Computing Maximum and Minimum with Privacy Preservation and Flexible Access Control
dc.contributor | Aalto-yliopisto | fi |
dc.contributor | Aalto University | en |
dc.contributor.author | Ding, Wenxiu | en_US |
dc.contributor.author | Yan, Zheng | en_US |
dc.contributor.author | Qian, X.R. | en_US |
dc.contributor.author | Deng, R.H. | en_US |
dc.contributor.department | Department of Communications and Networking | en |
dc.contributor.groupauthor | Network Security and Trust | en |
dc.contributor.organization | Xidian University | en_US |
dc.contributor.organization | Singapore Management University | en_US |
dc.date.accessioned | 2020-04-30T12:50:24Z | |
dc.date.available | 2020-04-30T12:50:24Z | |
dc.date.issued | 2019 | en_US |
dc.description.abstract | With the fast development of Internet of Things, huge volume of data is being collected from various sensors and devices, aggregated at gateways, and processed in the cloud. Due to privacy concern, data are usually encrypted before being outsourced to the cloud. However, encryption seriously impedes both computation over the data and sharing of the computation results. Computing maximum and minimum among a data set are two of the most basic operations in machine learning and data mining algorithms. In this paper, we study how to compute maximum and minimum over encrypted data and control the access to the computation result in a privacy-preserving manner. We present four schemes to realize privacy-preserving maximum and minimum computations with flexible access control that can adapt to various application scenarios. We further analyze their security and show their efficiency through extensive evaluations and comparisons with existing work. © 2019 IEEE. | en |
dc.description.version | Peer reviewed | en |
dc.format.mimetype | application/pdf | en_US |
dc.identifier.citation | Ding, W, Yan, Z, Qian, X R & Deng, R H 2019, Computing Maximum and Minimum with Privacy Preservation and Flexible Access Control. in IEEE Global Communications Conference., 9013937, IEEE Global Communications Conference, IEEE, IEEE Global Communications Conference, Waikoloa, Hawaii, United States, 09/12/2019. https://doi.org/10.1109/GLOBECOM38437.2019.9013937 | en |
dc.identifier.doi | 10.1109/GLOBECOM38437.2019.9013937 | en_US |
dc.identifier.isbn | 9781728109626 | |
dc.identifier.issn | 2334-0983 | |
dc.identifier.other | PURE UUID: 82d81e82-2d5d-4a00-9a03-4d8555bc1fce | en_US |
dc.identifier.other | PURE ITEMURL: https://research.aalto.fi/en/publications/82d81e82-2d5d-4a00-9a03-4d8555bc1fce | en_US |
dc.identifier.other | PURE FILEURL: https://research.aalto.fi/files/42573543/Ding_Computing_maximum_and_minimum_Globecom.pdf | en_US |
dc.identifier.uri | https://aaltodoc.aalto.fi/handle/123456789/44004 | |
dc.identifier.urn | URN:NBN:fi:aalto-202004302983 | |
dc.language.iso | en | en |
dc.relation.ispartof | IEEE Global Communications Conference | en |
dc.relation.ispartofseries | IEEE Global Communications Conference | en |
dc.rights | openAccess | en |
dc.subject.keyword | access control | en_US |
dc.subject.keyword | attribute-based encryption | en_US |
dc.subject.keyword | homomorphic encryption | en_US |
dc.subject.keyword | maximum and minimum | en_US |
dc.subject.keyword | privacy preservation | en_US |
dc.title | Computing Maximum and Minimum with Privacy Preservation and Flexible Access Control | en |
dc.type | A4 Artikkeli konferenssijulkaisussa | fi |
dc.type.version | acceptedVersion |