메뉴 건너뛰기




Volumn 15, Issue 4, 2018, Pages 607-620

Exploiting Social Network to Enhance Human-to-Human Infection Analysis without Privacy Leakage

Author keywords

infection analysis; privacy preservation; Social network

Indexed keywords

CLOUD COMPUTING; CRYPTOGRAPHY; HEALTH; HEALTH RISKS; SOCIAL NETWORKING (ONLINE); SOCIAL SCIENCES COMPUTING;

EID: 85049749368     PISSN: 15455971     EISSN: 19410018     Source Type: Journal    
DOI: 10.1109/TDSC.2016.2626288     Document Type: Article
Times cited : (28)

References (46)
  • 3
    • 84954165159 scopus 로고    scopus 로고
    • LINKAGE: An approach for comprehensive risk prediction for care management
    • Z. Sun, F. Wang, and J. Hu, "LINKAGE: An approach for comprehensive risk prediction for care management, " in Proc. SIGKDD, 2015, pp. 1145-1154.
    • (2015) Proc. SIGKDD , pp. 1145-1154
    • Sun, Z.1    Wang, F.2    Hu, J.3
  • 4
    • 79952600976 scopus 로고    scopus 로고
    • Role of social networks in shaping disease transmission during a community outbreak of 2009 H1N1 pandemic influenza
    • S. Cauchemez, et al., "Role of social networks in shaping disease transmission during a community outbreak of 2009 H1N1 pandemic influenza, " Proc. Nat. Academy Sci. United States America, vol. 108, no. 7, pp. 2825-2830, 2011.
    • (2011) Proc. Nat. Academy Sci. United States America , vol.108 , Issue.7 , pp. 2825-2830
    • Cauchemez, S.1
  • 5
    • 84940523433 scopus 로고    scopus 로고
    • Security and privacy for mobile healthcare networks-from quality-of-pro-tection perspective
    • Aug.
    • K. Zhang, K. Yang, X. Liang, Z. Su, X. Shen, and H. Luo, "Security and privacy for mobile healthcare networks-from quality-of-pro-tection perspective, " IEEE Wireless Commun., vol. 22, no. 4, pp. 104-112, Aug. 2015.
    • (2015) IEEE Wireless Commun. , vol.22 , Issue.4 , pp. 104-112
    • Zhang, K.1    Yang, K.2    Liang, X.3    Su, Z.4    Shen, X.5    Luo, H.6
  • 7
    • 84975297765 scopus 로고    scopus 로고
    • A trust-based privacy-preserving friend recommendation scheme for online social networks
    • Jul./Aug.
    • L. Guo, C. Zhang, and Y. Fang, "A trust-based privacy-preserving friend recommendation scheme for online social networks, " IEEE Trans. Dependable Secure Comput., vol. 12, no. 4, pp. 413-427, Jul./Aug. 2015.
    • (2015) IEEE Trans. Dependable Secure Comput. , vol.12 , Issue.4 , pp. 413-427
    • Guo, L.1    Zhang, C.2    Fang, Y.3
  • 8
    • 85049751876 scopus 로고    scopus 로고
    • Security and privacy in smart city applications: Challenges and solutions
    • to be published
    • K. Zhang, J. Ni, K. Yang, X. Liang, J. Ren, and X. Shen, "Security and privacy in smart city applications: Challenges and solutions, " IEEE Commun. Mag., to be published.
    • IEEE Commun. Mag
    • Zhang, K.1    Ni, J.2    Yang, K.3    Liang, X.4    Ren, J.5    Shen, X.6
  • 9
    • 84896982446 scopus 로고    scopus 로고
    • Exploiting multimedia services in mobile social network from security and privacy perspectives
    • Mar.
    • K. Zhang, X. Liang, R. Lu, and X. Shen, "Exploiting multimedia services in mobile social network from security and privacy perspectives, " IEEE Commun. Mag., vol. 52, no. 3, pp. 58-65, Mar. 2014.
    • (2014) IEEE Commun. Mag. , vol.52 , Issue.3 , pp. 58-65
    • Zhang, K.1    Liang, X.2    Lu, R.3    Shen, X.4
  • 10
    • 84962579256 scopus 로고    scopus 로고
    • MixGroup: Accumulative pseudonym exchanging for location privacy enhancement in vehicular social networks
    • Jan./Feb.
    • R. Yu, J. Kang, X. Huang, S. Xie, Y. Zhang, and S. Gjessing, "MixGroup: Accumulative pseudonym exchanging for location privacy enhancement in vehicular social networks, " IEEE Trans. Dependable Secure Comput., vol. 13, no. 1, pp. 93-105, Jan./Feb. 2016.
    • (2016) IEEE Trans. Dependable Secure Comput. , vol.13 , Issue.1 , pp. 93-105
    • Yu, R.1    Kang, J.2    Huang, X.3    Xie, S.4    Zhang, Y.5    Gjessing, S.6
  • 11
    • 84870885441 scopus 로고    scopus 로고
    • Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption
    • Jan.
    • M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou, "Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption, " IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 1, pp. 131-143, Jan. 2013.
    • (2013) IEEE Trans. Parallel Distrib. Syst. , vol.24 , Issue.1 , pp. 131-143
    • Li, M.1    Yu, S.2    Zheng, Y.3    Ren, K.4    Lou, W.5
  • 13
    • 79957974657 scopus 로고    scopus 로고
    • Implementing gentry's fully-homomor-phic encryption scheme
    • C. Gentry and S. Halevi, "Implementing gentry's fully-homomor-phic encryption scheme, "in Proc. EUROCRYPT, 2011, pp. 129-148.
    • (2011) Proc. EUROCRYPT , pp. 129-148
    • Gentry, C.1    Halevi, S.2
  • 14
    • 84907495049 scopus 로고    scopus 로고
    • Quality-of-experience (QoE) in emerging mobile social networks
    • M. Dong, T. Kimata, K. Sugiura, and K. Zettsu, "Quality-of-experience (QoE) in emerging mobile social networks, " IEICE Trans. Inf. Syst., vol. E97-D, no. 10, pp. 2606-2612, 2014.
    • (2014) IEICE Trans. Inf. Syst. , vol.E97-D , Issue.10 , pp. 2606-2612
    • Dong, M.1    Kimata, T.2    Sugiura, K.3    Zettsu, K.4
  • 15
    • 84937425876 scopus 로고    scopus 로고
    • CAMF: Context-aware message forwarding in mobile social networks
    • Aug.
    • K. Wei, M. Dong, K. Ota, and K. Xu, "CAMF: Context-aware message forwarding in mobile social networks, " IEEE Trans. Parallel Distrib. Syst., vol. 26, no. 8, pp. 2178-2187, Aug. 2015.
    • (2015) IEEE Trans. Parallel Distrib. Syst. , vol.26 , Issue.8 , pp. 2178-2187
    • Wei, K.1    Dong, M.2    Ota, K.3    Xu, K.4
  • 16
    • 84963815241 scopus 로고    scopus 로고
    • Privacy-preserving patient-centric clinical decision support system on naive Bayesian classification
    • Mar.
    • X. Liu, R. Lu, J. Ma, L. Chen, and B. Qin, "Privacy-preserving patient-centric clinical decision support system on naive Bayesian classification, " IEEE J. Biomed. Health Informat., vol. 2, no. 20, pp. 1261-1273, Mar. 2016.
    • (2016) IEEE J. Biomed. Health Informat. , vol.2 , Issue.20 , pp. 1261-1273
    • Liu, X.1    Lu, R.2    Ma, J.3    Chen, L.4    Qin, B.5
  • 18
    • 0034244889 scopus 로고    scopus 로고
    • Learning patterns of activity using real-time tracking
    • Aug.
    • C. Stauffer and W. Grimson, "Learning patterns of activity using real-time tracking, " IEEE Trans. Pattern Anal. Mach. Intell., vol. 22, no. 8, pp. 747-757, Aug. 2000.
    • (2000) IEEE Trans. Pattern Anal. Mach. Intell. , vol.22 , Issue.8 , pp. 747-757
    • Stauffer, C.1    Grimson, W.2
  • 21
    • 84940533844 scopus 로고    scopus 로고
    • Exploiting mobile social behaviors for sybil detection
    • K. Zhang, X. Liang, R. Lu, K. Yang, and X. Shen, "Exploiting mobile social behaviors for sybil detection, " in Proc. IEEE INFO-COM, 2015, pp. 271-279.
    • (2015) Proc. IEEE INFO-COM , pp. 271-279
    • Zhang, K.1    Liang, X.2    Lu, R.3    Yang, K.4    Shen, X.5
  • 25
  • 26
    • 84926628839 scopus 로고    scopus 로고
    • K-nearest neighbor classification over semantically secure encrypted relational data
    • May
    • B. K. Samanthula, Y. Elmehdwi, and W. Jiang, "k-nearest neighbor classification over semantically secure encrypted relational data, " IEEE Trans. Knowl. Data Eng., vol. 27, no. 5, pp. 1261-1273, May 2015.
    • (2015) IEEE Trans. Knowl. Data Eng. , vol.27 , Issue.5 , pp. 1261-1273
    • Samanthula, B.K.1    Elmehdwi, Y.2    Jiang, W.3
  • 28
    • 84901924319 scopus 로고    scopus 로고
    • Privacy preserving back-propagation neural network learning made practical with cloud computing
    • Feb.
    • J. Yuan and S. Yu, "Privacy preserving back-propagation neural network learning made practical with cloud computing, " IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 1, pp. 212-221, Feb. 2014.
    • (2014) IEEE Trans. Parallel Distrib. Syst. , vol.25 , Issue.1 , pp. 212-221
    • Yuan, J.1    Yu, S.2
  • 29
    • 84555206096 scopus 로고    scopus 로고
    • Privacy preserving decision tree learning using unrealized data sets
    • P. Fong and J. Weber-Jahnke, "Privacy preserving decision tree learning using unrealized data sets, " IEEE Trans. Knowl. Data Eng., vol. 24, no. 2, pp. 353-364, 2012.
    • (2012) IEEE Trans. Knowl. Data Eng. , vol.24 , Issue.2 , pp. 353-364
    • Fong, P.1    Weber-Jahnke, J.2
  • 30
    • 84942246854 scopus 로고    scopus 로고
    • PPDM: Privacy-preserving protocol for dynamic medical text mining and image feature extraction from secure data aggregation in cloud-assisted e-healthcare systems
    • J. Zhou, Z. Cao, X. Dong, and X. Lin, "PPDM: Privacy-preserving protocol for dynamic medical text mining and image feature extraction from secure data aggregation in cloud-assisted e-healthcare systems, " IEEE J. Select. Topics Signal Process., vol. 9, no. 7, pp. 1332-1344, 2015.
    • (2015) IEEE J. Select. Topics Signal Process. , vol.9 , Issue.7 , pp. 1332-1344
    • Zhou, J.1    Cao, Z.2    Dong, X.3    Lin, X.4
  • 31
    • 84929376476 scopus 로고    scopus 로고
    • PSMPA: Patient self-controllable and multi-level privacy-preserving cooperative authentication in distributedm-healthcare cloud computing system
    • Jun.
    • J. Zhou, X. Lin, X. Dong, and Z. Cao, "PSMPA: Patient self-controllable and multi-level privacy-preserving cooperative authentication in distributedm-healthcare cloud computing system, " IEEE Trans. Parallel Distrib. Syst., vol. 26, no. 6, pp. 1693-1703, Jun. 2015.
    • (2015) IEEE Trans. Parallel Distrib. Syst. , vol.26 , Issue.6 , pp. 1693-1703
    • Zhou, J.1    Lin, X.2    Dong, X.3    Cao, Z.4
  • 32
    • 84897800670 scopus 로고    scopus 로고
    • Secure encounter-based mobile social networks: Requirements, designs, and tradeoffs
    • Nov./Dec.
    • A. Mohaien, D. Kune, E. Vasserman, M. Kim, and Y. Kim, "Secure encounter-based mobile social networks: Requirements, designs, and tradeoffs, " IEEE Trans. Dependable Secure Comput., vol. 10, no. 6, pp. 380-393, Nov./Dec. 2013.
    • (2013) IEEE Trans. Dependable Secure Comput. , vol.10 , Issue.6 , pp. 380-393
    • Mohaien, A.1    Kune, D.2    Vasserman, E.3    Kim, M.4    Kim, Y.5
  • 34
    • 23844436610 scopus 로고    scopus 로고
    • Strategies for containing an emerging influenza pandemic in southeast Asia
    • N. Ferguson, et al., "Strategies for containing an emerging influenza pandemic in southeast asia, " Nature, vol. 437, no. 7056, pp. 209-214, 2005.
    • (2005) Nature , vol.437 , Issue.7056 , pp. 209-214
    • Ferguson, N.1
  • 35
    • 84963747681 scopus 로고    scopus 로고
    • PIF: A personalized finegrained spam filtering scheme with privacy preservation in mobile social networks
    • Sep.
    • K. Zhang, X. Liang, R. Lu, and X. Shen, "PIF: A personalized finegrained spam filtering scheme with privacy preservation in mobile social networks, " IEEE Trans. Comput. Social Syst., vol. 2, no. 3, pp. 41-52, Sep. 2015.
    • (2015) IEEE Trans. Comput. Social Syst. , vol.2 , Issue.3 , pp. 41-52
    • Zhang, K.1    Liang, X.2    Lu, R.3    Shen, X.4
  • 37
    • 70350642087 scopus 로고    scopus 로고
    • Fully homomorphic encryption using ideal lattices
    • C. Gentry, "Fully homomorphic encryption using ideal lattices, " in Proc. 41st Annu. ACM Symp. Theory Comput., 2009, pp. 169-178.
    • (2009) Proc. 41st Annu. ACM Symp. Theory Comput. , pp. 169-178
    • Gentry, C.1
  • 38
    • 85032883059 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • T. ElGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms, " in Proc. Advances Cryptology, 1985, pp. 10-18.
    • (1985) Proc. Advances Cryptology , pp. 10-18
    • ElGamal, T.1
  • 40
    • 33745218758 scopus 로고    scopus 로고
    • Improved proxy re-encryption schemes with applications to secure distributed storage
    • G. Ateniese, K. Fu, M. Green, and S. Hohenberger, "Improved proxy re-encryption schemes with applications to secure distributed storage, " ACM Trans. Inf. Syst. Secur., vol. 9, no. 1, pp. 1-30, 2006.
    • (2006) ACM Trans. Inf. Syst. Secur. , vol.9 , Issue.1 , pp. 1-30
    • Ateniese, G.1    Fu, K.2    Green, M.3    Hohenberger, S.4
  • 42
    • 85050160774 scopus 로고
    • Probabilistic encryption and how to play mental poker keeping secret all partial information
    • S. Goldwasser and S. Micali, "Probabilistic encryption and how to play mental poker keeping secret all partial information, " in Proc. 14th Annu. ACM Symp. Theory Comput., 1982, pp. 365-377.
    • (1982) Proc. 14th Annu. ACM Symp. Theory Comput. , pp. 365-377
    • Goldwasser, S.1    Micali, S.2
  • 44
    • 85049739073 scopus 로고    scopus 로고
    • [Online].
    • Acute inflammations data set, 2009. [Online].: https://archive.ics.uci.edu/ml/datasets/Acute+Inflammations
    • (2009) Acute Inflammations Data Set
  • 45
    • 85049757567 scopus 로고    scopus 로고
    • HELib, 2013. [Online].
    • HELib, 2013. [Online].: http://shaih.github.io/HElib/index.html
  • 46
    • 85049727791 scopus 로고    scopus 로고
    • Crypto++, 2015. [Online].
    • Crypto++, 2015. [Online].: https://www.cryptopp. com/


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.