메뉴 건너뛰기




Volumn 4, Issue 5, 2017, Pages 1117-1124

LoDPD: A Location Difference-Based Proximity Detection Protocol for Fog Computing

Author keywords

Location privacy; Paillier cryptosystem; privacy preserving; private proximity detecting

Indexed keywords

CRYPTOGRAPHY; DATA PRIVACY;

EID: 85037059583     PISSN: None     EISSN: 23274662     Source Type: Journal    
DOI: 10.1109/JIOT.2017.2670570     Document Type: Article
Times cited : (39)

References (34)
  • 1
    • 85028769214 scopus 로고    scopus 로고
    • Collective data-sanitization for preventing sensitive information inference attacks in social networks
    • to be published
    • Z. Cai, Z. He, X. Guan, and Y. Li, "Collective data-sanitization for preventing sensitive information inference attacks in social networks, " IEEE Trans. Depend. Secure Comput., to be published.
    • IEEE Trans. Depend. Secure Comput.
    • Cai, Z.1    He, Z.2    Guan, X.3    Li, Y.4
  • 2
    • 84963721108 scopus 로고    scopus 로고
    • An incentive mechanism with privacy protection in mobile crowdsourcing systems
    • Jun.
    • Y. Wang et al., "An incentive mechanism with privacy protection in mobile crowdsourcing systems, " Comput. Netw., vol. 102, pp. 157-171, Jun. 2016.
    • (2016) Comput. Netw. , vol.102 , pp. 157-171
    • Wang, Y.1
  • 3
    • 84923117513 scopus 로고    scopus 로고
    • Fog computing: A cloud to the ground support for smart things and machine-to-machine networks
    • Southbank, VIC, Australia
    • I. Stojmenovic, "Fog computing: A cloud to the ground support for smart things and machine-to-machine networks, " in Proc. Aust. Telecommun. Netw. Appl. Conf. (ATNAC), Southbank, VIC, Australia, 2014, pp. 117-122.
    • (2014) Proc. Aust. Telecommun. Netw. Appl. Conf. (ATNAC) , pp. 117-122
    • Stojmenovic, I.1
  • 4
    • 85026428825 scopus 로고    scopus 로고
    • Differentially private k-anonymity: Achieving query privacy in location-based services
    • Beijing, China, Oct.
    • J. Wang et al., "Differentially private k-anonymity: Achieving query privacy in location-based services, " in Proc. Int. Conf. Identification Inf. Knowl. Internet Things (IIKI), Beijing, China, Oct. 2016, pp. 1-6.
    • (2016) Proc. Int. Conf. Identification Inf. Knowl. Internet Things (IIKI) , pp. 1-6
    • Wang, J.1
  • 5
    • 84984820549 scopus 로고    scopus 로고
    • An energy efficient privacy-preserving content sharing scheme in mobile social networks
    • Z. He et al., "An energy efficient privacy-preserving content sharing scheme in mobile social networks, " Pers. Ubiquitous Comput., vol. 20, no. 5, pp. 833-846, 2016.
    • (2016) Pers. Ubiquitous Comput. , vol.20 , Issue.5 , pp. 833-846
    • He, Z.1
  • 6
    • 84876017555 scopus 로고    scopus 로고
    • Harvesting ambient geospatial information from social media feeds
    • A. Stefanidis, A. Crooks, and J. Radzikowski, "Harvesting ambient geospatial information from social media feeds, " GeoJ., vol. 78, no. 2, pp. 319-338, 2013.
    • (2013) GeoJ. , vol.78 , Issue.2 , pp. 319-338
    • Stefanidis, A.1    Crooks, A.2    Radzikowski, J.3
  • 7
    • 84979822702 scopus 로고    scopus 로고
    • The tolls of privacy: An underestimated roadblock for electronic toll collection usage
    • P. F. Riley, "The tolls of privacy: An underestimated roadblock for electronic toll collection usage, " Comput. Law Security Rev., vol. 24, no. 6, pp. 521-528, 2008.
    • (2008) Comput. Law Security Rev. , vol.24 , Issue.6 , pp. 521-528
    • Riley, P.F.1
  • 8
    • 80055052185 scopus 로고    scopus 로고
    • Location-sharing technologies: Privacy risks and controls
    • J. Y. Tsai, P. G. Kelley, L. F. Cranor, and N. Sadeh, "Location-sharing technologies: Privacy risks and controls, " J. Law Policy Inf. Soc., vol. 6, no. 2, p. 119-151, 2010.
    • (2010) J. Law Policy Inf. Soc. , vol.6 , Issue.2 , pp. 119-151
    • Tsai, J.Y.1    Kelley, P.G.2    Cranor, L.F.3    Sadeh, N.4
  • 9
    • 85026410795 scopus 로고    scopus 로고
    • Location-privacy-aware review publication mechanism for local business service systems
    • Atlanta, GA, USA, May
    • X. Zheng, Z. Cai, J. Li, and H. Gao, "Location-privacy-aware review publication mechanism for local business service systems, " in Proc. 36th Annu. IEEE Int. Conf. Comput. Commun. (INFOCOM), Atlanta, GA, USA, May 2017, pp. 1-9.
    • (2017) Proc. 36th Annu. IEEE Int. Conf. Comput. Commun. (INFOCOM) , pp. 1-9
    • Zheng, X.1    Cai, Z.2    Li, J.3    Gao, H.4
  • 11
    • 84992757948 scopus 로고    scopus 로고
    • Spatial generalisation algorithms for LBS privacy preservation
    • S. Mascetti, C. Bettini, D. Freni, and X. S. Wang, "Spatial generalisation algorithms for LBS privacy preservation, " J. Location Based Services, vol. 1, no. 3, pp. 179-207, 2007.
    • (2007) J. Location Based Services , vol.1 , Issue.3 , pp. 179-207
    • Mascetti, S.1    Bettini, C.2    Freni, D.3    Wang, X.S.4
  • 12
    • 35648982949 scopus 로고    scopus 로고
    • Preventing location-based identity inference in anonymous spatial queries
    • Dec.
    • P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias, "Preventing location-based identity inference in anonymous spatial queries, " IEEE Trans. Knowl. Data Eng., vol. 19, no. 12, pp. 1719-1733, Dec. 2007.
    • (2007) IEEE Trans. Knowl. Data Eng. , vol.19 , Issue.12 , pp. 1719-1733
    • Kalnis, P.1    Ghinita, G.2    Mouratidis, K.3    Papadias, D.4
  • 13
    • 84995538989 scopus 로고    scopus 로고
    • Customized privacy preserving for inherent data and latent data
    • Z. He, Z. Cai, Y. Sun, Y. Li, and X. Cheng, "Customized privacy preserving for inherent data and latent data, " Pers. Ubiquitous Comput., vol. 21, no. 1, pp. 43-54, 2017.
    • (2017) Pers. Ubiquitous Comput. , vol.21 , Issue.1 , pp. 43-54
    • He, Z.1    Cai, Z.2    Sun, Y.3    Li, Y.4    Cheng, X.5
  • 14
    • 84976496511 scopus 로고    scopus 로고
    • FakeMask: A novel privacy preserving approach for smartphones
    • Jun.
    • L. Zhang, Z. Cai, and X. Wang, "FakeMask: A novel privacy preserving approach for smartphones, " IEEE Trans. Netw. Service Manag., vol. 13, no. 2, pp. 335-348, Jun. 2016.
    • (2016) IEEE Trans. Netw. Service Manag. , vol.13 , Issue.2 , pp. 335-348
    • Zhang, L.1    Cai, Z.2    Wang, X.3
  • 16
    • 84978034187 scopus 로고    scopus 로고
    • An efficient privacy preserving data aggregation approach for mobile sensing
    • L. Zhang, X. Wang, J. Lu, P. Li, and Z. Cai, "An efficient privacy preserving data aggregation approach for mobile sensing, " Security Commun. Netw., vol. 9, no. 16, pp. 3844-3853, 2016.
    • (2016) Security Commun. Netw. , vol.9 , Issue.16 , pp. 3844-3853
    • Zhang, L.1    Wang, X.2    Lu, J.3    Li, P.4    Cai, Z.5
  • 17
    • 85018204196 scopus 로고    scopus 로고
    • Anonymous usage of location-based services through spatial and temporal cloaking
    • San Francisco, CA, USA
    • M. Gruteser and D. Grunwald, "Anonymous usage of location-based services through spatial and temporal cloaking, " in Proc. 1st Int. Conf. Mobile Syst. Appl. Services, San Francisco, CA, USA, 2003, pp. 31-42.
    • (2003) Proc. 1st Int. Conf. Mobile Syst. Appl. Services , pp. 31-42
    • Gruteser, M.1    Grunwald, D.2
  • 18
    • 67650312114 scopus 로고    scopus 로고
    • On the anonymity of home/work location pairs
    • Nara, Japan
    • P. Golle and K. Partridge, "On the anonymity of home/work location pairs, " in Proc. Int. Conf. Pervasive Comput., Nara, Japan, 2009, pp. 390-397.
    • (2009) Proc. Int. Conf. Pervasive Comput. , pp. 390-397
    • Golle, P.1    Partridge, K.2
  • 19
    • 37849018331 scopus 로고    scopus 로고
    • Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy
    • Boston, MA, USA
    • A. Khoshgozaran and C. Shahabi, "Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy, " in Proc. Int. Symp. Spatial Temporal Databases, Boston, MA, USA, 2007, pp. 239-257.
    • (2007) Proc. Int. Symp. Spatial Temporal Databases , pp. 239-257
    • Khoshgozaran, A.1    Shahabi, C.2
  • 22
    • 79955911586 scopus 로고    scopus 로고
    • Nearest neighbor search with strong location privacy
    • S. Papadopoulos, S. Bakiras, and D. Papadias, "Nearest neighbor search with strong location privacy, " Proc. VLDB Endowment, vol. 3, nos. 1-2, pp. 619-629, 2010.
    • (2010) Proc. VLDB Endowment , vol.3 , Issue.1-2 , pp. 619-629
    • Papadopoulos, S.1    Bakiras, S.2    Papadias, D.3
  • 27
    • 79960453927 scopus 로고    scopus 로고
    • Privacy in geo-social networks: Proximity notification with untrusted service providers and curious buddies
    • S. Mascetti, D. Freni, C. Bettini, X. S. Wang, and S. Jajodia, "Privacy in geo-social networks: Proximity notification with untrusted service providers and curious buddies, " Int. J. Very Large Data Bases, vol. 20, no. 4, pp. 541-566, 2011.
    • (2011) Int. J. Very Large Data Bases , vol.20 , Issue.4 , pp. 541-566
    • Mascetti, S.1    Freni, D.2    Bettini, C.3    Wang, X.S.4    Jajodia, S.5
  • 29
    • 43949118608 scopus 로고    scopus 로고
    • A survey of homomorphic encryption for nonspecialists
    • C. Fontaine and F. Galand, "A survey of homomorphic encryption for nonspecialists, " EURASIP J. Inf. Security, vol. 2007, no. 1, pp. 1-10, 2007.
    • (2007) EURASIP J. Inf. Security , vol.2007 , Issue.1 , pp. 1-10
    • Fontaine, C.1    Galand, F.2
  • 30
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • Prague, Czech Republic
    • P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes, " in Proc. Int. Conf Theory Appl. Cryptograph. Techn., Prague, Czech Republic, 1999, pp. 223-238.
    • (1999) Proc. Int. Conf Theory Appl. Cryptograph. Techn. , pp. 223-238
    • Paillier, P.1
  • 31
    • 84881255209 scopus 로고    scopus 로고
    • Privacy-preserving ridge regression on hundreds of millions of records
    • San Francisco, CA, USA
    • V. Nikolaenko et al., "Privacy-preserving ridge regression on hundreds of millions of records, " in Proc. IEEE Symp. Security Privacy (SP), San Francisco, CA, USA, 2013, pp. 334-348.
    • (2013) Proc. IEEE Symp. Security Privacy (SP) , pp. 334-348
    • Nikolaenko, V.1
  • 32
    • 24944523186 scopus 로고    scopus 로고
    • On private scalar product computation for privacy-preserving data mining
    • Seoul, South Korea
    • B. Goethals, S. Laur, H. Lipmaa, and T. Mielikäinen, "On private scalar product computation for privacy-preserving data mining, " in Proc. Int. Conf. Inf. Security Cryptol., Seoul, South Korea, 2004, pp. 104-120.
    • (2004) Proc. Int. Conf. Inf. Security Cryptol. , pp. 104-120
    • Goethals, B.1    Laur, S.2    Lipmaa, H.3    Mielikäinen, T.4
  • 33
    • 84904412790 scopus 로고    scopus 로고
    • Achieving privacy preservation in WiFi fingerprint-based localization
    • Toronto, ON, Canada
    • H. Li, L. Sun, H. Zhu, X. Lu, and X. Cheng, "Achieving privacy preservation in WiFi fingerprint-based localization, " in Proc. IEEE INFOCOM, Toronto, ON, Canada, 2014, pp. 2337-2345.
    • (2014) Proc. IEEE INFOCOM , pp. 2337-2345
    • Li, H.1    Sun, L.2    Zhu, H.3    Lu, X.4    Cheng, X.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.