Privacy-Preserving Cooperative Statistical Analysis
ACSAC '01 Proceedings of the 17th Annual Computer Security Applications Conference
On k-anonymity and the curse of dimensionality
VLDB '05 Proceedings of the 31st international conference on Very large data bases
Digital Privacy
Protocols for secure computations
SFCS '82 Proceedings of the 23rd Annual Symposium on Foundations of Computer Science
Secure Ubiquitous Health Monitoring System
NBiS '08 Proceedings of the 2nd international conference on Network-Based Information Systems
Capturing Personal Health Data from Wearable Sensors
SAINT '08 Proceedings of the 2008 International Symposium on Applications and the Internet
Privacy-preserving data mining in the malicious model
International Journal of Information and Computer Security
Privacy and anonymization for very large datasets
Proceedings of the 18th ACM conference on Information and knowledge management
Design and implementation of a ubiquitous health monitoring system
International Journal of Web and Grid Services
Public-key cryptosystems based on composite degree residuosity classes
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Differential privacy: a survey of results
TAMC'08 Proceedings of the 5th international conference on Theory and applications of models of computation
A privacy-preserving protocol for finding the nearest doctor in an emergency
Proceedings of the 3rd International Conference on PErvasive Technologies Related to Assistive Environments
P4P: practical large-scale privacy-preserving distributed computation robust against malicious users
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
System architecture of a wireless body area sensor network for ubiquitous health monitoring
Journal of Mobile Multimedia
Privacy-enhanced management of ubiquitous health monitoring data
Proceedings of the 4th International Conference on PErvasive Technologies Related to Assistive Environments
Calibrating noise to sensitivity in private data analysis
TCC'06 Proceedings of the Third conference on Theory of Cryptography
Hi-index | 0.00 |
In this work, we consider ubiquitous health data generated from wearable sensors in a Ubiquitous Health Monitoring System (UHMS) and examine how these data can be used within privacypreserving distributed statistical analysis. To this end, we propose a secure multi-party computation based on a privacy-preserving cryptographic protocol that accepts as input current or archived values of users' wearable sensors. We describe a prototype implementation of the proposed solution with a community of independent personal agents and present preliminary results that confirm the viability of the approach.