{"id":"https://openalex.org/W2606552554","doi":"https://doi.org/10.1109/tdsc.2017.2693986","title":"Privacy-Preserving Aggregate Queries for Optimal Location Selection","display_name":"Privacy-Preserving Aggregate Queries for Optimal Location Selection","publication_year":2017,"publication_date":"2017-04-12","ids":{"openalex":"https://openalex.org/W2606552554","doi":"https://doi.org/10.1109/tdsc.2017.2693986","mag":"2606552554"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2017.2693986","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2017.2693986","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1801.02069","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101428116","display_name":"Emre Y\u0131lmaz","orcid":"https://orcid.org/0000-0003-0834-8805"},"institutions":[{"id":"https://openalex.org/I168864056","display_name":"Bilkent University","ror":"https://ror.org/02vh8a032","country_code":"TR","type":"education","lineage":["https://openalex.org/I168864056"]}],"countries":["TR"],"is_corresponding":true,"raw_author_name":"Emre Yilmaz","raw_affiliation_strings":["Computer Engineering Department, Bilkent University, Ankara, Turkey"],"raw_orcid":"https://orcid.org/0000-0003-0834-8805","affiliations":[{"raw_affiliation_string":"Computer Engineering Department, Bilkent University, Ankara, Turkey","institution_ids":["https://openalex.org/I168864056"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078571347","display_name":"Hakan Ferhatosmano\u011flu","orcid":"https://orcid.org/0000-0002-5181-4712"},"institutions":[{"id":"https://openalex.org/I39555362","display_name":"University of Warwick","ror":"https://ror.org/01a77tt86","country_code":"GB","type":"education","lineage":["https://openalex.org/I39555362"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Hakan Ferhatosmanoglu","raw_affiliation_strings":["Department of Computer Science, University of Warwick, Coventry, UK"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Warwick, Coventry, UK","institution_ids":["https://openalex.org/I39555362"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028326739","display_name":"Erman Ayday","orcid":"https://orcid.org/0000-0003-3383-1081"},"institutions":[{"id":"https://openalex.org/I168864056","display_name":"Bilkent University","ror":"https://ror.org/02vh8a032","country_code":"TR","type":"education","lineage":["https://openalex.org/I168864056"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Erman Ayday","raw_affiliation_strings":["Computer Engineering Department, Bilkent University, Ankara, Turkey"],"raw_orcid":"https://orcid.org/0000-0003-3383-1081","affiliations":[{"raw_affiliation_string":"Computer Engineering Department, Bilkent University, Ankara, Turkey","institution_ids":["https://openalex.org/I168864056"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5038384213","display_name":"Remzi Can Aksoy","orcid":null},"institutions":[{"id":"https://openalex.org/I168864056","display_name":"Bilkent University","ror":"https://ror.org/02vh8a032","country_code":"TR","type":"education","lineage":["https://openalex.org/I168864056"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Remzi Can Aksoy","raw_affiliation_strings":["Bilkent University, Ankara, Turkey"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Bilkent University, Ankara, Turkey","institution_ids":["https://openalex.org/I168864056"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101428116"],"corresponding_institution_ids":["https://openalex.org/I168864056"],"apc_list":null,"apc_paid":null,"fwci":2.4943,"has_fulltext":false,"cited_by_count":32,"citation_normalized_percentile":{"value":0.91546219,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"16","issue":"2","first_page":"329","last_page":"343"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11704","display_name":"Mobile Crowdsensing and Crowdsourcing","score":0.9760000109672546,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7856767177581787},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.6991713643074036},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.6911051273345947},{"id":"https://openalex.org/keywords/aggregate","display_name":"Aggregate (composite)","score":0.5857557058334351},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.4737090468406677},{"id":"https://openalex.org/keywords/analytics","display_name":"Analytics","score":0.4668387174606323},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.4645141661167145},{"id":"https://openalex.org/keywords/service-provider","display_name":"Service provider","score":0.45669254660606384},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4484248459339142},{"id":"https://openalex.org/keywords/selection","display_name":"Selection (genetic algorithm)","score":0.4145905077457428},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.39303234219551086},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.35235825181007385},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.20306938886642456},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.14254489541053772}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7856767177581787},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.6991713643074036},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.6911051273345947},{"id":"https://openalex.org/C4679612","wikidata":"https://www.wikidata.org/wiki/Q866298","display_name":"Aggregate (composite)","level":2,"score":0.5857557058334351},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.4737090468406677},{"id":"https://openalex.org/C79158427","wikidata":"https://www.wikidata.org/wiki/Q485396","display_name":"Analytics","level":2,"score":0.4668387174606323},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.4645141661167145},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.45669254660606384},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4484248459339142},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.4145905077457428},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.39303234219551086},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.35235825181007385},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.20306938886642456},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.14254489541053772},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C159985019","wikidata":"https://www.wikidata.org/wiki/Q181790","display_name":"Composite material","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/tdsc.2017.2693986","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2017.2693986","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},{"id":"pmh:oai:wrap.warwick.ac.uk:92829","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306400665","display_name":"Warwick Research Archive Portal (University of Warwick)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I39555362","host_organization_name":"University of Warwick","host_organization_lineage":["https://openalex.org/I39555362"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"","raw_type":"Journal Article"},{"id":"pmh:oai:arXiv.org:1801.02069","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1801.02069","pdf_url":"https://arxiv.org/pdf/1801.02069","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"pmh:oai:repository.bilkent.edu.tr:11693/49286","is_oa":false,"landing_page_url":"http://hdl.handle.net/11693/49286","pdf_url":null,"source":{"id":"https://openalex.org/S4306400079","display_name":"Bilkent University Institutional Repository (Bilkent University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I168864056","host_organization_name":"Bilkent University","host_organization_lineage":["https://openalex.org/I168864056"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"Article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1801.02069","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1801.02069","pdf_url":"https://arxiv.org/pdf/1801.02069","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W104209573","https://openalex.org/W153677436","https://openalex.org/W290874543","https://openalex.org/W346929228","https://openalex.org/W1529862094","https://openalex.org/W1584714745","https://openalex.org/W1741074190","https://openalex.org/W1873763122","https://openalex.org/W1966517804","https://openalex.org/W1993141132","https://openalex.org/W2013623332","https://openalex.org/W2016267457","https://openalex.org/W2027595342","https://openalex.org/W2034980830","https://openalex.org/W2053894382","https://openalex.org/W2071702404","https://openalex.org/W2076287166","https://openalex.org/W2089959302","https://openalex.org/W2103205229","https://openalex.org/W2109426455","https://openalex.org/W2115240023","https://openalex.org/W2120652260","https://openalex.org/W2120767835","https://openalex.org/W2129658824","https://openalex.org/W2132172731","https://openalex.org/W2151789982","https://openalex.org/W2157855380","https://openalex.org/W2160152607","https://openalex.org/W4205228770","https://openalex.org/W6611554128","https://openalex.org/W6673414462","https://openalex.org/W6675300422","https://openalex.org/W6678307160"],"related_works":["https://openalex.org/W2019704260","https://openalex.org/W2900631219","https://openalex.org/W4304208041","https://openalex.org/W4212899026","https://openalex.org/W4390570329","https://openalex.org/W2795052735","https://openalex.org/W2758544064","https://openalex.org/W4286750579","https://openalex.org/W3081971900","https://openalex.org/W2603823019"],"abstract_inverted_index":{"Today,":[0],"vast":[1],"amounts":[2],"of":[3,20,26,102,119,127,156,181,193],"location":[4,13,38,45,51],"data":[5,14,52,57,83,88,183],"are":[6,24,170],"collected":[7],"by":[8,82],"various":[9],"service":[10],"providers.":[11],"These":[12],"owners":[15,53,84],"have":[16],"a":[17,47,111,190],"good":[18],"idea":[19],"where":[21],"their":[22,56,87,197],"users":[23],"most":[25],"the":[27,43,99,103,107,116,120,125,128,143,154,157,167],"time.":[28],"Other":[29],"businesses":[30,91,104],"also":[31,135],"want":[32],"to":[33,63,138],"use":[34],"this":[35,69],"information":[36,96],"for":[37,46],"analytics,":[39],"such":[40,97],"as":[41,98,115],"finding":[42],"optimal":[44],"new":[48],"branch.":[49],"However,":[50],"cannot":[54],"share":[55],"with":[58,89,159],"other":[59,90],"businesses,":[60],"mainly":[61],"due":[62],"privacy":[64,141],"and":[65,92,146,161,164,186],"legal":[66],"concerns.":[67],"In":[68],"paper,":[70],"we":[71],"propose":[72],"privacy-preserving":[73],"solutions":[74,169,175],"in":[75,130,142,189],"which":[76],"location-based":[77],"queries":[78],"can":[79],"be":[80],"answered":[81],"without":[85,93,195],"sharing":[86,180],"accessing":[94],"sensitive":[95,182],"customer":[100],"list":[101],"that":[105,166],"send":[106],"query.":[108],"We":[109,123,134,152],"utilize":[110],"partially":[112],"homomorphic":[113],"cryptosystem":[114],"building":[117],"block":[118],"proposed":[121,144,168,174],"protocols.":[122],"prove":[124],"security":[126],"protocols":[129,145,158],"semi-honest":[131],"threat":[132],"model.":[133],"explain":[136],"how":[137],"achieve":[139],"differential":[140],"discuss":[147],"its":[148],"impact":[149],"on":[150],"utility.":[151],"evaluate":[153],"performance":[155],"real":[160],"synthetic":[162],"datasets":[163],"show":[165],"highly":[171],"practical.":[172],"The":[173],"will":[176],"facilitate":[177],"an":[178],"effective":[179],"between":[184],"entities":[185],"joint":[187],"analytics":[188],"wide":[191],"range":[192],"applications":[194],"violating":[196],"customers'":[198],"privacy.":[199]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
