{"id":"https://openalex.org/W2076320957","doi":"https://doi.org/10.1109/icccn.2010.5560026","title":"Secure Data Aggregation through Proactive Defense","display_name":"Secure Data Aggregation through Proactive Defense","publication_year":2010,"publication_date":"2010-08-01","ids":{"openalex":"https://openalex.org/W2076320957","doi":"https://doi.org/10.1109/icccn.2010.5560026","mag":"2076320957"},"language":"en","primary_location":{"id":"doi:10.1109/icccn.2010.5560026","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccn.2010.5560026","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 Proceedings of 19th International Conference on Computer Communications and Networks","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100366888","display_name":"Shuo Chen","orcid":"https://orcid.org/0000-0003-3581-0997"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]},{"id":"https://openalex.org/I865915315","display_name":"Vrije Universiteit Amsterdam","ror":"https://ror.org/008xxew50","country_code":"NL","type":"education","lineage":["https://openalex.org/I865915315"]}],"countries":["CN","NL"],"is_corresponding":true,"raw_author_name":"Shuo Chen","raw_affiliation_strings":["Tsinghua University, Beijing, China","VU University Amsterdam, Amsterdam, Netherlands#TAB#"],"affiliations":[{"raw_affiliation_string":"Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"VU University Amsterdam, Amsterdam, Netherlands#TAB#","institution_ids":["https://openalex.org/I865915315"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081007480","display_name":"Guillaume Pierre","orcid":"https://orcid.org/0000-0003-1418-8174"},"institutions":[{"id":"https://openalex.org/I865915315","display_name":"Vrije Universiteit Amsterdam","ror":"https://ror.org/008xxew50","country_code":"NL","type":"education","lineage":["https://openalex.org/I865915315"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Guillaume Pierre","raw_affiliation_strings":["VU University, Amsterdam, Netherlands","VU University Amsterdam, Amsterdam, Netherlands#TAB#"],"affiliations":[{"raw_affiliation_string":"VU University, Amsterdam, Netherlands","institution_ids":[]},{"raw_affiliation_string":"VU University Amsterdam, Amsterdam, Netherlands#TAB#","institution_ids":["https://openalex.org/I865915315"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5058644115","display_name":"Chi\u2010Hung Chi","orcid":"https://orcid.org/0000-0001-7271-1926"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chi-Hung Chi","raw_affiliation_strings":["Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100366888"],"corresponding_institution_ids":["https://openalex.org/I865915315","https://openalex.org/I99065089"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.17400313,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11106","display_name":"Data Management and Algorithms","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/gossip","display_name":"Gossip","score":0.8991798162460327},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8169137239456177},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.7650961875915527},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.7127522230148315},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.6941945552825928},{"id":"https://openalex.org/keywords/data-aggregator","display_name":"Data aggregator","score":0.5926594734191895},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5922548770904541},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5359583497047424},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5236858129501343},{"id":"https://openalex.org/keywords/gossip-protocol","display_name":"Gossip protocol","score":0.517853319644928},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.41523829102516174},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.20732158422470093},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.08567026257514954}],"concepts":[{"id":"https://openalex.org/C62989814","wikidata":"https://www.wikidata.org/wiki/Q854648","display_name":"Gossip","level":2,"score":0.8991798162460327},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8169137239456177},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.7650961875915527},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.7127522230148315},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.6941945552825928},{"id":"https://openalex.org/C82578977","wikidata":"https://www.wikidata.org/wiki/Q16773055","display_name":"Data aggregator","level":3,"score":0.5926594734191895},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5922548770904541},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5359583497047424},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5236858129501343},{"id":"https://openalex.org/C145928361","wikidata":"https://www.wikidata.org/wiki/Q5587504","display_name":"Gossip protocol","level":3,"score":0.517853319644928},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.41523829102516174},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.20732158422470093},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.08567026257514954},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/icccn.2010.5560026","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccn.2010.5560026","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 Proceedings of 19th International Conference on Computer Communications and Networks","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.184.6499","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.184.6499","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.globule.org/publi/SDATPD_gridpeer2010.pdf","raw_type":"text"},{"id":"pmh:oai:research.vu.nl:publications/942efbc7-9d75-4809-bde5-9005c4fafa4f","is_oa":false,"landing_page_url":"https://hdl.handle.net/1871.1/942efbc7-9d75-4809-bde5-9005c4fafa4f","pdf_url":null,"source":{"id":"https://openalex.org/S4306400546","display_name":"Digital Academic REpository of VU University Amsterdam (Vrije Universiteit Amsterdam)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I865915315","host_organization_name":"Vrije Universiteit Amsterdam","host_organization_lineage":["https://openalex.org/I865915315"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Chen, S, Pierre, G E O & Chi, C-H 2010, Secure Data Aggregation Through Proactive Defense. in Proceedings of the 2nd IEEE Workshop on Grid and P2P Systems and Applications. < http://www.globule.org/publi/SDATPD_gridpeer2010.html >","raw_type":"contributionToPeriodical"},{"id":"pmh:vu:oai:research.vu.nl:publications/942efbc7-9d75-4809-bde5-9005c4fafa4f","is_oa":false,"landing_page_url":"https://research.vu.nl/en/publications/942efbc7-9d75-4809-bde5-9005c4fafa4f","pdf_url":null,"source":{"id":"https://openalex.org/S4306401843","display_name":"Data Archiving and Networked Services (DANS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1322597698","host_organization_name":"Royal Netherlands Academy of Arts and Sciences","host_organization_lineage":["https://openalex.org/I1322597698"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Proceedings of the 2nd IEEE Workshop on Grid and P2P Systems and Applications","raw_type":"info:eu-repo/semantics/conferencepaper"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.6299999952316284,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1520914943","https://openalex.org/W1968736254","https://openalex.org/W1997369208","https://openalex.org/W1997577150","https://openalex.org/W1997783065","https://openalex.org/W2022929184","https://openalex.org/W2062924499","https://openalex.org/W2075578460","https://openalex.org/W2110100895","https://openalex.org/W2117163286","https://openalex.org/W2128931267","https://openalex.org/W2129122177","https://openalex.org/W2135139548","https://openalex.org/W2137933899","https://openalex.org/W2138830906","https://openalex.org/W2140986880","https://openalex.org/W2155599998","https://openalex.org/W2293878697","https://openalex.org/W6630973029","https://openalex.org/W6697004767"],"related_works":["https://openalex.org/W3024820515","https://openalex.org/W1507171077","https://openalex.org/W2131433923","https://openalex.org/W2010318438","https://openalex.org/W2020760577","https://openalex.org/W1678654634","https://openalex.org/W2149172033","https://openalex.org/W2120550887","https://openalex.org/W2108737453","https://openalex.org/W177242786"],"abstract_inverted_index":{"Gossip":[0],"based":[1,157],"aggregation":[2,73],"protocols":[3,31,53],"are":[4,54,95],"a":[5,48,62,78],"promising":[6],"approach":[7],"to":[8,15,57,109,150],"monitoring":[9],"large-scale":[10],"decentralized":[11],"IT":[12],"infrastructures.":[13],"Compared":[14],"traditional":[16],"approaches":[17],"they":[18],"exhibit":[19],"good":[20,167],"properties":[21],"of":[22,25,44,65,119,130,154,173],"scalability,":[23],"tolerance":[24],"churn,":[26],"and":[27,60,97],"communication":[28],"overhead.":[29],"Gossip-based":[30],"can":[32,70],"compute":[33],"statistical":[34,42],"aggregates":[35],"such":[36,52],"as":[37],"the":[38,68,116,128],"average,":[39],"sum":[40],"or":[41],"distribution":[43],"an":[45],"attribute":[46,83,160],"across":[47],"large":[49],"system.":[50,117],"However,":[51],"extremely":[55],"vulnerable":[56],"malicious":[58,108,121],"attacks,":[59],"even":[61],"small":[63],"number":[64],"attackers":[66],"in":[67,146],"system":[69,133,149,165],"largely":[71],"undermine":[72],"results.":[74],"This":[75,144],"paper":[76],"presents":[77],"secure":[79],"protocol":[80],"for":[81],"computing":[82],"averages.":[84],"In":[85],"this":[86],"system,":[87],"each":[88],"node":[89,106,140],"autonomously":[90],"judges":[91],"whether":[92],"its":[93,110],"neighbors":[94,111],"malicious,":[96],"may":[98],"subsequently":[99],"stop":[100],"any":[101,139],"interaction":[102],"with":[103],"them.":[104],"A":[105],"appearing":[107],"quickly":[112],"gets":[113],"excluded":[114],"from":[115],"Instead":[118],"defining":[120],"behavior":[122,136],"(and":[123,137],"excluding":[124],"nodes":[125],"that":[126,141,163],"follow":[127],"definition":[129],"maliciousness),":[131],"our":[132,148,164],"defines":[134],"correct":[135],"excludes":[138],"behaves":[142],"differently).":[143],"allows":[145],"principle":[147],"address":[151],"arbitrary":[152],"types":[153,172],"attacks.":[155,174],"Simulations":[156],"on":[158],"real-world":[159],"data":[161],"demonstrate":[162],"offers":[166],"resistance":[168],"against":[169],"four":[170],"different":[171]},"counts_by_year":[{"year":2018,"cited_by_count":1},{"year":2015,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
