{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T03:07:59Z","timestamp":1778123279819,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,16]],"date-time":"2020-11-16T00:00:00Z","timestamp":1605484800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Science Foundation (NSF)","award":["2008993"],"award-info":[{"award-number":["2008993"]}]},{"name":"National Science Foundation (NSF)","award":["1545071"],"award-info":[{"award-number":["1545071"]}]},{"name":"National Science Foundation (NSF)","award":["2032525"],"award-info":[{"award-number":["2032525"]}]},{"name":"National Science Foundation (NSF)","award":["1527536"],"award-info":[{"award-number":["1527536"]}]},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["FA8750-16-2-0021"],"award-info":[{"award-number":["FA8750-16-2-0021"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,11,16]]},"DOI":"10.1145\/3419016.3431484","type":"proceedings-article","created":{"date-parts":[[2020,11,4]],"date-time":"2020-11-04T23:00:36Z","timestamp":1604530836000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Designing privacy preserving data sharing middleware for internet of things"],"prefix":"10.1145","author":[{"given":"Sameera","family":"Ghayyur","sequence":"first","affiliation":[{"name":"University of California"}]},{"given":"Primal","family":"Pappachan","sequence":"additional","affiliation":[{"name":"University of California"}]},{"given":"Guoxi","family":"Wang","sequence":"additional","affiliation":[{"name":"University of California"}]},{"given":"Sharad","family":"Mehrotra","sequence":"additional","affiliation":[{"name":"University of California"}]},{"given":"Nalini","family":"Venkatasubramanian","sequence":"additional","affiliation":[{"name":"University of California"}]}],"member":"320","published-online":{"date-parts":[[2020,11,16]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3147234.3148124"},{"key":"e_1_3_2_1_2_1","unstructured":"Apple. 2020. Privacy-preserving contact tracing. https:\/\/www.apple.com\/covid19\/contacttracing  Apple. 2020. Privacy-preserving contact tracing. https:\/\/www.apple.com\/covid19\/contacttracing"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1177\/1548512920956383"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043621.2043626"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134102"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3299869.3300092"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3193571"},{"key":"e_1_3_2_1_9_1","volume-title":"TPDP 2019 - Theory and Practice of Differential Privacy, A workshop in ACM Conference on Computer and Communications Security (CCS)","author":"Ghayyur Sameera","year":"2019","unstructured":"Sameera Ghayyur , Dhrubajyoti Ghosh , Xi He , and Sharad Mehrotra . 2019 . Towards Accuracy Aware Minimally Invasive Monitoring (MiM) . In TPDP 2019 - Theory and Practice of Differential Privacy, A workshop in ACM Conference on Computer and Communications Security (CCS) 2019. TPDP, London, UK, 1--4. Sameera Ghayyur, Dhrubajyoti Ghosh, Xi He, and Sharad Mehrotra. 2019. Towards Accuracy Aware Minimally Invasive Monitoring (MiM). In TPDP 2019 - Theory and Practice of Differential Privacy, A workshop in ACM Conference on Computer and Communications Security (CCS) 2019. TPDP, London, UK, 1--4."},{"key":"e_1_3_2_1_10_1","unstructured":"Drew Harwell. 2019. Colleges are turning students' phones into surveillance machines tracking the locations of hundreds of thousands. https:\/\/www.washingtonpost.com\/technology\/2019\/12\/24\/colleges-are-turning-students-phones-into-surveillance-machines-tracking-locations-hundreds-thousands\/  Drew Harwell. 2019. Colleges are turning students' phones into surveillance machines tracking the locations of hundreds of thousands. https:\/\/www.washingtonpost.com\/technology\/2019\/12\/24\/colleges-are-turning-students-phones-into-surveillance-machines-tracking-locations-hundreds-thousands\/"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2528282.2528295"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3364544.3364827"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367914"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2017.52"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.14778\/3407790.3407835"},{"key":"e_1_3_2_1_16_1","volume-title":"PrivApprox: Privacy-Preserving Stream Analytics. In 2017 USENIX Annual Technical Conference (USENIX ATC 17)","author":"Quoc Do Le","year":"2017","unstructured":"Do Le Quoc , Martin Beck , Pramod Bhatotia , Ruichuan Chen , Christof Fetzer , and Thorsten Strufe . 2017 . PrivApprox: Privacy-Preserving Stream Analytics. In 2017 USENIX Annual Technical Conference (USENIX ATC 17) . USENLX Association, Santa Clara, CA, 659--672. https:\/\/www.usenix.org\/conference\/atc17\/technical-sessions\/presentation\/quoc Do Le Quoc, Martin Beck, Pramod Bhatotia, Ruichuan Chen, Christof Fetzer, and Thorsten Strufe. 2017. PrivApprox: Privacy-Preserving Stream Analytics. In 2017 USENIX Annual Technical Conference (USENIX ATC 17). USENLX Association, Santa Clara, CA, 659--672. https:\/\/www.usenix.org\/conference\/atc17\/technical-sessions\/presentation\/quoc"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the 11th USENIX Conference on Hot Topics in Cloud Computing","author":"Shastri Supreeth","year":"2019","unstructured":"Supreeth Shastri , Melissa Wasserman , and Vijay Chidambaram . 2019 . The Seven Sins of Personal-Data Processing Systems under GDPR . In Proceedings of the 11th USENIX Conference on Hot Topics in Cloud Computing ( Renton, WA, USA) (HotCloud'19). USENIX Association, USA, 1. Supreeth Shastri, Melissa Wasserman, and Vijay Chidambaram. 2019. The Seven Sins of Personal-Data Processing Systems under GDPR. In Proceedings of the 11th USENIX Conference on Hot Topics in Cloud Computing (Renton, WA, USA) (HotCloud'19). USENIX Association, USA, 1."},{"key":"e_1_3_2_1_18_1","unstructured":"European Union. 2020. General Data Protection Regulation GPDR. https:\/\/gdpr.eu\/.  European Union. 2020. General Data Protection Regulation GPDR. https:\/\/gdpr.eu\/."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00138-013-0535-8"}],"event":{"name":"SenSys '20: The 18th ACM Conference on Embedded Networked Sensor Systems","location":"Virtual Event Japan","acronym":"SenSys '20","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems","SIGBED ACM Special Interest Group on Embedded Systems","SIGARCH ACM Special Interest Group on Computer Architecture"]},"container-title":["Proceedings of the Third Workshop on Data: Acquisition To Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3419016.3431484","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3419016.3431484","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3419016.3431484","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3419016.3431484","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:32:05Z","timestamp":1750195925000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3419016.3431484"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,16]]},"references-count":19,"alternative-id":["10.1145\/3419016.3431484","10.1145\/3419016"],"URL":"https:\/\/doi.org\/10.1145\/3419016.3431484","relation":{},"subject":[],"published":{"date-parts":[[2020,11,16]]},"assertion":[{"value":"2020-11-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}