{"id":"https://openalex.org/W7136900784","doi":"https://doi.org/10.1145/3787330.3787351","title":"Distributed Privacy-Preserving Measurement: Architecture, Protocols, and Applications","display_name":"Distributed Privacy-Preserving Measurement: Architecture, Protocols, and Applications","publication_year":2025,"publication_date":"2025-12-05","ids":{"openalex":"https://openalex.org/W7136900784","doi":"https://doi.org/10.1145/3787330.3787351"},"language":null,"primary_location":{"id":"doi:10.1145/3787330.3787351","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3787330.3787351","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 13th International Conference on Information Technology: IoT and Smart City","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3787330.3787351","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5129495852","display_name":"Yu Fu","orcid":null},"institutions":[{"id":"https://openalex.org/I6507939","display_name":"China United Network Communications Group (China)","ror":"https://ror.org/028w99c90","country_code":"CN","type":"company","lineage":["https://openalex.org/I6507939"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yu Fu","raw_affiliation_strings":["China Telecom Cloud Network Operating System R&amp;D Center, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0001-8930-1085","affiliations":[{"raw_affiliation_string":"China Telecom Cloud Network Operating System R&amp;D Center, Beijing, China","institution_ids":["https://openalex.org/I6507939"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014327769","display_name":"Yingbin Zhang","orcid":"https://orcid.org/0000-0002-0444-5360"},"institutions":[{"id":"https://openalex.org/I6507939","display_name":"China United Network Communications Group (China)","ror":"https://ror.org/028w99c90","country_code":"CN","type":"company","lineage":["https://openalex.org/I6507939"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yingbin Zhang","raw_affiliation_strings":["China Telecom Cloud Network Operating System R&amp;D Center, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0002-0444-5360","affiliations":[{"raw_affiliation_string":"China Telecom Cloud Network Operating System R&amp;D Center, Beijing, China","institution_ids":["https://openalex.org/I6507939"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102220155","display_name":"Qiong Sun","orcid":null},"institutions":[{"id":"https://openalex.org/I6507939","display_name":"China United Network Communications Group (China)","ror":"https://ror.org/028w99c90","country_code":"CN","type":"company","lineage":["https://openalex.org/I6507939"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qiong Sun","raw_affiliation_strings":["China Telecom Cloud Network Operating System R&amp;D Center, Beijing, China"],"raw_orcid":"https://orcid.org/0009-0007-0561-0675","affiliations":[{"raw_affiliation_string":"China Telecom Cloud Network Operating System R&amp;D Center, Beijing, China","institution_ids":["https://openalex.org/I6507939"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129461306","display_name":"Guozhen Bian","orcid":null},"institutions":[{"id":"https://openalex.org/I6507939","display_name":"China United Network Communications Group (China)","ror":"https://ror.org/028w99c90","country_code":"CN","type":"company","lineage":["https://openalex.org/I6507939"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guozhen Bian","raw_affiliation_strings":["China Telecom Cloud Network Operating System R&amp;D Center, Beijing, China"],"raw_orcid":"https://orcid.org/0009-0003-3920-1416","affiliations":[{"raw_affiliation_string":"China Telecom Cloud Network Operating System R&amp;D Center, Beijing, China","institution_ids":["https://openalex.org/I6507939"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Xin Li","orcid":"https://orcid.org/0009-0006-9673-0463"},"institutions":[{"id":"https://openalex.org/I6507939","display_name":"China United Network Communications Group (China)","ror":"https://ror.org/028w99c90","country_code":"CN","type":"company","lineage":["https://openalex.org/I6507939"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xin Li","raw_affiliation_strings":["China Telecom Cloud Network Operating System R&amp;D Center, Beijing, China"],"raw_orcid":"https://orcid.org/0009-0006-9673-0463","affiliations":[{"raw_affiliation_string":"China Telecom Cloud Network Operating System R&amp;D Center, Beijing, China","institution_ids":["https://openalex.org/I6507939"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5129635544","display_name":"Fazhi Qin","orcid":null},"institutions":[{"id":"https://openalex.org/I6507939","display_name":"China United Network Communications Group (China)","ror":"https://ror.org/028w99c90","country_code":"CN","type":"company","lineage":["https://openalex.org/I6507939"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fazhi Qin","raw_affiliation_strings":["China Telecom Cloud Network Operating System R&amp;D Center, Beijing, China"],"raw_orcid":"https://orcid.org/0009-0004-2354-506X","affiliations":[{"raw_affiliation_string":"China Telecom Cloud Network Operating System R&amp;D Center, Beijing, China","institution_ids":["https://openalex.org/I6507939"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5129495852"],"corresponding_institution_ids":["https://openalex.org/I6507939"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.85555266,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"123","last_page":"128"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.8586000204086304,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.8586000204086304,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.023399999365210533,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.01769999973475933,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/standardization","display_name":"Standardization","score":0.5982000231742859},{"id":"https://openalex.org/keywords/data-aggregator","display_name":"Data aggregator","score":0.5746999979019165},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.5461999773979187},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5343000292778015},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5184999704360962},{"id":"https://openalex.org/keywords/raw-data","display_name":"Raw data","score":0.424699991941452},{"id":"https://openalex.org/keywords/data-collection","display_name":"Data collection","score":0.40709999203681946},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.40310001373291016},{"id":"https://openalex.org/keywords/distributed-database","display_name":"Distributed database","score":0.40130001306533813}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7257000207901001},{"id":"https://openalex.org/C188087704","wikidata":"https://www.wikidata.org/wiki/Q369577","display_name":"Standardization","level":2,"score":0.5982000231742859},{"id":"https://openalex.org/C82578977","wikidata":"https://www.wikidata.org/wiki/Q16773055","display_name":"Data aggregator","level":3,"score":0.5746999979019165},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.5461999773979187},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5343000292778015},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5184999704360962},{"id":"https://openalex.org/C132964779","wikidata":"https://www.wikidata.org/wiki/Q2110223","display_name":"Raw data","level":2,"score":0.424699991941452},{"id":"https://openalex.org/C133462117","wikidata":"https://www.wikidata.org/wiki/Q4929239","display_name":"Data collection","level":2,"score":0.40709999203681946},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.40310001373291016},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4016999900341034},{"id":"https://openalex.org/C70061542","wikidata":"https://www.wikidata.org/wiki/Q989016","display_name":"Distributed database","level":2,"score":0.40130001306533813},{"id":"https://openalex.org/C24885549","wikidata":"https://www.wikidata.org/wiki/Q339678","display_name":"Distributed data store","level":2,"score":0.39489999413490295},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.3797999918460846},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.36309999227523804},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.3555000126361847},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.34779998660087585},{"id":"https://openalex.org/C12269588","wikidata":"https://www.wikidata.org/wiki/Q132364","display_name":"Communications protocol","level":2,"score":0.3260999917984009},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3188999891281128},{"id":"https://openalex.org/C168297262","wikidata":"https://www.wikidata.org/wiki/Q6031182","display_name":"Information protection policy","level":2,"score":0.31459999084472656},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.28870001435279846},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.28189998865127563},{"id":"https://openalex.org/C35578498","wikidata":"https://www.wikidata.org/wiki/Q193424","display_name":"Web service","level":2,"score":0.2750000059604645},{"id":"https://openalex.org/C72634772","wikidata":"https://www.wikidata.org/wiki/Q386824","display_name":"Data integration","level":2,"score":0.2671999931335449},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.26660001277923584},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.26589998602867126},{"id":"https://openalex.org/C21853045","wikidata":"https://www.wikidata.org/wiki/Q2634565","display_name":"Protocol data unit","level":3,"score":0.2653999924659729},{"id":"https://openalex.org/C3739613","wikidata":"https://www.wikidata.org/wiki/Q679003","display_name":"Distributed Computing Environment","level":2,"score":0.2583000063896179},{"id":"https://openalex.org/C15845906","wikidata":"https://www.wikidata.org/wiki/Q1172338","display_name":"Data exchange","level":2,"score":0.2549000084400177}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3787330.3787351","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3787330.3787351","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 13th International Conference on Information Technology: IoT and Smart City","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3787330.3787351","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3787330.3787351","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 13th International Conference on Information Technology: IoT and Smart City","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.4087100923061371,"display_name":"Good health and well-being","id":"https://metadata.un.org/sdg/3"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W1873763122","https://openalex.org/W2164327070","https://openalex.org/W2781091734"],"related_works":[],"abstract_inverted_index":{"The":[0,131],"collection":[1,24],"and":[2,18,37,47,65,87,102,107,111,120,122,140,145,163],"analysis":[3],"of":[4,105,113,147],"large-scale":[5],"user":[6,28],"data":[7,23,128,136],"are":[8],"critical":[9],"for":[10],"applications":[11],"such":[12,43,117],"as":[13,44,118],"public":[14],"surveys,":[15],"healthcare":[16],"monitoring,":[17],"network":[19],"telemetry.":[20],"However,":[21],"conventional":[22],"methods":[25],"expose":[26],"raw":[27],"information":[29],"to":[30,56,61],"servers,":[31],"resulting":[32],"in":[33,126],"significant":[34],"privacy":[35],"concerns":[36],"undermining":[38],"trust.":[39],"Traditional":[40],"protection":[41],"mechanisms,":[42],"encryption,":[45],"anonymization,":[46],"differential":[48],"privacy,":[49],"provide":[50],"partial":[51],"mitigation":[52],"but":[53],"remain":[54],"insufficient":[55],"prevent":[57],"server-side":[58],"leakage":[59],"or":[60],"maintain":[62],"both":[63],"accuracy":[64],"scalability.":[66],"To":[67],"address":[68],"these":[69],"challenges,":[70],"this":[71,94,152],"paper":[72,95,153],"introduces":[73],"a":[74],"distributed":[75],"privacy-preserving":[76],"measurement":[77],"(PPM)":[78],"framework":[79],"based":[80],"on":[81,168],"the":[82,97,109,143,148,158],"Distributed":[83,89],"Aggregation":[84,90],"Protocol":[85],"(DAP)":[86],"Verifiable":[88],"Functions":[91],"(VDAF).":[92],"Furthermore,":[93],"presents":[96],"protocol":[98],"architecture,":[99],"detailed":[100],"workflow,":[101],"cryptographic":[103],"foundations":[104],"DAP,":[106],"analyzes":[108],"performance":[110],"robustness":[112],"representative":[114],"VDAF":[115],"algorithms":[116],"Prio3":[119],"Poplar1,":[121],"discuss":[123],"their":[124],"applicability":[125],"different":[127],"aggregation":[129],"scenarios.":[130],"commercial":[132],"use":[133],"cases\u2014including":[134],"epidemic":[135],"collection,":[137],"opinion":[138],"polling,":[139],"web":[141],"telemetry\u2014demonstrate":[142],"feasibility":[144],"utility":[146],"proposed":[149],"framework.":[150],"Finally,":[151],"highlights":[154],"standardization":[155],"efforts":[156],"within":[157],"IETF":[159],"PPM":[160],"Working":[161],"Group":[162],"3GPP":[164],"SA3,":[165],"providing":[166],"perspectives":[167],"integration":[169],"with":[170],"next-generation":[171],"communication":[172],"systems.":[173]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2026-03-17T00:00:00"}
