具有稻草人构造的容错保护隐私块聚合方案

Anirudha Bhaskar
{"title":"具有稻草人构造的容错保护隐私块聚合方案","authors":"Anirudha Bhaskar","doi":"10.1109/IEMCON.2018.8614832","DOIUrl":null,"url":null,"abstract":"The main objective of this paper is to allow an suspicious aggressor estimate statistics without harming individual's privacy and is resilient to user failure and compromise, and can efficiently support dynamic leaves and joins. This paper will also show the combination of cryptography and computational differential privacy. The world requires applications where an suspicious aggressor can collect information without harming user's privacy and compute aggregate stats periodically.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Fault-Tolerant Privacy-Preserving Block Aggregation Scheme With Straw-Man Construction\",\"authors\":\"Anirudha Bhaskar\",\"doi\":\"10.1109/IEMCON.2018.8614832\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The main objective of this paper is to allow an suspicious aggressor estimate statistics without harming individual's privacy and is resilient to user failure and compromise, and can efficiently support dynamic leaves and joins. This paper will also show the combination of cryptography and computational differential privacy. The world requires applications where an suspicious aggressor can collect information without harming user's privacy and compute aggregate stats periodically.\",\"PeriodicalId\":368939,\"journal\":{\"name\":\"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)\",\"volume\":\"33 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IEMCON.2018.8614832\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IEMCON.2018.8614832","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

本文的主要目标是允许可疑攻击者在不损害个人隐私的情况下估计统计数据,并且对用户失败和妥协具有弹性,并且可以有效地支持动态叶子和连接。本文还将展示密码学与计算差分隐私的结合。这个世界需要这样的应用程序:可疑的攻击者可以在不损害用户隐私的情况下收集信息,并定期计算汇总统计数据。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Fault-Tolerant Privacy-Preserving Block Aggregation Scheme With Straw-Man Construction
The main objective of this paper is to allow an suspicious aggressor estimate statistics without harming individual's privacy and is resilient to user failure and compromise, and can efficiently support dynamic leaves and joins. This paper will also show the combination of cryptography and computational differential privacy. The world requires applications where an suspicious aggressor can collect information without harming user's privacy and compute aggregate stats periodically.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
On the Fog Node Model for Multi-purpose Fog Computing Systems Research-Practice Gap in Passive House Standard Propagation Modeling of IoT Devices for Deployment in Multi-level Hilly Urban Environments Architectures and Challenges Towards Software Defined Cloud of Things (SDCoT) Unveiling Topics from Scientific Literature on the Subject of Self-driving Cars using Latent Dirichlet Allocation
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1