Providing Task Allocation and Secure Deduplication for Mobile Crowdsensing via Fog Computing
暂无分享,去创建一个
Jianbing Ni | Xiaodong Lin | Xuemin Sherman Shen | Kuan Zhang | Yong Yu | Xiaodong Lin | X. Shen | Yong Yu | Jianbing Ni | Kuan Zhang
[1] Xiaodong Lin,et al. Secure and Deduplicated Spatial Crowdsourcing: A Fog-Based Approach , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).
[2] Lei Chen,et al. GeoTruCrowd: trustworthy query answering with spatial crowdsourcing , 2013, SIGSPATIAL/GIS.
[3] Yi Mu,et al. Constant-Size Dynamic k-TAA , 2006, SCN.
[4] Cyrus Shahabi,et al. A Server-Assigned Spatial Crowdsourcing Framework , 2015, ACM Trans. Spatial Algorithms Syst..
[5] Wen Hu,et al. A privacy-preserving reputation system for participatory sensing , 2012, 37th Annual IEEE Conference on Local Computer Networks.
[6] Fan Ye,et al. Mobile crowdsensing: current state and future challenges , 2011, IEEE Communications Magazine.
[7] Wei Cheng,et al. Enabling Reputation and Trust in Privacy-Preserving Mobile Sensing , 2014, IEEE Transactions on Mobile Computing.
[8] Yehuda Lindell,et al. Introduction to Modern Cryptography , 2004 .
[9] Mihir Bellare,et al. Message-Locked Encryption and Secure Deduplication , 2013, EUROCRYPT.
[10] Daqing Zhang,et al. CCS-TA: quality-guaranteed online task allocation in compressive crowdsensing , 2015, UbiComp.
[11] Mihir Bellare,et al. Interactive Message-Locked Encryption and Secure Deduplication , 2015, Public Key Cryptography.
[12] Ying Wang,et al. Trust Based Incentive Scheme to Allocate Big Data Tasks with Mobile Social Cloud , 2017, IEEE Transactions on Big Data.
[13] Vaidy S. Sunderam,et al. Spatial Task Assignment for Crowd Sensing with Cloaked Locations , 2014, 2014 IEEE 15th International Conference on Mobile Data Management.
[14] Jin Li,et al. Secure Deduplication with Efficient and Reliable Convergent Key Management , 2014, IEEE Transactions on Parallel and Distributed Systems.
[15] Yi Mu,et al. Asymmetric Group Key Agreement , 2009, EUROCRYPT.
[16] Enrico Gregori,et al. Smartphone-based crowdsourcing for network monitoring: Opportunities, challenges, and a case study , 2014, IEEE Communications Magazine.
[17] Benny Pinkas,et al. Secure Deduplication of Encrypted Data without Additional Independent Servers , 2015, CCS.
[18] Kaoru Ota,et al. Secure Data Deduplication With Reliable Key Management for Dynamic Updates in CPSS , 2015, IEEE Transactions on Computational Social Systems.
[19] Daqing Zhang,et al. iCrowd: Near-Optimal Task Allocation for Piggyback Crowdsensing , 2016, IEEE Transactions on Mobile Computing.
[20] Mihir Bellare,et al. DupLESS: Server-Aided Encryption for Deduplicated Storage , 2013, USENIX Security Symposium.
[21] Cong Wang,et al. Toward Encrypted Cloud Media Center With Secure Deduplication , 2017, IEEE Transactions on Multimedia.
[22] Jin Li,et al. A Hybrid Cloud Approach for Secure Authorized Deduplication , 2015, IEEE Transactions on Parallel and Distributed Systems.
[23] Yael Tauman Kalai,et al. Improved Online/Offline Signature Schemes , 2001, CRYPTO.
[24] Jan Camenisch,et al. Efficient Group Signature Schemes for Large Groups (Extended Abstract) , 1997, CRYPTO.
[25] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[26] Lu Li,et al. Towards Preserving Worker Location Privacy in Spatial Crowdsourcing , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).
[27] Shih-Hao Chang,et al. Protecting Mobile Crowd Sensing against Sybil Attacks Using Cloud Based Trust Management System , 2016, Mob. Inf. Syst..
[28] Jan Willemson,et al. Privacy Protection for Wireless Medical Sensor Data , 2016, IEEE Transactions on Dependable and Secure Computing.
[29] Minyi Guo,et al. Mobile Crowdsensing in Software Defined Opportunistic Networks , 2017, IEEE Communications Magazine.
[30] Yunhao Liu,et al. Incentives for Mobile Crowd Sensing: A Survey , 2016, IEEE Communications Surveys & Tutorials.
[31] Xiaohui Liang,et al. Exploiting Social Network to Enhance Human-to-Human Infection Analysis without Privacy Leakage , 2018, IEEE Transactions on Dependable and Secure Computing.
[32] Cyrus Shahabi,et al. GeoCrowd: enabling query answering with spatial crowdsourcing , 2012, SIGSPATIAL/GIS.
[33] Cong Wang,et al. Enabling secure and effective near-duplicate detection over encrypted in-network storage , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.
[34] Matthew Green,et al. Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.
[35] Xuemin Shen,et al. Securing Fog Computing for Internet of Things Applications: Challenges and Solutions , 2018, IEEE Communications Surveys & Tutorials.
[36] Xiao Lu,et al. Real-Time and Spatio-Temporal Crowd-Sourced Social Network Data Publishing with Differential Privacy , 2018, IEEE Transactions on Dependable and Secure Computing.
[37] Kin K. Leung,et al. Energy-Aware Participant Selection for Smartphone-Enabled Mobile Crowd Sensing , 2017, IEEE Systems Journal.
[38] Jie Zhu,et al. EEMC , 2015, ACM Trans. Intell. Syst. Technol..
[39] Luis Rodero-Merino,et al. Finding your Way in the Fog: Towards a Comprehensive Definition of Fog Computing , 2014, CCRV.
[40] Qinghua Li,et al. Providing Privacy-Aware Incentives in Mobile Sensing Systems , 2016, IEEE Transactions on Mobile Computing.