Toward efficient and privacy-preserving computing in big data era

作者: Rongxing Lu , Hui Zhu , Ximeng Liu , Joseph K Liu , Jun Shao

DOI: 10.1109/MNET.2014.6863131

关键词: Protocol (object-oriented programming)Internet privacyBig dataVariety (cybernetics)Cosine similarityPrivacy softwareExploitInformation privacyDimension (data warehouse)Computer scienceData scienceComputer Networks and CommunicationsHardware and ArchitectureSoftwareInformation Systems

摘要: … not they are suitable for privacy-preserving big data analytics. … present an efficient and privacy-preserving cosine similarity … homomorphic encryption (HE), such as Pallier encryption (PE…

参考文章(6)
Xindong Wu, Xingquan Zhu, Gong-Qing Wu, Wei Ding, Data mining with big data IEEE Transactions on Knowledge and Data Engineering. ,vol. 26, pp. 97- 107 ,(2014) , 10.1109/TKDE.2013.109
Rongxing Lu, Xiaohui Liang, Xu Li, Xiaodong Lin, Xuemin Shen, EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications IEEE Transactions on Parallel and Distributed Systems. ,vol. 23, pp. 1621- 1631 ,(2012) , 10.1109/TPDS.2012.86
Ming Li, Shucheng Yu, Kui Ren, Wenjing Lou, Y. T. Hou, Toward privacy-assured and searchable cloud data storage services IEEE Network. ,vol. 27, pp. 56- 62 ,(2013) , 10.1109/MNET.2013.6574666
Rongxing Lu, Xiaodong Lin, Xuemin Shen, SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency IEEE Transactions on Parallel and Distributed Systems. ,vol. 24, pp. 614- 624 ,(2013) , 10.1109/TPDS.2012.146
Pascal Paillier, Public-key cryptosystems based on composite degree residuosity classes theory and application of cryptographic techniques. pp. 223- 238 ,(1999) , 10.1007/3-540-48910-X_16
Simon Liu, Exploring the Future of Computing IT Professional. ,vol. 15, pp. 2- 3 ,(2013) , 10.1109/MITP.2012.120