PRIVACY-PRESERVING DATA COLLECTION AND RECOVERY OF COMPRESSIVE SENSING

被引:0
作者
Hung, Tsung-Hsuan [1 ]
Hsieh, Sung-Hsien [1 ]
Lu, Chun-Shien [1 ]
机构
[1] Acad Sinica, Inst Informat Sci, Taipei, Taiwan
来源
2015 IEEE CHINA SUMMIT & INTERNATIONAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING | 2015年
关键词
Basis pursuit; compressive sensing; convex optimization; encryption; security; SIGNAL RECOVERY;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Energy-efficient data collection and privacy-preserving data recovery have received much attention recently. We propose the first encryption framework for the computation-intensive basis pursuit problem to be securely solved in the cloud with the data being efficiently collected using compressive sensing. We provide security and efficiency analyses to show the effectiveness of our method. Simulations and comparison with state-of-the-art are also conducted.
引用
收藏
页码:473 / 477
页数:5
相关论文
共 50 条
  • [31] Privacy-Preserving Data Mining for Smart Manufacturing
    Hu, Qianyu
    Chen, Ruimin
    Yang, Hui
    Kumara, Soundar
    SMART AND SUSTAINABLE MANUFACTURING SYSTEMS, 2020, 4 (02): : 99 - 120
  • [32] Privacy-Preserving Data Encryption Strategy for Big Data in Mobile Cloud Computing
    Gai, Keke
    Qiu, Meikang
    Zhao, Hui
    IEEE TRANSACTIONS ON BIG DATA, 2021, 7 (04) : 678 - 688
  • [33] Privacy-Preserving Statistics
    Vaidya, Jaideep
    COMPUTER, 2018, 51 (09) : 8 - 9
  • [34] A Security Framework for Privacy-Preserving Data Aggregation in Wireless Sensor Networks
    Chan, Aldar C-F.
    Castelluccia, Claude
    ACM TRANSACTIONS ON SENSOR NETWORKS, 2011, 7 (04)
  • [35] Attribute-Hiding Fuzzy Encryption for Privacy-Preserving Data Evaluation
    Chen, Zhenhua
    Huang, Luqi
    Yang, Guomin
    Susilo, Willy
    Fu, Xingbing
    Jia, Xingxing
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2024, 17 (03) : 789 - 803
  • [36] A Privacy-Preserving and Untraceable Group Data Sharing Scheme in Cloud Computing
    Shen, Jian
    Yang, Huijie
    Vijayakumar, Pandi
    Kumar, Neeraj
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (04) : 2198 - 2210
  • [37] Practical Privacy-Preserving Authentication for SSH
    Roy, Lawrence
    Lyakhov, Stanislav
    Jang, Yeongjin
    Rosulek, Mike
    PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, 2022, : 3345 - 3362
  • [38] Privacy-preserving techniques of genomic data-a survey
    Al Aziz, Md Momin
    Sadat, Md Nazmus
    Alhadidi, Dima
    Wang, Shuang
    Jiang, Xiaoqian
    Brown, Cheryl L.
    Mohammed, Noman
    BRIEFINGS IN BIOINFORMATICS, 2019, 20 (03) : 887 - 895
  • [39] Comparative Analysis of Privacy-Preserving Data Mining Techniques
    Bhandari, Neetika
    Pahwa, Payal
    INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING AND COMMUNICATIONS, VOL 2, 2019, 56 : 535 - 541
  • [40] 2PBDC: privacy-preserving bigdata collection in cloud environment
    Jangirala Srinivas
    Ashok Kumar Das
    Joel J. P. C. Rodrigues
    The Journal of Supercomputing, 2020, 76 : 4772 - 4801