{"id":"https://openalex.org/W2885696728","doi":"https://doi.org/10.1109/icc.2018.8422445","title":"Reliable and Privacy-Preserving Selective Data Aggregation for Fog-Based IoT","display_name":"Reliable and Privacy-Preserving Selective Data Aggregation for Fog-Based IoT","publication_year":2018,"publication_date":"2018-05-01","ids":{"openalex":"https://openalex.org/W2885696728","doi":"https://doi.org/10.1109/icc.2018.8422445","mag":"2885696728"},"language":"en","primary_location":{"id":"doi:10.1109/icc.2018.8422445","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2018.8422445","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038498019","display_name":"Cheng Huang","orcid":"https://orcid.org/0000-0003-3769-7211"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Cheng Huang","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, Canada","institution_ids":["https://openalex.org/I151746483"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017433297","display_name":"Dongxiao Liu","orcid":"https://orcid.org/0000-0003-2595-6757"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Dongxiao Liu","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, Canada","institution_ids":["https://openalex.org/I151746483"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033931001","display_name":"Jianbing Ni","orcid":"https://orcid.org/0000-0002-5639-0883"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Jianbing Ni","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, Canada","institution_ids":["https://openalex.org/I151746483"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070447777","display_name":"Rongxing Lu","orcid":"https://orcid.org/0000-0001-5720-0941"},"institutions":[{"id":"https://openalex.org/I106938459","display_name":"University of New Brunswick","ror":"https://ror.org/05nkf0n29","country_code":"CA","type":"education","lineage":["https://openalex.org/I106938459"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Rongxing Lu","raw_affiliation_strings":["Faculty of Computer Science, University of New Brunswick, Fredericton, Canada"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Science, University of New Brunswick, Fredericton, Canada","institution_ids":["https://openalex.org/I106938459"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100773343","display_name":"Xuemin Shen","orcid":"https://orcid.org/0000-0002-4140-287X"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Xuemin Shen","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, Canada","institution_ids":["https://openalex.org/I151746483"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5038498019"],"corresponding_institution_ids":["https://openalex.org/I151746483"],"apc_list":null,"apc_paid":null,"fwci":3.0948,"has_fulltext":false,"cited_by_count":28,"citation_normalized_percentile":{"value":0.93279643,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8407855033874512},{"id":"https://openalex.org/keywords/data-aggregator","display_name":"Data aggregator","score":0.6002572178840637},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.5670599937438965},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.560883641242981},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.5542284846305847},{"id":"https://openalex.org/keywords/proxy","display_name":"Proxy (statistics)","score":0.5003247261047363},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.49814271926879883},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4783320426940918},{"id":"https://openalex.org/keywords/fog-computing","display_name":"Fog computing","score":0.47725149989128113},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4753413200378418},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.4599525034427643},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.44650769233703613},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.4392319321632385},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4219174385070801},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.32942837476730347},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.19010022282600403}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8407855033874512},{"id":"https://openalex.org/C82578977","wikidata":"https://www.wikidata.org/wiki/Q16773055","display_name":"Data aggregator","level":3,"score":0.6002572178840637},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.5670599937438965},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.560883641242981},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.5542284846305847},{"id":"https://openalex.org/C2780148112","wikidata":"https://www.wikidata.org/wiki/Q1432581","display_name":"Proxy (statistics)","level":2,"score":0.5003247261047363},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.49814271926879883},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4783320426940918},{"id":"https://openalex.org/C2986652147","wikidata":"https://www.wikidata.org/wiki/Q21809931","display_name":"Fog computing","level":3,"score":0.47725149989128113},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4753413200378418},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.4599525034427643},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.44650769233703613},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.4392319321632385},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4219174385070801},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.32942837476730347},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.19010022282600403},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc.2018.8422445","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2018.8422445","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1788452017","https://openalex.org/W2018956134","https://openalex.org/W2074609553","https://openalex.org/W2133711597","https://openalex.org/W2472333518","https://openalex.org/W2478516474","https://openalex.org/W2511933885","https://openalex.org/W2540126579","https://openalex.org/W2575938897","https://openalex.org/W2591915039","https://openalex.org/W2606084320","https://openalex.org/W2612964080","https://openalex.org/W2762859738","https://openalex.org/W2763925543","https://openalex.org/W2779833539","https://openalex.org/W3031770538","https://openalex.org/W6638436873","https://openalex.org/W6745091728","https://openalex.org/W6747330276"],"related_works":["https://openalex.org/W2539930818","https://openalex.org/W4393118461","https://openalex.org/W4390664647","https://openalex.org/W3012147850","https://openalex.org/W4313300189","https://openalex.org/W2949835517","https://openalex.org/W2601739120","https://openalex.org/W2377996584","https://openalex.org/W1970057761","https://openalex.org/W2138505526"],"abstract_inverted_index":{"Internet":[0],"of":[1,74,107,133,161,190,195],"Things":[2],"(IoT)":[3],"is":[4,32,167],"reshaping":[5],"our":[6,181],"daily":[7],"lives":[8],"by":[9,76],"bridging":[10],"the":[11,53,78,96,101,108,127,134,156,170,188,191],"gaps":[12],"between":[13],"physical":[14],"and":[15,24,46,62,81,92,104,117,130,158,165,177,198],"digital":[16],"world.":[17],"To":[18],"enable":[19],"ubiquitous":[20],"sensing,":[21],"seamless":[22],"connection":[23],"real-time":[25],"processing":[26],"for":[27,95,144],"IoT":[28,41,55,75,98],"applications,":[29],"fog":[30,68,163],"computing":[31,47],"considered":[33],"as":[34,66],"a":[35,39,89,150],"key":[36],"component":[37],"in":[38,180,193],"heterogeneous":[40],"architecture,":[42],"which":[43,136],"deploys":[44],"storage":[45],"resources":[48],"to":[49,59,99,124,154],"network":[50],"edges.":[51],"However,":[52],"fog-based":[54,97],"architecture":[56],"can":[57,173],"lead":[58],"various":[60],"security":[61],"privacy":[63,103,129],"risks,":[64],"such":[65],"compromised":[67,162],"nodes":[69],"that":[70,169],"may":[71],"impede":[72],"developments":[73],"attacking":[77],"data":[79,102,110,128,138,142],"collection":[80],"gathering":[82],"period.":[83],"In":[84,183],"this":[85],"paper,":[86],"we":[87],"propose":[88],"novel":[90],"privacy-preserving":[91],"reliable":[93],"scheme":[94,172,192],"address":[100],"reliability":[105,131],"challenges":[106],"selective":[109,141],"aggregation":[111,139],"service.":[112],"Specifically,":[113],"homomorphic":[114],"proxy":[115,118],"re-encryption":[116],"re-authenticator":[119],"techniques":[120],"are":[121],"respectively":[122],"utilized":[123],"deal":[125],"with":[126],"issues":[132],"service,":[135],"supports":[137],"over":[140],"types":[143],"any":[145],"type-driven":[146],"applications.":[147],"We":[148],"define":[149],"new":[151],"threat":[152],"model":[153],"formalize":[155],"non-collusive":[157,176],"collusive":[159,178],"attacks":[160,179],"nodes,":[164],"it":[166],"demonstrated":[168],"proposed":[171],"prevent":[174],"both":[175],"model.":[182],"addition,":[184],"performance":[185],"evaluations":[186],"show":[187],"efficiency":[189],"terms":[194],"computational":[196],"costs":[197],"communication":[199],"overheads.":[200]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":9},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
