Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017 (2017), Article ID 8026787, 8 pages
https://doi.org/10.1155/2017/8026787
Research Article

Privacy Preserved Self-Awareness on the Community via Crowd Sensing

School of Computer Science and Technology, University of Science and Technology of China, Hefei, Anhui, China

Correspondence should be addressed to Kai Xing; nc.ude.ctsu@gnixk

Received 26 February 2017; Accepted 16 April 2017; Published 14 June 2017

Academic Editor: Qing Yang

Copyright © 2017 Huiting Fan et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. L. Tan, H. Fan, W. Rui et al., “Mining myself in the community: privacy preserved crowd sensing and computing,” in Proceedings of the International Conference on Wireless Algorithms, Systems, and Applications, pp. 272–282, Springer, 2016.
  2. R. Shokri and V. Shmatikov, “Privacy-preserving deep learning,” in Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS 2015, pp. 1310–1321, October 2015. View at Publisher · View at Google Scholar · View at Scopus
  3. M. Backes, D. Fiore, and R. M. Reischuk, “Verifiable delegation of computation on outsourced data,” in Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, pp. 863–874, ACM, 2013.
  4. A. Rial and G. Danezis, “Privacy-preserving smart metering,” in Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society (WPES '11), Y. Chen and J. Vaidya, Eds., pp. 49–60, Chicago, Ill, USA, October 2011. View at Publisher · View at Google Scholar
  5. J. H. Ahn, S. Hohenberger, D. Boneh, J. Camenisch, A. Shelat, and B. Waters, “Computing on authenticated data,” Journal of Cryptology. The Journal of the International Association for Cryptologic Research, vol. 28, no. 2, pp. 351–395, 2015. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  6. C. Dwork, K. Kenthapadi, F. McSherry, I. Mironov, and M. Naor, “Our data, ourselves: privacy via distributed noise generation,” in Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 486–503, Springer, 2006.
  7. H. Li, X. Lin, H. Yang, X. Liang, R. Lu, and X. Shen, “EPPDR: an efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 8, pp. 2053–2064, 2014. View at Publisher · View at Google Scholar
  8. G. Acs and C. Castelluccia, “A case study: privacy preserving release of spatio-temporal density in Paris,” in Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2014, pp. 1679–1688, ACM, August 2014. View at Publisher · View at Google Scholar · View at Scopus
  9. G. Mezzour, A. Perrig, V. Gligor, and P. Papadimitratos, “Privacy-preserving relationship path discovery in social networks,” in Proceedings of the International Conference on Cryptology and Network Security, pp. 189–208, Springer, 2009.
  10. M. J. Freedman and A. Nicolosi, “Efficient private techniques for verifying social proximity,” IPTPS, vol. 5, p. 1, 2007. View at Google Scholar
  11. S. Garriss, M. Kaminsky, M. J. Freedman, B. Karp, D. Mazières, and H. Yu, “Re: reliable email,” NSDI, vol. 6, p. 22, 2006. View at Google Scholar
  12. B. Carminati, E. Ferrari, and A. Perego, “Private relationships in social networks,” in Proceedings of the Workshops in Conjunction with the 23rd International Conference on Data Engineering - ICDE 2007, pp. 163–171, April 2007. View at Publisher · View at Google Scholar · View at Scopus
  13. J. Domingo-Ferrer, “A public-key protocol for social networks with private relationships,” in Proceedings of the International Conference on Modeling Decisions for Artificial Intelligence, pp. 373–379, Springer, 2007.
  14. R. Agrawal and R. Srikant, “Privacy-preserving data mining,” ACM Sigmod Record, vol. 29, no. 2, pp. 439–450, 2000. View at Publisher · View at Google Scholar · View at Scopus