Citation: | CHEN Qiuling, YE Ayong, ZHANG Qiang, HUANG Chuan. A New Edge Perturbation Mechanism for Privacy-Preserving Data Collection in IoT[J]. Chinese Journal of Electronics. doi: 10.1049/cje.2021.00.411 |
[1] |
Abrar M, Zuhaira B, Anjum A, “Privacy-preserving data collection for 1: M dataset,” Multimedia Tools and Applications, pp.1–22, 2021.
|
[2] |
D. Lv, S. Zhu, “Achieving secure big data collection based on trust evaluation and true data discovery,” Computers & Security, vol.96, article no.101937, 2020.
|
[3] |
Jiang, Q, Zhang, X, Zhang, N, Tian, Y, Ma, X, and Ma, J, “Three-factor authentication protocol using physical unclonable function for IoV,” Computer Communications, vol.173, pp.45–55, 2021. doi: 10.1016/j.comcom.2021.03.022
|
[4] |
Zhao, G, Jiang, Q, Huang, X, Ma, X, Tian, Y, and Ma, J, “Secure and Usable Handshake Based Pairing for Wrist-Worn Smart Devices on Different Users,” Mobile Networks and Applications, pp.1–16, 2021.
|
[5] |
Jiang, Q, Zhang, N, Ni, J, Ma, J, Ma, X, and Choo, K. K. R, “Unified biometric privacy preserving three-factor authentication and key agreement for cloud-assisted autonomous vehicles,” IEEE Transactions on Vehicular Technology, vol.69, no.9, pp.9390–9401, 2020. doi: 10.1109/TVT.2020.2971254
|
[6] |
B. C. M. FUNG, K. WANG, et al., “Privacy-preserving data publishing: A survey of recent developments,” ACM Comput Surv, vol.42, no.4, pp.1–53, 2010.
|
[7] |
Wang, C, Wang, D, Xu, G, and He, D, “Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0. Science China Information Sciences,” Science China Information Sciences, vol.65, no.1, pp.1–15, 2022.
|
[8] |
Li, Z, Wang, D, and Morais, E, “Quantum-safe round-optimal password authentication for mobile devices,” IEEE Transactions on Dependable and Secure Computing, article no.99, 2020.
|
[9] |
Y. Liu, M. Hu, X. Ma, et al., “A new robust data hiding method for H.264/AVC without intra-frame distortion drift,” Neurocomputing, vol.151, no.3, pp.1076–1085, 2015.
|
[10] |
Kim, Jong Wook, et al., “A Survey Of differential privacy-based techniques and their applicability to location-Based services.,” Computers & Security, vol.111, article no.102464, 2021.
|
[11] |
W. Fan, J. He, M. Guo, et al., “Privacy preserving classification on local differential privacy in data centers,” Journal of Parallel and Distributed Computing, vol.135, pp.70–82, 2020. doi: 10.1016/j.jpdc.2019.09.009
|
[12] |
C. Xia, J. Hua, W. Tong, et al., “Distributed k-means clustering guaranteeing local differential privacy,” Computers & Security, vol.90, article no.101699, 2020.
|
[13] |
Nasir, Mobashirah, Anjum, et al., “Privacy preservation in skewed data using frequency distribution and weightage,” Journal of Medical Imaging and Health Informatics, vol.7, no.6, pp.1346–1357, 2017. doi: 10.1166/jmihi.2017.2206
|
[14] |
R. G. Mercedes, B. Montserrat, S. David, “Utility-preserving privacy protection of nominal data sets via semantic rank swapping,” Information Fusion, vol.45, pp.282–295, 2019. doi: 10.1016/j.inffus.2018.02.008
|
[15] |
A. Kmp, B. Pvs, “Suppressed k-anonymity multi-factor authentication based schmidt-samoa cryptography for privacy preserved data access in cloud computing,” Computer Communications, vol.158, pp.85–94, 2020. doi: 10.1016/j.comcom.2020.04.057
|
[16] |
S. Zhang, X. Li, Ming Zong, et al., “Learning k for KNN Classification,” ACM Transactions on Intelligent Systems and Techn, vol.8, no.43, pp.1–19, 2017.
|
[17] |
B. B. Mehta, U. P. Rao, “Improved l-diversity: Scalable anonymization approach for privacy preserving big data publishing,” Journal of King Saud University-Computer and Information Sciences, 2019.
|
[18] |
Y. W. Zhou, B. Yang, X. Wang, “Direct anonymous roaming authentication protocol based on fuzzy identity,” Journal of Software, vol.29, no.12, pp.3820–3836, 2018.
|
[19] |
A. Ye, Jin J, Yang Z, et al., “Evolutionary game analysis on competition strategy choice of application providers,” Concurrency and Computation Practice and Experience, vol.33, no.8, article no.e5446, 2021.
|
[20] |
M. Minea, C Dumitescu, “Enhanced public transport management employing AI and anonymous data collection,” Proc. of MATEC Web of Conferences, vol.292, article no.03006, 2019. doi: 10.1051/matecconf/201929203006
|
[21] |
Z. Zhou, Z. Li, “Data anonymous collection protocol without trusted third party,” Journal of Electronics Information Technology, vol.41, no.6, pp.1442–1449, 2019.
|
[22] |
K. Muralidhar, R. Sarathy, “An enhanced data perturbation approach for small data sets,” Decision Sciences, vol.36, no.3, pp.513–529, 2005. doi: 10.1111/j.1540-5414.2005.00082.x
|
[23] |
Y. Tian, X. Li, A. Sangaian, et al., “Privacy-preserving scheme in social participatory sensing based on secure multiparty cooperation,” Computer Communications, vol.119, pp.167–178, 2018. doi: 10.1016/j.comcom.2017.10.007
|
[24] |
Y. Wang, Z. Cai, Z. Chi, et al., “A differentially kanonymity-based location privacy-preserving for mobile crowdsourcing systems,” Procedia Computer Science, vol.129, pp.28–34, 2018. doi: 10.1016/j.procs.2018.03.040
|
[25] |
D. Lv, S. Zhu. “Correlated differential privacy protection for big data,” Proc. of Conference: 2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA), pp.1011–1018, 2018.
|
[26] |
J. Kim, B. Jang, “Workload-aware indoor positioning data collection via local differential privacy,” IEEE communications letters, vol.23, no.8, pp.1352–1356, 2019. doi: 10.1109/LCOMM.2019.2922963
|