메뉴 건너뛰기




Volumn 15, Issue 4, 2018, Pages 591-606

Real-Time and Spatio-Temporal Crowd-Sourced Social Network Data Publishing with Differential Privacy

Author keywords

Crowd sourced data; differential privacy; privacy preservation; realtime data publishing; social networks

Indexed keywords

BUDGET CONTROL; CROWDSOURCING; DATA MINING; MOBILE TELECOMMUNICATION SYSTEMS; POPULATION STATISTICS; SAMPLING; SOCIAL NETWORKING (ONLINE);

EID: 85049754364     PISSN: 15455971     EISSN: 19410018     Source Type: Journal    
DOI: 10.1109/TDSC.2016.2599873     Document Type: Article
Times cited : (173)

References (42)
  • 2
    • 84943646932 scopus 로고    scopus 로고
    • All your location are belong to us: Breaking mobile social networks for automated user location tracking
    • M. Li, et al., "All your location are belong to us: Breaking mobile social networks for automated user location tracking," in Proc. 15th ACM Int. Symp. Mobile ad hoc Netw. Comput., 2014, pp. 43-52.
    • (2014) Proc. 15th ACM Int. Symp. Mobile Ad Hoc Netw. Comput. , pp. 43-52
    • Li, M.1
  • 3
    • 84900653663 scopus 로고    scopus 로고
    • A probabilistic misbehavior detection scheme toward efficient trust establishment in delay-tolerant networks
    • Jan.
    • H. Zhu, S. Du, Z. Gao, M. Dong, and Z. Cao, "A probabilistic misbehavior detection scheme toward efficient trust establishment in delay-tolerant networks," IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 1, pp. 22-32, Jan. 2014.
    • (2014) IEEE Trans. Parallel Distrib. Syst. , vol.25 , Issue.1 , pp. 22-32
    • Zhu, H.1    Du, S.2    Gao, Z.3    Dong, M.4    Cao, Z.5
  • 4
    • 84962448916 scopus 로고    scopus 로고
    • A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data
    • Feb.
    • Z. Xia, X. Wang, X. Sun, and Q. Wang, "A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data," IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 2, pp. 340-352, Feb. 2015.
    • (2015) IEEE Trans. Parallel Distrib. Syst. , vol.27 , Issue.2 , pp. 340-352
    • Xia, Z.1    Wang, X.2    Sun, X.3    Wang, Q.4
  • 5
    • 84976428104 scopus 로고    scopus 로고
    • Securing sift: Privacy-preserving outsourcing computation of feature extractions over encrypted image data
    • Jul.
    • S. Hu, Q. Wang, J. Wang, Z. Qin, and K. Ren, "Securing sift: Privacy-preserving outsourcing computation of feature extractions over encrypted image data," IEEE Trans. Image Process., vol. 25, no. 7, pp. 3411-3425, Jul. 2016.
    • (2016) IEEE Trans. Image Process. , vol.25 , Issue.7 , pp. 3411-3425
    • Hu, S.1    Wang, Q.2    Wang, J.3    Qin, Z.4    Ren, K.5
  • 6
    • 84963541120 scopus 로고    scopus 로고
    • Minimizing inter-server communications by exploiting self-similarity in online social networks
    • Apr.
    • H. Chen, H. Jin, and S. Wu, "Minimizing inter-server communications by exploiting self-similarity in online social networks," IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 4, pp. 1116-1130, Apr. 2016.
    • (2016) IEEE Trans. Parallel Distrib. Syst. , vol.27 , Issue.4 , pp. 1116-1130
    • Chen, H.1    Jin, H.2    Wu, S.3
  • 7
    • 85017356478 scopus 로고    scopus 로고
    • Harnessing encrypted data in cloud for secure and efficient mobile image sharing
    • pp. 1-1, Jul.
    • H. Cui, X. Yuan, and C. Wang, "Harnessing encrypted data in cloud for secure and efficient mobile image sharing," IEEE Trans. Mobile Comput., vol. PP, no. 99, pp. 1-1, doi: 10.1109/TMC.2016.2595573, Jul. 2016.
    • (2016) IEEE Trans. Mobile Comput. , vol.PP , Issue.99
    • Cui, H.1    Yuan, X.2    Wang, C.3
  • 10
    • 80053584816 scopus 로고    scopus 로고
    • Anonymization of location data does not work: A large-scale measurement study
    • H. Zang and J. Bolot, "Anonymization of location data does not work: A large-scale measurement study," in Proc. 17th Annu. Int. Conf. Mobile Comput. Netw., 2011, pp. 145-156.
    • (2011) Proc. 17th Annu. Int. Conf. Mobile Comput. Netw. , pp. 145-156
    • Zang, H.1    Bolot, J.2
  • 16
    • 78650518102 scopus 로고    scopus 로고
    • Boosting the accuracy of differentially private histograms through consistency
    • M. Hay, V. Rastogi, G. Miklau, and D. Suciu, "Boosting the accuracy of differentially private histograms through consistency," Proc. Very Large Data Bases Endowment, vol. 3, no. 1/2, pp. 1021-1032, 2010.
    • (2010) Proc. Very Large Data Bases Endowment , vol.3 , Issue.1-2 , pp. 1021-1032
    • Hay, M.1    Rastogi, V.2    Miklau, G.3    Suciu, D.4
  • 18
    • 84926322942 scopus 로고    scopus 로고
    • An adaptive approach to real-time aggregate monitoring with differential privacy
    • Sep.
    • L. Fan and L. Xiong, "An adaptive approach to real-time aggregate monitoring with differential privacy," IEEE Trans. Knowl. Data Eng., vol. 26, no. 9, pp. 2094-2106, Sep. 2014.
    • (2014) IEEE Trans. Knowl. Data Eng. , vol.26 , Issue.9 , pp. 2094-2106
    • Fan, L.1    Xiong, L.2
  • 19
    • 84855245645 scopus 로고    scopus 로고
    • Private and continual release of statistics
    • T.-H. H. Chan, E. Shi, and D. Song, "Private and continual release of statistics," ACMTrans. Inf. Syst. Secur., vol. 14, no. 3, 2011, Art. no. 26.
    • (2011) ACMTrans. Inf. Syst. Secur. , vol.14 , Issue.3
    • Chan, T.-H.H.1    Shi, E.2    Song, D.3
  • 20
    • 84864265207 scopus 로고    scopus 로고
    • Differentially private continual monitoring of heavy hitters from distributed streams
    • T.-H. H. Chan, M. Li, E. Shi, and W. Xu, "Differentially private continual monitoring of heavy hitters from distributed streams," in Proc. 12th Int. Conf. Privacy Enhancing Technol., 2012, pp. 140-159.
    • (2012) Proc. 12th Int. Conf. Privacy Enhancing Technol. , pp. 140-159
    • Chan, T.-H.H.1    Li, M.2    Shi, E.3    Xu, W.4
  • 24
    • 34250017239 scopus 로고    scopus 로고
    • A face is exposed for AOL searcher no. 4417749
    • M. Barbaro, T. Zeller, and S. Hansell, "A face is exposed for AOL searcher no. 4417749," New York Times, vol. 9, no. 2008, 2006, Art. no. 8.
    • (2006) New York Times , vol.9 , Issue.2008
    • Barbaro, M.1    Zeller, T.2    Hansell, S.3
  • 26
    • 84866628169 scopus 로고    scopus 로고
    • Trajectory privacy in locationbased services and data publication
    • C.-Y. Chow and M. F. Mokbel, "Trajectory privacy in locationbased services and data publication," ACM SIGKDD Explorations Newslett., vol. 13, no. 1, pp. 19-29, 2011.
    • (2011) ACM SIGKDD Explorations Newslett. , vol.13 , Issue.1 , pp. 19-29
    • Chow, C.-Y.1    Mokbel, M.F.2
  • 27
    • 57349112634 scopus 로고    scopus 로고
    • User 4xxxxx9: Anonymizing query logs
    • E. Adar, "User 4xxxxx9: Anonymizing query logs," in Proc. Query Log Anal. Workshop, 2007, pp. 1-8.
    • (2007) Proc. Query Log Anal. Workshop , pp. 1-8
    • Adar, E.1
  • 29
  • 33
    • 77954711910 scopus 로고    scopus 로고
    • Differentially private aggregation of distributed time-series with transformation and encryption
    • V. Rastogi and S. Nath, "Differentially private aggregation of distributed time-series with transformation and encryption," in Proc. ACM SIGMOD Int. Conf. Manage. Data, 2010, pp. 735-746.
    • (2010) Proc. ACM SIGMOD Int. Conf. Manage. Data , pp. 735-746
    • Rastogi, V.1    Nath, S.2
  • 34
    • 70849116921 scopus 로고    scopus 로고
    • Privacy integrated queries: An extensible platform for privacy-preserving data analysis
    • F. D. McSherry, "Privacy integrated queries: An extensible platform for privacy-preserving data analysis," in Proc. ACM SIGMOD Int. Conf. Manage. Data, 2009, pp. 19-30.
    • (2009) Proc. ACM SIGMOD Int. Conf. Manage. Data , pp. 19-30
    • McSherry, F.D.1
  • 37
    • 85024429815 scopus 로고
    • A new approach to linear filtering and prediction problem
    • R. Kalman, "A new approach to linear filtering and prediction problem," J. Basic Eng., vol. 82, pp. 35-45, 1960.
    • (1960) J. Basic Eng. , vol.82 , pp. 35-45
    • Kalman, R.1
  • 38
    • 0001419757 scopus 로고
    • Distributed representations, simple recurrent networks, and grammatical structure
    • J. L. Elman, "Distributed representations, simple recurrent networks, and grammatical structure," Mach. Learn., vol. 7, no. 2/3, pp. 195-225, 1991.
    • (1991) Mach. Learn. , vol.7 , Issue.2-3 , pp. 195-225
    • Elman, J.L.1
  • 39
    • 0000442791 scopus 로고
    • Generalization of back-propagation to recurrent neural networks
    • F. J. Pineda, "Generalization of back-propagation to recurrent neural networks," Physical Rev. Lett., vol. 59, no. 19, 1987, Art. no. 2229.
    • (1987) Physical Rev. Lett. , vol.59 , Issue.19
    • Pineda, F.J.1
  • 40
    • 85049737329 scopus 로고    scopus 로고
    • ECML/PKDD 15: [Online]
    • ECML/PKDD 15: Taxi Trajectory Prediction (I), [Online]. Available: https://www.kaggle.com/c/pkdd-15-predict-taxiservice-trajectory-i
    • Taxi Trajectory Prediction (I)
  • 41
    • 85049731639 scopus 로고    scopus 로고
    • [Online]
    • World Cup dataset, [Online]. Available: http://ita.ee.lbl.gov/html/contrib/WorldCup.html
    • World Cup Dataset
  • 42
    • 0036606530 scopus 로고    scopus 로고
    • A framework for generating network-based moving objects
    • T. Brinkhoff, "A framework for generating network-based moving objects," GeoInformatica, vol. 6, no. 2, pp. 153-180, 2002.
    • (2002) GeoInformatica , vol.6 , Issue.2 , pp. 153-180
    • Brinkhoff, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.