{"id":"https://openalex.org/W2791729165","doi":"https://doi.org/10.1093/comjnl/bxy013","title":"Privacy Preserving, Verifiable and Resilient Data Aggregation in Grid-Based Networks","display_name":"Privacy Preserving, Verifiable and Resilient Data Aggregation in Grid-Based Networks","publication_year":2018,"publication_date":"2018-01-19","ids":{"openalex":"https://openalex.org/W2791729165","doi":"https://doi.org/10.1093/comjnl/bxy013","mag":"2791729165"},"language":"en","primary_location":{"id":"doi:10.1093/comjnl/bxy013","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxy013","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035959206","display_name":"Kaushal Shah","orcid":"https://orcid.org/0000-0002-8494-9752"},"institutions":[{"id":"https://openalex.org/I42014448","display_name":"Sardar Vallabhbhai National Institute of Technology Surat","ror":"https://ror.org/02y394t43","country_code":"IN","type":"education","lineage":["https://openalex.org/I42014448"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Kaushal A Shah","raw_affiliation_strings":["Computer Engineering Department, S.V. National Institute of Technology, Surat, India"],"raw_orcid":"https://orcid.org/0000-0002-8494-9752","affiliations":[{"raw_affiliation_string":"Computer Engineering Department, S.V. National Institute of Technology, Surat, India","institution_ids":["https://openalex.org/I42014448"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5028565396","display_name":"Devesh C. Jinwala","orcid":"https://orcid.org/0000-0003-4830-1702"},"institutions":[{"id":"https://openalex.org/I42014448","display_name":"Sardar Vallabhbhai National Institute of Technology Surat","ror":"https://ror.org/02y394t43","country_code":"IN","type":"education","lineage":["https://openalex.org/I42014448"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Devesh C Jinwala","raw_affiliation_strings":["Computer Engineering Department, S.V. National Institute of Technology, Surat, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Computer Engineering Department, S.V. National Institute of Technology, Surat, India","institution_ids":["https://openalex.org/I42014448"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5035959206"],"corresponding_institution_ids":["https://openalex.org/I42014448"],"apc_list":{"value":2635,"currency":"GBP","value_usd":3232},"apc_paid":null,"fwci":1.7587,"has_fulltext":false,"cited_by_count":21,"citation_normalized_percentile":{"value":0.86076544,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"61","issue":"4","first_page":"614","last_page":"628"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.9320300817489624},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7623286843299866},{"id":"https://openalex.org/keywords/grid","display_name":"Grid","score":0.5341073274612427},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4712313115596771},{"id":"https://openalex.org/keywords/privacy-protection","display_name":"Privacy protection","score":0.4483809769153595},{"id":"https://openalex.org/keywords/data-aggregator","display_name":"Data aggregator","score":0.4438640773296356},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.23370158672332764},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.10574349761009216},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.07230877876281738}],"concepts":[{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.9320300817489624},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7623286843299866},{"id":"https://openalex.org/C187691185","wikidata":"https://www.wikidata.org/wiki/Q2020720","display_name":"Grid","level":2,"score":0.5341073274612427},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4712313115596771},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.4483809769153595},{"id":"https://openalex.org/C82578977","wikidata":"https://www.wikidata.org/wiki/Q16773055","display_name":"Data aggregator","level":3,"score":0.4438640773296356},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.23370158672332764},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.10574349761009216},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.07230877876281738},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1093/comjnl/bxy013","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxy013","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W150223756","https://openalex.org/W236003722","https://openalex.org/W1973225261","https://openalex.org/W1973309971","https://openalex.org/W1976060656","https://openalex.org/W1977056427","https://openalex.org/W2010314082","https://openalex.org/W2027423568","https://openalex.org/W2052770748","https://openalex.org/W2055817410","https://openalex.org/W2068143382","https://openalex.org/W2068688360","https://openalex.org/W2090495398","https://openalex.org/W2094930328","https://openalex.org/W2095677682","https://openalex.org/W2100955315","https://openalex.org/W2102175501","https://openalex.org/W2112244911","https://openalex.org/W2121278461","https://openalex.org/W2123910460","https://openalex.org/W2132362924","https://openalex.org/W2140372921","https://openalex.org/W2141420453","https://openalex.org/W2142100695","https://openalex.org/W2146471895","https://openalex.org/W2148922257","https://openalex.org/W2155937888","https://openalex.org/W2166196498","https://openalex.org/W2168452204","https://openalex.org/W2170239483","https://openalex.org/W2292682215","https://openalex.org/W2430154064","https://openalex.org/W2583960109","https://openalex.org/W2951754992","https://openalex.org/W6606067566","https://openalex.org/W6696996345","https://openalex.org/W6764363576"],"related_works":["https://openalex.org/W2355730523","https://openalex.org/W152021879","https://openalex.org/W2072918937","https://openalex.org/W2365629437","https://openalex.org/W2023935927","https://openalex.org/W2348330439","https://openalex.org/W2350372928","https://openalex.org/W2377292126","https://openalex.org/W2128900334","https://openalex.org/W2139109546"],"abstract_inverted_index":{"The":[0,156],"grid-based":[1,89,201],"networks":[2,90,202],"are":[3,32],"formed":[4],"by":[5],"applications":[6,16],"where":[7],"objects":[8],"being":[9],"monitored":[10],"form":[11],"a":[12,129],"square":[13],"grid.":[14],"These":[15],"often":[17],"demand":[18],"critical":[19],"security":[20,54,157,164,168],"concerns":[21],"as":[22,57,101],"the":[23,26,41,47,52,61,64,68,83,86,104,110,132,139,150,153,167,170,174,179,183],"compromise":[24],"to":[25,45,91,103,120,131,152],"data":[27,36,189],"yields":[28],"adverse":[29],"effects.":[30],"There":[31],"indeed,":[33],"several":[34],"lightweight":[35],"aggregation":[37,94],"schemes":[38,107],"proposed":[39,133,154,171,180],"in":[40,73,85,200],"literature":[42],"that":[43,96,185],"aims":[44],"minimize":[46],"resource":[48],"overhead,":[49],"albeit":[50],"providing":[51],"required":[53],"attributes.":[55],"However,":[56],"per":[58],"our":[59,177],"observations,":[60],"information":[62],"about":[63],"actual":[65],"deployment":[66,87],"of":[67,75,88,113,169,176,206],"nodes":[69],"is":[70,118,182],"not":[71],"exploited":[72],"any":[74],"these":[76],"attempts.":[77],"In":[78,138],"this":[79],"paper,":[80],"we":[81,126],"exploit":[82],"linearity":[84],"design":[92],"an":[93],"scheme":[95,134,181],"eventually":[97],"entails":[98],"lesser":[99,142,204],"overhead":[100],"compared":[102],"other":[105],"existing":[106],"while":[108],"offering":[109],"same":[111],"level":[112],"resilience.":[114],"As":[115],"homomorphic":[116,136],"encryption":[117],"considered":[119],"be":[121],"more":[122],"secure":[123],"than":[124],"obfuscation,":[125],"also":[127],"propose":[128],"variant":[130,151],"using":[135,159],"encryption.":[137],"scenario":[140],"with":[141,203],"restriction":[143],"on":[144],"computation,":[145],"one":[146],"can":[147],"opt":[148],"for":[149],"scheme.":[155,172],"analysis":[158],"mathematical":[160],"induction":[161],"and":[162,195,209],"formal":[163],"proofs":[165],"proves":[166],"To":[173],"best":[175],"knowledge,":[178],"first":[184],"achieves":[186],"privacy":[187],"preservation,":[188],"verification,":[190],"resilience":[191],"against":[192,197],"node":[193],"capture":[194],"avoidance":[196],"collusion":[198],"attacks":[199],"requirement":[205],"key":[207],"storage":[208],"communication":[210],"cost.":[211]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":8},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
