.4
  • 12
    • 79957834847 scopus 로고    scopus 로고
    • Processing private queries over untrusted data cloud through privacy homomorphism
    • H. Hu, J. Xu, C. Ren, and B. Choi. Processing private queries over untrusted data cloud through privacy homomorphism. In ICDE, pages 601-612, 2011.
    • (2011) ICDE , pp. 601-612
    • Hu, H.1    Xu, J.2    Ren, C.3    Choi, B.4
  • 14
    • 84923318201 scopus 로고    scopus 로고
    • Efficient privacy-preserving biometric identification
    • Y. Huang, L. Malka, D. Evans, and J. Katz. Efficient privacy-preserving biometric identification. In NDSS, 2011.
    • (2011) NDSS
    • Huang, Y.1    Malka, L.2    Evans, D.3    Katz, J.4
  • 16
    • 77952279809 scopus 로고    scopus 로고
    • Private record matching using differential privacy
    • A. Inan, M. Kantarcioglu, G. Ghinita, and E. Bertino. Private record matching using differential privacy. In EDBT, pages 123-134, 2010.
    • (2010) EDBT , pp. 123-134
    • Inan, A.1    Kantarcioglu, M.2    Ghinita, G.3    Bertino, E.4
  • 17
    • 68849096248 scopus 로고    scopus 로고
    • Secure hamming distance based computation and its applications
    • A. Jarrous and B. Pinkas. Secure hamming distance based computation and its applications. In ACNS, pages 107-124, 2009.
    • (2009) ACNS , pp. 107-124
    • Jarrous, A.1    Pinkas, B.2
  • 19
    • 71749085624 scopus 로고    scopus 로고
    • Formal anonymity models for efficient privacy-preserving joins
    • M. Kantarcioglu, A. Inan, W. Jiang, and B. Malin. Formal anonymity models for efficient privacy-preserving joins. Data Knowl. Eng., 68(11):1206-1223, 2009.
    • (2009) Data Knowl. Eng. , vol.68 , Issue.11 , pp. 1206-1223
    • Kantarcioglu, M.1    Inan, A.2    Jiang, W.3    Malin, B.4
  • 20
    • 0242497349 scopus 로고    scopus 로고
    • Exact indexing of dynamic time warping
    • E. J. Keogh. Exact indexing of dynamic time warping. In VLDB, pages 406-417, 2002.
    • (2002) VLDB , pp. 406-417
    • Keogh, E.J.1
  • 21
    • 71549170830 scopus 로고    scopus 로고
    • Improved garbled circuit building blocks and applications to auctions and computing minima
    • V. Kolesnikov, A.-R. Sadeghi, and T. Schneider. Improved garbled circuit building blocks and applications to auctions and computing minima. In CANS, pages 1-20, 2009.
    • (2009) CANS , pp. 1-20
    • Kolesnikov, V.1    Sadeghi, A.-R.2    Schneider, T.3
  • 22
    • 49049099825 scopus 로고    scopus 로고
    • Improved garbled circuit: Free XOR gates and applications
    • V. Kolesnikov and T. Schneider. Improved garbled circuit: Free xor gates and applications. In ICALP (2), pages 486-498, 2008.
    • (2008) ICALP (2) , pp. 486-498
    • Kolesnikov, V.1    Schneider, T.2
  • 23
    • 84863733988 scopus 로고    scopus 로고
    • An adaptive mechanism for accurate query answering under differential privacy
    • C. Li and G. Miklau. An adaptive mechanism for accurate query answering under differential privacy. PVLDB, 5(6):514-525, 2012.
    • (2012) PVLDB , vol.5 , Issue.6 , pp. 514-525
    • Li, C.1    Miklau, G.2
  • 25
    • 77955176662 scopus 로고    scopus 로고
    • Efficient privacy-preserving similar document detection
    • M. Murugesan, W. Jiang, C. Clifton, L. Si, and J. Vaidya. Efficient privacy-preserving similar document detection. VLDB J., 19(4):457-475, 2010.
    • (2010) VLDB J. , vol.19 , Issue.4 , pp. 457-475
    • Murugesan, M.1    Jiang, W.2    Clifton, C.3    Si, L.4    Vaidya, J.5
  • 27
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In EUROCRYPT, pages 223-238, 1999.
    • (1999) EUROCRYPT , pp. 223-238
    • Paillier, P.1
  • 28
    • 79955911586 scopus 로고    scopus 로고
    • Nearest neighbor search with strong location privacy
    • S. Papadopoulos, S. Bakiras, and D. Papadias. Nearest neighbor search with strong location privacy. PVLDB, 3(1):619-629, 2010.
    • (2010) PVLDB , vol.3 , Issue.1 , pp. 619-629
    • Papadopoulos, S.1    Bakiras, S.2    Papadias, D.3
  • 29
    • 84864234200 scopus 로고    scopus 로고
    • Privacy-preserving and content-protecting location based queries
    • R. Paulet, M. G. Kaosar, X. Yi, and E. Bertino. Privacy-preserving and content-protecting location based queries. In ICDE, pages 44-53, 2012.
    • (2012) ICDE , pp. 44-53
    • Paulet, R.1    Kaosar, M.G.2    Yi, X.3    Bertino, E.4
  • 30
    • 77954711910 scopus 로고    scopus 로고
    • Differentially private aggregation of distributed time-series with transformation and encryption
    • V. Rastogi and S. Nath. Differentially private aggregation of distributed time-series with transformation and encryption. In SIGMOD Conference, pages 735-746, 2010.
    • (2010) SIGMOD Conference , pp. 735-746
    • Rastogi, V.1    Nath, S.2
  • 31
    • 79956295637 scopus 로고    scopus 로고
    • Some notions of entropy for cryptography - (invited talk)
    • L. Reyzin. Some notions of entropy for cryptography - (invited talk). In ICITS, pages 138-142, 2011.
    • (2011) ICITS , pp. 138-142
    • Reyzin, L.1
  • 34
    • 19544394594 scopus 로고    scopus 로고
    • Privacy-preserving outlier detection
    • J. Vaidya and C. Clifton. Privacy-preserving outlier detection. In ICDM, pages 233-240, 2004.
    • (2004) ICDM , pp. 233-240
    • Vaidya, J.1    Clifton, C.2
  • 35
    • 84872397385 scopus 로고    scopus 로고
    • Experimental comparison of representation methods and distance measures for time series data
    • X. Wang, A. Mueen, H. Ding, G. Trajcevski, P. Scheuermann, and E. J. Keogh. Experimental comparison of representation methods and distance measures for time series data. Data Min. Knowl. Discov., 26(2):275-309, 2013.
    • (2013) Data Min. Knowl. Discov. , vol.26 , Issue.2 , pp. 275-309
    • Wang, X.1    Mueen, A.2    Ding, H.3    Trajcevski, G.4    Scheuermann, P.5    Keogh, E.J.6
  • 36
    • 77952787160 scopus 로고    scopus 로고
    • Differential privacy via wavelet transforms
    • X. Xiao, G. Wang, and J. Gehrke. Differential privacy via wavelet transforms. In ICDE, pages 225-236, 2010.
    • (2010) ICDE , pp. 225-236
    • Xiao, X.1    Wang, G.2    Gehrke, J.3
  • 37
    • 84864195481 scopus 로고    scopus 로고
    • Differentially private histogram publication
    • J. Xu, Z. Zhang, X. Xiao, Y. Yang, and G. Yu. Differentially private histogram publication. In ICDE, pages 32-43, 2012.
    • (2012) ICDE , pp. 32-43
    • Xu, J.1    Zhang, Z.2    Xiao, X.3    Yang, Y.4    Yu, G.5
  • 38
    • 77956200067 scopus 로고    scopus 로고
    • Collusion-resistant privacy-preserving data mining
    • B. Yang, H. Nakagawa, I. Sato, and J. Sakuma. Collusion-resistant privacy-preserving data mining. In KDD, pages 483-492, 2010.
    • (2010) KDD , pp. 483-492
    • Yang, B.1    Nakagawa, H.2    Sato, I.3    Sakuma, J.4
  • 39
    • 0020312165 scopus 로고
    • Protocols for secure computations
    • A. C.-C. Yao. Protocols for secure computations. In FOCS, pages 160-164, 1982.
    • (1982) FOCS , pp. 160-164
    • Yao, A.C.-C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.