{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,6]],"date-time":"2024-07-06T15:31:51Z","timestamp":1720279911387},"reference-count":48,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"funder":[{"DOI":"10.13039\/100010661","name":"European Commission H2020","doi-asserted-by":"publisher","award":["740688"],"id":[{"id":"10.13039\/100010661","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council Research","doi-asserted-by":"publisher","award":["EP \/N028155\/1"],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[2018,1]]},"DOI":"10.1016\/j.comcom.2017.11.009","type":"journal-article","created":{"date-parts":[[2017,12,6]],"date-time":"2017-12-06T06:20:18Z","timestamp":1512541218000},"page":"200-211","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":12,"special_numbering":"C","title":["Increasing user controllability on device specific privacy in the Internet of Things"],"prefix":"10.1016","volume":"116","author":[{"given":"Waqar","family":"Asif","sequence":"first","affiliation":[]},{"given":"Muttukrishnan","family":"Rajarajan","sequence":"additional","affiliation":[]},{"given":"Marios","family":"Lestas","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.comcom.2017.11.009_bib0001","series-title":"IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC)","first-page":"1","article-title":"Internet of things (iot): a verification framework","author":"Majeed","year":"2017"},{"key":"10.1016\/j.comcom.2017.11.009_bib0002","doi-asserted-by":"crossref","DOI":"10.1109\/JIOT.2017.2689164","article-title":"Boosting the battery life of wearables for health monitoring through the compression of biosignals","author":"Hooshmand","year":"2017","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.comcom.2017.11.009_bib0003","series-title":"International Conference on Machine Learning and Cybernetics (ICMLC)","first-page":"433","article-title":"Using intelligent agent to build toddler monitoring system","volume":"1","author":"Zheng","year":"2015"},{"key":"10.1016\/j.comcom.2017.11.009_bib0004","series-title":"International Conference on Industrial Technology (ICIT)","first-page":"1920","article-title":"A smart wearable system for sudden infant death syndrome monitoring","author":"Ferreira","year":"2016"},{"key":"10.1016\/j.comcom.2017.11.009_bib0005","article-title":"Smart metering","volume":"9","author":"Van Gerwen","year":"2006","journal-title":"Leonardo-energy. org"},{"key":"10.1016\/j.comcom.2017.11.009_bib0006","unstructured":"R. Dong, A.A. C\u00e1rdenas, L.J. Ratliff, H. Ohlsson, S.S. Sastry, Quantifying the utility-privacy tradeoff in the smart grid, arXiv preprint arXiv:1406.2568 (2014)."},{"key":"10.1016\/j.comcom.2017.11.009_bib0007","unstructured":"P. Institute, New ponemon study points to need for smart grid education, 2010, URL http:\/\/www.ponemon.org\/news-2\/39."},{"key":"10.1016\/j.comcom.2017.11.009_bib0008","doi-asserted-by":"crossref","first-page":"2743","DOI":"10.1109\/ACCESS.2015.2504503","article-title":"Smart meters big data: game theoretic model for fair data sharing in deregulated smart grids","volume":"3","author":"Yassine","year":"2015","journal-title":"IEEE Access"},{"key":"10.1016\/j.comcom.2017.11.009_bib0009","unstructured":"K. Weaver, A perspective on how smart meters invade individual privacy, 2014."},{"key":"10.1016\/j.comcom.2017.11.009_bib0010","doi-asserted-by":"crossref","first-page":"1351","DOI":"10.1016\/j.protcy.2014.10.152","article-title":"Internet of things and smart objects for m-health monitoring and control","volume":"16","author":"Santos","year":"2014","journal-title":"Procedia Technol."},{"issue":"2","key":"10.1016\/j.comcom.2017.11.009_bib0011","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1109\/TCC.2014.2359460","article-title":"A secure cloud computing based framework for big data information management of smart grid","volume":"3","author":"Baek","year":"2015","journal-title":"IEEE Trans. Cloud Comput."},{"key":"10.1016\/j.comcom.2017.11.009_bib0012","series-title":"Proceedings of the 2nd ACM workshop on embedded sensing systems for energy-efficiency in building","first-page":"61","article-title":"Private memoirs of a smart meter","author":"Molina-Markham","year":"2010"},{"issue":"4","key":"10.1016\/j.comcom.2017.11.009_bib0013","doi-asserted-by":"crossref","first-page":"750","DOI":"10.1109\/TSG.2011.2160975","article-title":"Elecprivacy: evaluating the privacy protection of electricity management algorithms","volume":"2","author":"Kalogridis","year":"2011","journal-title":"IEEE Trans. Smart Grid"},{"key":"10.1016\/j.comcom.2017.11.009_bib0014","series-title":"Proceedings of the 5th ACM Workshop on Embedded Systems For Energy-Efficient Buildings","first-page":"1","article-title":"Occupancy detection from electricity consumption data","author":"Kleiminger","year":"2013"},{"key":"10.1016\/j.comcom.2017.11.009_bib0015","series-title":"International Conference on Pervasive Computing and Communications (PerCom)","first-page":"190","article-title":"Leveraging smart meter data to recognize home appliances","author":"Weiss","year":"2012"},{"key":"10.1016\/j.comcom.2017.11.009_bib0016","series-title":"IEEE international conference on systems, man and cybernetics","first-page":"3462","article-title":"Genetic algorithm for pattern detection in nialm systems","volume":"4","author":"Baranski","year":"2004"},{"key":"10.1016\/j.comcom.2017.11.009_bib0017","series-title":"Annual Network & Distributed System Security Symposium (NDSS)","article-title":"Privacy-preserving aggregation of time-series data","author":"Shi","year":"2011"},{"key":"10.1016\/j.comcom.2017.11.009_bib0018","series-title":"Proceedings of the 2010 ACM SIGMOD International Conference on Management of data","first-page":"735","article-title":"Differentially private aggregation of distributed time-series with transformation and encryption","author":"Rastogi","year":"2010"},{"key":"10.1016\/j.comcom.2017.11.009_bib0019","series-title":"Crypto","first-page":"129","article-title":"Non-interactive and information-theoretic secure verifiable secret sharing.","volume":"91","author":"Pedersen","year":"1991"},{"issue":"7","key":"10.1016\/j.comcom.2017.11.009_bib0020","doi-asserted-by":"crossref","first-page":"1282","DOI":"10.1002\/dac.2760","article-title":"A novel verifiable secret sharing mechanism using theory of numbers and a method for sharing secrets","volume":"28","author":"Liu","year":"2015","journal-title":"Int. J. Commun. Syst."},{"issue":"1","key":"10.1016\/j.comcom.2017.11.009_bib0021","doi-asserted-by":"crossref","first-page":"5","DOI":"10.29012\/jpc.v1i1.566","article-title":"Secure multiparty computation for privacy-preserving data mining","volume":"1","author":"Lindell","year":"2009","journal-title":"J. Privacy Confidentiality"},{"key":"10.1016\/j.comcom.2017.11.009_bib0022","series-title":"Technical Report","article-title":"Secure multi-party computation for analytics deployed as a lightweight web application","author":"Lapets","year":"2016"},{"key":"10.1016\/j.comcom.2017.11.009_bib0023","series-title":"First IEEE International Conference on Smart Grid Communications (SmartGridComm)","first-page":"238","article-title":"Smart grid privacy via anonymization of smart metering data","author":"Efthymiou","year":"2010"},{"issue":"2","key":"10.1016\/j.comcom.2017.11.009_bib0024","doi-asserted-by":"crossref","first-page":"837","DOI":"10.1109\/TSG.2012.2211046","article-title":"Smart meter privacy: a theoretical framework","volume":"4","author":"Sankar","year":"2013","journal-title":"IEEE Trans. Smart Grid"},{"key":"10.1016\/j.comcom.2017.11.009_bib0025","series-title":"Proceedings of the 33rd international conference on Very large data bases","first-page":"459","article-title":"Time series compressibility and privacy","author":"Papadimitriou","year":"2007"},{"issue":"3","key":"10.1016\/j.comcom.2017.11.009_bib0026","doi-asserted-by":"crossref","first-page":"1317","DOI":"10.1109\/TSG.2012.2192487","article-title":"A randomized response model for privacy preserving smart metering","volume":"3","author":"Wang","year":"2012","journal-title":"IEEE Trans. Smart Grid"},{"key":"10.1016\/j.comcom.2017.11.009_bib0027","series-title":"Sok: privacy technologies for smart grids - a survey of options","author":"Jawurek","year":"2012"},{"issue":"1","key":"10.1016\/j.comcom.2017.11.009_bib0028","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1109\/MCOM.2013.6400441","article-title":"Smart grid forensic science: applications, challenges, and open issues","volume":"51","author":"Erol-Kantarci","year":"2013","journal-title":"IEEE Commun. Mag."},{"issue":"3","key":"10.1016\/j.comcom.2017.11.009_bib0029","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1145\/2892555","article-title":"Truthful mechanisms for agents that value privacy","volume":"4","author":"Chen","year":"2016","journal-title":"ACM Trans. Econ. Comput."},{"key":"10.1016\/j.comcom.2017.11.009_bib0030","series-title":"Proceedings of the 19th ACM symposium on Access control models and technologies","first-page":"93","article-title":"Game theoretic analysis of multiparty access control in online social networks","author":"Hu","year":"2014"},{"key":"10.1016\/j.comcom.2017.11.009_bib0031","series-title":"28th Computer Security Foundations Symposium (CSF)","first-page":"90","article-title":"A game-theoretic study on non-monetary incentives in data analytics projects with privacy implications","author":"Chessa","year":"2015"},{"key":"10.1016\/j.comcom.2017.11.009_bib0032","series-title":"Workshops at the Twenty-Ninth AAAI Conference on Artificial Intelligence","article-title":"Privacy-utility trade-off for time-series with application to smart-meter data","author":"Erdogdu","year":"2015"},{"key":"10.1016\/j.comcom.2017.11.009_bib0033","series-title":"51st Annual IEEE Symposium on Foundations of Computer Science (FOCS)","first-page":"81","article-title":"The limits of two-party differential privacy","author":"McGregor","year":"2010"},{"key":"10.1016\/j.comcom.2017.11.009_bib0034","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1007\/978-3-642-28914-9_18","article-title":"Lower bounds in differential privacy","author":"De","year":"2012","journal-title":"Theory Cryptogr."},{"key":"10.1016\/j.comcom.2017.11.009_bib0035","series-title":"24th Computer Security Foundations Symposium (CSF)","first-page":"191","article-title":"Information-theoretic bounds for differentially private mechanisms","author":"Barthe","year":"2011"},{"issue":"3-4","key":"10.1016\/j.comcom.2017.11.009_bib0036","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1561\/0400000042","article-title":"The algorithmic foundations of differential privacy","volume":"9","author":"Dwork","year":"2014","journal-title":"Found. Trends Theor. Comput. Sci."},{"key":"10.1016\/j.comcom.2017.11.009_bib0037","series-title":"Eurocrypt","first-page":"486","article-title":"Our data, ourselves: privacy via distributed noise generation.","volume":"4004","author":"Dwork","year":"2006"},{"key":"10.1016\/j.comcom.2017.11.009_bib0038","series-title":"International Colloquium on Automata, Languages, and Programming","first-page":"60","article-title":"On the relation between differential privacy and quantitative information flow","author":"Alvim","year":"2011"},{"key":"10.1016\/j.comcom.2017.11.009_bib0039","series-title":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","first-page":"43","article-title":"Differential privacy as a mutual information constraint","author":"Cuff","year":"2016"},{"issue":"5","key":"10.1016\/j.comcom.2017.11.009_bib0040","doi-asserted-by":"crossref","first-page":"2229","DOI":"10.1109\/TIA.2013.2258875","article-title":"Particle-swarm-optimization-based nonintrusive demand monitoring and load identification in smart meters","volume":"49","author":"Chang","year":"2013","journal-title":"IEEE Trans. Ind Appl"},{"key":"10.1016\/j.comcom.2017.11.009_bib0041","series-title":"International Conference on Smart Grid Communications (SmartGridComm)","first-page":"291","article-title":"Power line carrier (plc) signal analysis of smart meters for outlier detection","author":"Rao","year":"2011"},{"key":"10.1016\/j.comcom.2017.11.009_bib0042","series-title":"Transmission and Distribution Conference and Exposition (T&D)","first-page":"1","article-title":"Outliers\u2019 detection and filling algorithms for smart metering centers","author":"do Nascimento","year":"2012"},{"key":"10.1016\/j.comcom.2017.11.009_bib0043","series-title":"IEEE International Conference on Communications (ICC)","first-page":"536","article-title":"Privacy for iot: involuntary privacy enablement for smart energy systems","author":"Ukil","year":"2015"},{"issue":"5","key":"10.1016\/j.comcom.2017.11.009_bib0044","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1016\/0038-092X(93)90060-2","article-title":"Lead acid battery storage model for hybrid energy systems","volume":"50","author":"Manwell","year":"1993","journal-title":"Sol. Energy"},{"key":"10.1016\/j.comcom.2017.11.009_bib0045","series-title":"European Conference on Principles of Data Mining and Knowledge Discovery","first-page":"12","article-title":"The haar wavelet transform in the time series similarity paradigm","author":"Struzik","year":"1999"},{"key":"10.1016\/j.comcom.2017.11.009_bib0046","series-title":"7th Annual IEEE Communications Society Conference on Sensor Mesh and Ad Hoc Communications and Networks (SECON)","first-page":"1","article-title":"Real-time recognition and profiling of appliances through a single electricity sensor","author":"Ruzzelli","year":"2010"},{"issue":"8","key":"10.1016\/j.comcom.2017.11.009_bib0047","doi-asserted-by":"crossref","first-page":"1226","DOI":"10.1109\/TPAMI.2005.159","article-title":"Feature selection based on mutual information criteria of max-dependency, max-relevance, and min-redundancy","volume":"27","author":"Peng","year":"2005","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"10.1016\/j.comcom.2017.11.009_bib0048","series-title":"Proceedings of the 1st ACM Conference on Embedded Systems for Energy-Efficient Buildings","first-page":"80","article-title":"The eco data set and the performance of non-intrusive load monitoring algorithms","author":"Beckel","year":"2014"}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366417306709?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366417306709?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T12:03:23Z","timestamp":1588334603000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366417306709"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1]]},"references-count":48,"alternative-id":["S0140366417306709"],"URL":"https:\/\/doi.org\/10.1016\/j.comcom.2017.11.009","relation":{},"ISSN":["0140-3664"],"issn-type":[{"value":"0140-3664","type":"print"}],"subject":[],"published":{"date-parts":[[2018,1]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Increasing user controllability on device specific privacy in the Internet of Things","name":"articletitle","label":"Article Title"},{"value":"Computer Communications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.comcom.2017.11.009","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2017 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}