Abstract. We consider applications where an untrusted aggregator would like to collect privacy sensitive data from users, and compute aggregate statistics pe-riodically. For example, imagine a smart grid operator who wishes to aggregate the total power consumption of a neighborhood every ten minutes; or a market researcher who wishes to track the fraction of population watching ESPN on an hourly basis. We design novel mechanisms that allow an aggregator to accurately estimate such statistics, while offering provable guarantees of user privacy against the untrusted aggregator. Our constructions are resilient to user failure and compromise, and can efficiently support dynamic joins and leaves. Our constructions also exem-plify the clear advan...
Significant challenges for online event aggregation in the context of Cyber-Physical Systems stem fr...
The progress in communication and hardware technology increases the computational capabilities of pe...
The emergence of Internet of Things (IoT) offers many advantages, but it also raises significant cha...
LNCS v. 7397 entitled: Financial cryptography and data security : 16th International Conference, FC ...
We consider applications scenarios where an untrusted aggregator wishes to continually monitor the h...
Large amounts of data are continuously generated by individuals, apps, or dedicated devices. These d...
The conference paper can be viewed at: http://www.isoc.org/isoc/conferences/ndss/11/proceedings.shtm...
Abstract. Existing work on data collection and analysis for aggregation is mainly focused on confide...
Abstract—Applications such as sensor network monitoring, distributed intrusion detection, and real-t...
Abstract—Privacy-preserving protocols allow an untrusted aggregator to evaluate certain statistics o...
Aggregator oblivious encryption was proposed by Shi et al. (NDSS 2011), where an aggregator can comp...
We consider how an untrusted data aggregator can learn desired statistics over multiple participants...
Privacy-preserving data aggregation protocols have been researched widely, but usually cannot guaran...
Abstract—Much research has been conducted to securely outsource multiple parties ’ data aggregation ...
A private stream aggregation (PSA) scheme is a protocol of n clients and one aggregator. At every ti...
Significant challenges for online event aggregation in the context of Cyber-Physical Systems stem fr...
The progress in communication and hardware technology increases the computational capabilities of pe...
The emergence of Internet of Things (IoT) offers many advantages, but it also raises significant cha...
LNCS v. 7397 entitled: Financial cryptography and data security : 16th International Conference, FC ...
We consider applications scenarios where an untrusted aggregator wishes to continually monitor the h...
Large amounts of data are continuously generated by individuals, apps, or dedicated devices. These d...
The conference paper can be viewed at: http://www.isoc.org/isoc/conferences/ndss/11/proceedings.shtm...
Abstract. Existing work on data collection and analysis for aggregation is mainly focused on confide...
Abstract—Applications such as sensor network monitoring, distributed intrusion detection, and real-t...
Abstract—Privacy-preserving protocols allow an untrusted aggregator to evaluate certain statistics o...
Aggregator oblivious encryption was proposed by Shi et al. (NDSS 2011), where an aggregator can comp...
We consider how an untrusted data aggregator can learn desired statistics over multiple participants...
Privacy-preserving data aggregation protocols have been researched widely, but usually cannot guaran...
Abstract—Much research has been conducted to securely outsource multiple parties ’ data aggregation ...
A private stream aggregation (PSA) scheme is a protocol of n clients and one aggregator. At every ti...
Significant challenges for online event aggregation in the context of Cyber-Physical Systems stem fr...
The progress in communication and hardware technology increases the computational capabilities of pe...
The emergence of Internet of Things (IoT) offers many advantages, but it also raises significant cha...