The Scientific World Journal
Volume 2014 (2014), Article ID 581426, 9 pages
http://dx.doi.org/10.1155/2014/581426
Research Article
Preserving Differential Privacy for Similarity Measurement in Smart Environments
School of Computer Science and Engineering, Soongsil University, Information Science Building, Sangdo-dong, Dongjak-gu, Seoul 156-743, Republic of Korea
Received 5 April 2014; Accepted 24 June 2014; Published 15 July 2014
Academic Editor: Jong-Hyuk Park
Copyright © 2014 Kok-Seng Wong and Myung Ho Kim. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Linked References
- P. Nixon, G. Lacey, and S. Dobson, Managing Interactions in Smart Environments, Springer, London, UK, 2000.
- T. Teraoka, “Organization and exploration of heterogeneous personal data collected in daily life,” Human-Centric Computation and Information Sciences, vol. 2, pp. 1–15, 2012. View at Publisher · View at Google Scholar
- J. K.-Y. Ng, “Ubiquitous healthcare: healthcare systems and applications enabled by mobile and wireless technologies,” Journal of Convergence, vol. 3, no. 2, pp. 15–20, 2012. View at Google Scholar
- S. Szewcyzk, K. Dwan, B. Minor, B. Swedlove, and D. Cook, “Annotating smart environment sensor data for activity learning,” Technology and Health Care, vol. 17, no. 3, pp. 161–169, 2009. View at Publisher · View at Google Scholar · View at Scopus
- C. Ramos, G. Marreiros, R. Santos, and C. Filipe Freitas, “Smart offices and intelligent decision rooms,” in Handbook of Ambient Intelligence and Smart Environments, pp. 851–880, Springer, Berlin, Germany, 2009. View at Google Scholar
- E. F. Connor and D. Simberloff, “Interspecific competition and species co-occurrence patterns on islands: null models and the evaluation of evidence,” Oikos, vol. 41, no. 3, pp. 455–465, 1983. View at Publisher · View at Google Scholar · View at Scopus
- M. E. Gilpin and J. M. Diamond, “Factors contributing to non-randomness in species Co-occurrences on Islands,” Oecologia, vol. 52, no. 1, pp. 75–84, 1982. View at Publisher · View at Google Scholar · View at Scopus
- M. H. Pandi, O. Kashefi, and B. Minaei, “A novel similarity measure for sequence data,” Journal of Information Processing Systems, vol. 7, no. 3, pp. 413–424, 2011. View at Google Scholar
- D. H. Fisher, “Knowledge acquisition via incremental conceptual clustering,” Machine Learning, vol. 2, no. 2, pp. 139–172, 1987. View at Publisher · View at Google Scholar · View at Scopus
- H. Wang, W. Wang, J. Yang, and P. S. Yu, “Clustering by pattern similarity in large data sets,” in Proceedings of the ACM SIGMOD International Conference on Managment of Data, pp. 394–405, Madison, Wis, USA, June 2002. View at Scopus
- P. Willett, “Similarity-based approaches to virtual screening,” Biochemical Society Transactions, vol. 31, no. 3, pp. 603–606, 2003. View at Publisher · View at Google Scholar · View at Scopus
- U. Hengartner and P. Steenkiste, “Avoiding privacy violations caused by context-sensitive services,” in Proceedings of the 4th Annual IEEE International Conference on Pervasive Computing and Communications (PerCom '06), pp. 222–233, March 2006. View at Publisher · View at Google Scholar · View at Scopus
- Y. Lindell and B. Pinkas, “Secure multiparty computation for privacy-preserving data mining,” Journal of Privacy and Confidentiality, vol. 1, pp. 59–98, 2009. View at Google Scholar
- P. H. A. Sneath and R. R. Sokal, Numerical Taxonomy: The Principles and Practice of Numerical Classification, W. H. Freeman, San Francisco, Calif, USA, 1973. View at MathSciNet
- L. A. Goodman and W. H. Kruskal, “Measures of association for cross classifications., II: further discussion and references,” Journal of the American Statistical Association, vol. 54, no. 285, pp. 123–163, 1959. View at Publisher · View at Google Scholar
- P. F. Russel and T. R. Rao, “On habitat and association of species of Anophe-line larvae in South-eastern Madras,” Journal of Malaria Institute India, vol. 3, pp. 153–178, 1940. View at Google Scholar
- P. Jaccard, “Nouvelles recherches sur la distribution florale,” Bulletin de la Sociète Vaudense des Sciences Naturelles, vol. 44, pp. 223–270, 1908. View at Google Scholar
- C. Baroni-Urbani and M. W. Buser, “Similarity of binary data,” Systematic Zoology, vol. 25, pp. 251–259, 1976. View at Google Scholar
- D. P. Faith, “Asymmetric binary similarity measures,” Oecologia, vol. 57, no. 3, pp. 287–290, 1983. View at Publisher · View at Google Scholar · View at Scopus
- R. R. Sokal and P. H. A. Sneath, Principles of Numeric Taxonomy, W.H. Freeman, San Francisco, Calif, USA, 1963.
- S. S. Choi, Correlation analysis of binary similarity and dissimilarity measures [Ph.D. dissertation], Pace University, 2008.
- S.-H. Bae and J. Kim, “Development of personal information protection model using a mobile agent,” Journal of Information Processing Systems, vol. 6, pp. 185–196, 2010. View at Google Scholar
- C.-E. Pigeot, Y. Gripay, M. Scuturici, and J. Pierson, “Context-sensitive security framework for pervasive environments,” in Proceedings of the 4th European Conference on Universal Multiservice Networks (ECUMN ’07), pp. 391–400, Toulouse, France, February 2007. View at Publisher · View at Google Scholar · View at Scopus
- J. McNaull, J. C. Augusto, M. Mulvenna, and P. McCullagh, “Flexible context aware interface for ambient assisted living,” Human-Centric Computation and Information Sciences, vol. 4, pp. 1–41, 2014. View at Google Scholar
- J. I. Hong, J. D. Ng, S. Lederer, and J. A. Landay, “Privacy risk models for designing privacy-sensitive ubiquitous computing systems,” in Proceedings of the 5th Conference on Designing Interactive Systems: Processes, Practices, Methods, and Techniques (DIS '04), pp. 91–100, Cambridge, Mass, USA, 2004. View at Publisher · View at Google Scholar
- A. P. A. Ling and M. Masao, “Selection of model in developing information security criteria for smart grid security system,” Journal of Convergence, vol. 2, no. 1, pp. 39–46, 2011. View at Google Scholar
- H.-I. Kim, Y.-K. Kim, and J.-W. Chang, “A grid-based cloaking area creation scheme for continuous LBS queries in distributed systems,” Journal of Convergence, vol. 4, pp. 23–30, 2013. View at Google Scholar
- K.-S. Wong and M. H. Kim, “Privacy-preserving frequent itemsets mining via secure collaborative framework,” Security and Communication Networks, vol. 5, no. 3, pp. 263–272, 2012. View at Publisher · View at Google Scholar · View at Scopus
- R. Agrawal, A. Evfimievski, and R. Srikant, “Information sharing across private databases,” in Proceedings of the ACM SIGMOD International Conference on Management of Data, pp. 86–97, San Diego, Calif, USA, June 2003. View at Scopus
- A. C. Yao, “Protocols for secure computations,” in Proceedings of the 23rd Annual Symposium on Foundations of Computer Science, pp. 160–164, 1982. View at Google Scholar · View at MathSciNet
- J.-S. Kang and D. Hong, “A practical privacy-preserving cooperative computation protocol without oblivious transfer for linear systems of equations,” Journal of Information Processing Systems, vol. 3, pp. 21–25, 2007. View at Google Scholar
- O. Goldreich, S. Micali, and A. Wigderson, “How to play ANY mental game,” in Proceedings of the 19th Annual ACM Symposium on Theory of Computing (STOC ’87), New York, NY, USA, 1987.
- K.-S. Wong and M. H. Kim, “Privacy-preserving similarity coefficients for binary data,” Computers and Mathematics with Applications, vol. 65, no. 9, pp. 1280–1290, 2013. View at Publisher · View at Google Scholar · View at Scopus
- B. Zhang and F. Zhang, “Secure similarity coefficients computation with malicious adversaries,” in Proceedings of the 4th International Conference on Intelligent Networking and Collaborative Systems (INCoS '12), pp. 303–310, Bucharest, Romania, September 2012. View at Publisher · View at Google Scholar · View at Scopus
- M. Alaggan, S. Gambs, and A.-M. Kermarrec, “Private similarity computation in distributed systems: from cryptography to differential privacy,” in Principles of Distributed Systems, A. Fernàndez Anta, G. Lipari, and M. Roy, Eds., vol. 7109 of Lecture Notes in Computer Science, pp. 357–377, Springer, Berlin, Germany, 2011. View at Publisher · View at Google Scholar
- T. ElGamal, “A public key cryptosystem and a signature scheme based on discrete logarithms,” IEEE Transactions on Information Theory, vol. 31, no. 4, pp. 469–472, 1985. View at Publisher · View at Google Scholar · View at MathSciNet
- O. Goldreich, “Foundations of cryptography—a primer,” Foundations and Trends in Theoretical Computer Science, vol. 1, no. 1, pp. 1–116, 2005. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
- C. Hazay and Y. Lindell, “Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries,” in Proceedings of the 5th Conference on Theory of Cryptography, New York, NY, USA, 2008.
- O. Goldreich, Foundations of Cryptography, vol. 2, Cambridge University Press, 2004.
- C. Dwork, “Differential privacy: a survey of results,” in Proceedings of the 5th International Conference on Theory and Applications of Models of Computation, Xi'an, China, 2008.
- C. Dwork, F. McSherry, K. Nissim, and A. Smith, “Calibrating noise to sensitivity in private data analysis,” in Proceedings of the 3rd Conference on Theory of Cryptography, New York, NY, USA, 2006.
- S. Goldwasser and S. Micali, “Probabilistic encryption & how to play mental poker keeping secret all partial informatio,” in Proceedings of the 14th Annual ACM Symposium on Theory of Computing, San Francisco, Calif, USA, 1982.
- J. Ma, “Smart u-things and ubiquitous intelligence,” in Proceeding of the 2nd International Conference on Embedded Software and Systems (ICESS ’05), pp. 776–776, Xi’an, China, December 2005. View at Publisher · View at Google Scholar · View at Scopus
- J. C. Augusto, V. Callaghan, D. Cook, A. Kameas, and I. Satoh, “Intelligent environments: a manifesto,” Human-Centric Computation and Information Sciences, vol. 3, pp. 1–18, 2013. View at Google Scholar