{"id":"https://openalex.org/W4206605054","doi":"https://doi.org/10.1109/jiot.2021.3135049","title":"Privacy-Preserving and Fault-Tolerant Aggregation of Time-Series Data With a Semi-Trusted Authority","display_name":"Privacy-Preserving and Fault-Tolerant Aggregation of Time-Series Data With a Semi-Trusted Authority","publication_year":2021,"publication_date":"2021-12-14","ids":{"openalex":"https://openalex.org/W4206605054","doi":"https://doi.org/10.1109/jiot.2021.3135049"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2021.3135049","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2021.3135049","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088765156","display_name":"Chang Xu","orcid":"https://orcid.org/0000-0002-9726-7232"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chang Xu","raw_affiliation_strings":["School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018060243","display_name":"Run Yin","orcid":null},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Run Yin","raw_affiliation_strings":["School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100634361","display_name":"Liehuang Zhu","orcid":"https://orcid.org/0000-0003-3277-3887"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liehuang Zhu","raw_affiliation_strings":["School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100380072","display_name":"Chuan Zhang","orcid":"https://orcid.org/0000-0001-7684-8540"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chuan Zhang","raw_affiliation_strings":["School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100440825","display_name":"Can Zhang","orcid":"https://orcid.org/0000-0001-8127-9282"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Can Zhang","raw_affiliation_strings":["School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100742726","display_name":"Yupeng Chen","orcid":"https://orcid.org/0000-0002-6222-9981"},"institutions":[{"id":"https://openalex.org/I4210131649","display_name":"China Automotive Engineering Research Institute","ror":"https://ror.org/039jhgf83","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210131649"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yupeng Chen","raw_affiliation_strings":["Internet of Vehicle Cyber Security Department, China Automotive Engineering Research Institute Company Ltd., Chongqing, China"],"affiliations":[{"raw_affiliation_string":"Internet of Vehicle Cyber Security Department, China Automotive Engineering Research Institute Company Ltd., Chongqing, China","institution_ids":["https://openalex.org/I4210131649"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5090688531","display_name":"Kashif Sharif","orcid":"https://orcid.org/0000-0001-7214-6568"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kashif Sharif","raw_affiliation_strings":["School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5088765156"],"corresponding_institution_ids":["https://openalex.org/I125839683"],"apc_list":null,"apc_paid":null,"fwci":1.2237,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.83811689,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":97},"biblio":{"volume":"9","issue":"14","first_page":"12231","last_page":"12240"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7721288204193115},{"id":"https://openalex.org/keywords/data-aggregator","display_name":"Data aggregator","score":0.687811017036438},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6799159049987793},{"id":"https://openalex.org/keywords/series","display_name":"Series (stratigraphy)","score":0.5423475503921509},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5246151685714722},{"id":"https://openalex.org/keywords/aggregate","display_name":"Aggregate (composite)","score":0.4973311722278595},{"id":"https://openalex.org/keywords/news-aggregator","display_name":"News aggregator","score":0.49006950855255127},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4575970768928528},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.43786340951919556},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4086410701274872},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.39709311723709106},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3377831280231476},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.33149707317352295},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.286870539188385},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.23709309101104736},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.149558424949646},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.134272038936615},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.12866082787513733}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7721288204193115},{"id":"https://openalex.org/C82578977","wikidata":"https://www.wikidata.org/wiki/Q16773055","display_name":"Data aggregator","level":3,"score":0.687811017036438},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6799159049987793},{"id":"https://openalex.org/C143724316","wikidata":"https://www.wikidata.org/wiki/Q312468","display_name":"Series (stratigraphy)","level":2,"score":0.5423475503921509},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5246151685714722},{"id":"https://openalex.org/C4679612","wikidata":"https://www.wikidata.org/wiki/Q866298","display_name":"Aggregate (composite)","level":2,"score":0.4973311722278595},{"id":"https://openalex.org/C180505990","wikidata":"https://www.wikidata.org/wiki/Q498267","display_name":"News aggregator","level":2,"score":0.49006950855255127},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4575970768928528},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.43786340951919556},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4086410701274872},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.39709311723709106},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3377831280231476},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.33149707317352295},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.286870539188385},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.23709309101104736},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.149558424949646},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.134272038936615},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.12866082787513733},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C159985019","wikidata":"https://www.wikidata.org/wiki/Q181790","display_name":"Composite material","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2021.3135049","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2021.3135049","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6899999976158142,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G3291271152","display_name":null,"funder_award_id":"U1804263","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5264831859","display_name":null,"funder_award_id":"61972037","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W1646354800","https://openalex.org/W2022747340","https://openalex.org/W2104208424","https://openalex.org/W2119609004","https://openalex.org/W2552590514","https://openalex.org/W2571334678","https://openalex.org/W2591915039","https://openalex.org/W2789659149","https://openalex.org/W2790975052","https://openalex.org/W2794166119","https://openalex.org/W2796206364","https://openalex.org/W2800873021","https://openalex.org/W2806199268","https://openalex.org/W2898367412","https://openalex.org/W2910143551","https://openalex.org/W2912717507","https://openalex.org/W2993670002","https://openalex.org/W3002024456","https://openalex.org/W3012266038","https://openalex.org/W3016897770","https://openalex.org/W3045855712","https://openalex.org/W3086819744","https://openalex.org/W3114854378"],"related_works":["https://openalex.org/W3036238356","https://openalex.org/W2767445978","https://openalex.org/W3092831610","https://openalex.org/W1592978631","https://openalex.org/W4255106211","https://openalex.org/W2120644424","https://openalex.org/W2766329713","https://openalex.org/W2290626493","https://openalex.org/W3082121784","https://openalex.org/W2002245211"],"abstract_inverted_index":{"Time-series":[0],"data":[1,15,75,90,115,142,158],"aggregation":[2,42,76,91,159],"in":[3,63,73],"Internet":[4],"of":[5,21,114,169],"Things":[6],"applications":[7],"is":[8,16,59],"a":[9,19,54,87,94,156],"useful":[10],"operation,":[11],"where":[12],"the":[13,26,39,64,110,146,163],"time-series":[14,74,89],"sensed":[17],"by":[18,25],"group":[20],"users,":[22],"and":[23,34,41,105,112,166],"gathered":[24],"aggregator":[27],"for":[28],"real-time":[29],"analysis.":[30],"However,":[31],"some":[32],"security":[33],"privacy":[35,50],"challenges":[36],"still":[37],"affect":[38],"collection":[40],"process.":[43],"Although":[44],"existing":[45],"privacy-preserving":[46,88],"solutions":[47],"achieve":[48],"strong":[49],"guarantees,":[51],"they":[52,68],"introduce":[53],"fully":[55],"trusted":[56],"TA":[57],"that":[58,120],"difficult":[60],"to":[61,79,108,161],"realize":[62],"real":[65],"world.":[66],"Besides,":[67],"cannot":[69],"be":[70],"directly":[71],"applied":[72],"scenarios":[77],"due":[78],"unacceptable":[80],"efficiency.":[81],"In":[82],"this":[83],"article,":[84],"we":[85],"propose":[86],"scheme":[92,99,123],"with":[93,145],"semi-trusted":[95],"authority.":[96],"Moreover,":[97],"our":[98,121,170],"also":[100,150],"supports":[101],"arbitrary":[102],"aggregate":[103],"functions":[104],"fault":[106],"tolerance":[107],"enhance":[109],"reliability":[111],"scalability":[113],"aggregation.":[116],"Security":[117],"analysis":[118],"demonstrates":[119],"proposed":[122],"achieves":[124],"<inline-formula":[125,135],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[126,136],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">":[127,137],"<tex-math":[128,138],"notation=\"LaTeX\">$(n-k)$":[129],"</tex-math></inline-formula>":[130,141],"-source":[131],"anonymity":[132],"even":[133],"if":[134],"notation=\"LaTeX\">$k(k\\leq":[139],"(n-2))$":[140],"providers":[143],"collude":[144],"cloud":[147],"server.":[148],"We":[149],"conduct":[151],"thorough":[152],"experiments":[153],"based":[154],"on":[155],"simulated":[157],"scenario":[160],"show":[162],"high":[164],"computation":[165],"communication":[167],"efficiency":[168],"scheme.":[171]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
