Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014, Article ID 581426, 9 pages
http://dx.doi.org/10.1155/2014/581426
Research Article

Preserving Differential Privacy for Similarity Measurement in Smart Environments

School of Computer Science and Engineering, Soongsil University, Information Science Building, Sangdo-dong, Dongjak-gu, Seoul 156-743, Republic of Korea

Received 5 April 2014; Accepted 24 June 2014; Published 15 July 2014

Academic Editor: Jong-Hyuk Park

Copyright © 2014 Kok-Seng Wong and Myung Ho Kim. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. P. Nixon, G. Lacey, and S. Dobson, Managing Interactions in Smart Environments, Springer, London, UK, 2000.
  2. T. Teraoka, “Organization and exploration of heterogeneous personal data collected in daily life,” Human-Centric Computation and Information Sciences, vol. 2, pp. 1–15, 2012. View at Publisher · View at Google Scholar
  3. J. K.-Y. Ng, “Ubiquitous healthcare: healthcare systems and applications enabled by mobile and wireless technologies,” Journal of Convergence, vol. 3, no. 2, pp. 15–20, 2012. View at Google Scholar
  4. S. Szewcyzk, K. Dwan, B. Minor, B. Swedlove, and D. Cook, “Annotating smart environment sensor data for activity learning,” Technology and Health Care, vol. 17, no. 3, pp. 161–169, 2009. View at Publisher · View at Google Scholar · View at Scopus
  5. C. Ramos, G. Marreiros, R. Santos, and C. Filipe Freitas, “Smart offices and intelligent decision rooms,” in Handbook of Ambient Intelligence and Smart Environments, pp. 851–880, Springer, Berlin, Germany, 2009. View at Google Scholar
  6. E. F. Connor and D. Simberloff, “Interspecific competition and species co-occurrence patterns on islands: null models and the evaluation of evidence,” Oikos, vol. 41, no. 3, pp. 455–465, 1983. View at Publisher · View at Google Scholar · View at Scopus
  7. M. E. Gilpin and J. M. Diamond, “Factors contributing to non-randomness in species Co-occurrences on Islands,” Oecologia, vol. 52, no. 1, pp. 75–84, 1982. View at Publisher · View at Google Scholar · View at Scopus
  8. M. H. Pandi, O. Kashefi, and B. Minaei, “A novel similarity measure for sequence data,” Journal of Information Processing Systems, vol. 7, no. 3, pp. 413–424, 2011. View at Google Scholar
  9. D. H. Fisher, “Knowledge acquisition via incremental conceptual clustering,” Machine Learning, vol. 2, no. 2, pp. 139–172, 1987. View at Publisher · View at Google Scholar · View at Scopus
  10. H. Wang, W. Wang, J. Yang, and P. S. Yu, “Clustering by pattern similarity in large data sets,” in Proceedings of the ACM SIGMOD International Conference on Managment of Data, pp. 394–405, Madison, Wis, USA, June 2002. View at Scopus
  11. P. Willett, “Similarity-based approaches to virtual screening,” Biochemical Society Transactions, vol. 31, no. 3, pp. 603–606, 2003. View at Publisher · View at Google Scholar · View at Scopus
  12. U. Hengartner and P. Steenkiste, “Avoiding privacy violations caused by context-sensitive services,” in Proceedings of the 4th Annual IEEE International Conference on Pervasive Computing and Communications (PerCom '06), pp. 222–233, March 2006. View at Publisher · View at Google Scholar · View at Scopus
  13. Y. Lindell and B. Pinkas, “Secure multiparty computation for privacy-preserving data mining,” Journal of Privacy and Confidentiality, vol. 1, pp. 59–98, 2009. View at Google Scholar
  14. P. H. A. Sneath and R. R. Sokal, Numerical Taxonomy: The Principles and Practice of Numerical Classification, W. H. Freeman, San Francisco, Calif, USA, 1973. View at MathSciNet
  15. L. A. Goodman and W. H. Kruskal, “Measures of association for cross classifications., II: further discussion and references,” Journal of the American Statistical Association, vol. 54, no. 285, pp. 123–163, 1959. View at Publisher · View at Google Scholar
  16. P. F. Russel and T. R. Rao, “On habitat and association of species of Anophe-line larvae in South-eastern Madras,” Journal of Malaria Institute India, vol. 3, pp. 153–178, 1940. View at Google Scholar
  17. P. Jaccard, “Nouvelles recherches sur la distribution florale,” Bulletin de la Sociète Vaudense des Sciences Naturelles, vol. 44, pp. 223–270, 1908. View at Google Scholar
  18. C. Baroni-Urbani and M. W. Buser, “Similarity of binary data,” Systematic Zoology, vol. 25, pp. 251–259, 1976. View at Google Scholar
  19. D. P. Faith, “Asymmetric binary similarity measures,” Oecologia, vol. 57, no. 3, pp. 287–290, 1983. View at Publisher · View at Google Scholar · View at Scopus
  20. R. R. Sokal and P. H. A. Sneath, Principles of Numeric Taxonomy, W.H. Freeman, San Francisco, Calif, USA, 1963.
  21. S. S. Choi, Correlation analysis of binary similarity and dissimilarity measures [Ph.D. dissertation], Pace University, 2008.
  22. S.-H. Bae and J. Kim, “Development of personal information protection model using a mobile agent,” Journal of Information Processing Systems, vol. 6, pp. 185–196, 2010. View at Google Scholar
  23. C.-E. Pigeot, Y. Gripay, M. Scuturici, and J. Pierson, “Context-sensitive security framework for pervasive environments,” in Proceedings of the 4th European Conference on Universal Multiservice Networks (ECUMN ’07), pp. 391–400, Toulouse, France, February 2007. View at Publisher · View at Google Scholar · View at Scopus
  24. J. McNaull, J. C. Augusto, M. Mulvenna, and P. McCullagh, “Flexible context aware interface for ambient assisted living,” Human-Centric Computation and Information Sciences, vol. 4, pp. 1–41, 2014. View at Google Scholar
  25. J. I. Hong, J. D. Ng, S. Lederer, and J. A. Landay, “Privacy risk models for designing privacy-sensitive ubiquitous computing systems,” in Proceedings of the 5th Conference on Designing Interactive Systems: Processes, Practices, Methods, and Techniques (DIS '04), pp. 91–100, Cambridge, Mass, USA, 2004. View at Publisher · View at Google Scholar
  26. A. P. A. Ling and M. Masao, “Selection of model in developing information security criteria for smart grid security system,” Journal of Convergence, vol. 2, no. 1, pp. 39–46, 2011. View at Google Scholar
  27. H.-I. Kim, Y.-K. Kim, and J.-W. Chang, “A grid-based cloaking area creation scheme for continuous LBS queries in distributed systems,” Journal of Convergence, vol. 4, pp. 23–30, 2013. View at Google Scholar
  28. K.-S. Wong and M. H. Kim, “Privacy-preserving frequent itemsets mining via secure collaborative framework,” Security and Communication Networks, vol. 5, no. 3, pp. 263–272, 2012. View at Publisher · View at Google Scholar · View at Scopus
  29. R. Agrawal, A. Evfimievski, and R. Srikant, “Information sharing across private databases,” in Proceedings of the ACM SIGMOD International Conference on Management of Data, pp. 86–97, San Diego, Calif, USA, June 2003. View at Scopus
  30. A. C. Yao, “Protocols for secure computations,” in Proceedings of the 23rd Annual Symposium on Foundations of Computer Science, pp. 160–164, 1982. View at Google Scholar · View at MathSciNet
  31. J.-S. Kang and D. Hong, “A practical privacy-preserving cooperative computation protocol without oblivious transfer for linear systems of equations,” Journal of Information Processing Systems, vol. 3, pp. 21–25, 2007. View at Google Scholar
  32. O. Goldreich, S. Micali, and A. Wigderson, “How to play ANY mental game,” in Proceedings of the 19th Annual ACM Symposium on Theory of Computing (STOC ’87), New York, NY, USA, 1987.
  33. K.-S. Wong and M. H. Kim, “Privacy-preserving similarity coefficients for binary data,” Computers and Mathematics with Applications, vol. 65, no. 9, pp. 1280–1290, 2013. View at Publisher · View at Google Scholar · View at Scopus
  34. B. Zhang and F. Zhang, “Secure similarity coefficients computation with malicious adversaries,” in Proceedings of the 4th International Conference on Intelligent Networking and Collaborative Systems (INCoS '12), pp. 303–310, Bucharest, Romania, September 2012. View at Publisher · View at Google Scholar · View at Scopus
  35. M. Alaggan, S. Gambs, and A.-M. Kermarrec, “Private similarity computation in distributed systems: from cryptography to differential privacy,” in Principles of Distributed Systems, A. Fernàndez Anta, G. Lipari, and M. Roy, Eds., vol. 7109 of Lecture Notes in Computer Science, pp. 357–377, Springer, Berlin, Germany, 2011. View at Publisher · View at Google Scholar
  36. T. ElGamal, “A public key cryptosystem and a signature scheme based on discrete logarithms,” IEEE Transactions on Information Theory, vol. 31, no. 4, pp. 469–472, 1985. View at Publisher · View at Google Scholar · View at MathSciNet
  37. O. Goldreich, “Foundations of cryptography—a primer,” Foundations and Trends in Theoretical Computer Science, vol. 1, no. 1, pp. 1–116, 2005. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  38. C. Hazay and Y. Lindell, “Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries,” in Proceedings of the 5th Conference on Theory of Cryptography, New York, NY, USA, 2008.
  39. O. Goldreich, Foundations of Cryptography, vol. 2, Cambridge University Press, 2004.
  40. C. Dwork, “Differential privacy: a survey of results,” in Proceedings of the 5th International Conference on Theory and Applications of Models of Computation, Xi'an, China, 2008.
  41. C. Dwork, F. McSherry, K. Nissim, and A. Smith, “Calibrating noise to sensitivity in private data analysis,” in Proceedings of the 3rd Conference on Theory of Cryptography, New York, NY, USA, 2006.
  42. S. Goldwasser and S. Micali, “Probabilistic encryption & how to play mental poker keeping secret all partial informatio,” in Proceedings of the 14th Annual ACM Symposium on Theory of Computing, San Francisco, Calif, USA, 1982.
  43. J. Ma, “Smart u-things and ubiquitous intelligence,” in Proceeding of the 2nd International Conference on Embedded Software and Systems (ICESS ’05), pp. 776–776, Xi’an, China, December 2005. View at Publisher · View at Google Scholar · View at Scopus
  44. J. C. Augusto, V. Callaghan, D. Cook, A. Kameas, and I. Satoh, “Intelligent environments: a manifesto,” Human-Centric Computation and Information Sciences, vol. 3, pp. 1–18, 2013. View at Google Scholar