{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T04:28:19Z","timestamp":1772252899199,"version":"3.50.1"},"reference-count":38,"publisher":"MDPI AG","issue":"9","license":[{"start":{"date-parts":[[2016,9,10]],"date-time":"2016-09-10T00:00:00Z","timestamp":1473465600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>With the rapid growth of the health data scale, the limited storage and computation resources of wireless body area sensor networks (WBANs) is becoming a barrier to their development. Therefore, outsourcing the encrypted health data to the cloud has been an appealing strategy. However, date aggregation will become difficult. Some recently-proposed schemes try to address this problem. However, there are still some functions and privacy issues that are not discussed. In this paper, we propose a privacy-enhanced and multifunctional health data aggregation scheme (PMHA-DP) under differential privacy. Specifically, we achieve a new aggregation function, weighted average (WAAS), and design a privacy-enhanced aggregation scheme (PAAS) to protect the aggregated data from cloud servers. Besides, a histogram aggregation scheme with high accuracy is proposed. PMHA-DP supports fault tolerance while preserving data privacy. The performance evaluation shows that the proposal leads to less communication overhead than the existing one.<\/jats:p>","DOI":"10.3390\/s16091463","type":"journal-article","created":{"date-parts":[[2016,9,12]],"date-time":"2016-09-12T10:24:41Z","timestamp":1473675881000},"page":"1463","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":31,"title":["Privacy-Enhanced and Multifunctional Health Data Aggregation under Differential Privacy Guarantees"],"prefix":"10.3390","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7909-3753","authenticated-orcid":false,"given":"Hao","family":"Ren","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China"}]},{"given":"Hongwei","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China"},{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China"}]},{"given":"Xiaohui","family":"Liang","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Massachusetts at Boston, MA 02125, USA"}]},{"given":"Shibo","family":"He","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou 310027, China"}]},{"given":"Yuanshun","family":"Dai","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China"}]},{"given":"Lian","family":"Zhao","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Ryerson University, Toronto, ON M5B 2K3, Canada"}]}],"member":"1968","published-online":{"date-parts":[[2016,9,10]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"941","DOI":"10.1109\/TSMCA.2012.2210412","article-title":"Design and Implementation of a Web-Service-Based Public-Oriented Personalized Health Care Platform","volume":"43","author":"Wang","year":"2013","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"1635","DOI":"10.1109\/SURV.2014.012214.00007","article-title":"A Survey on Wireless Body Area Networks: Technologies and Design Challenges","volume":"16","author":"Cavallari","year":"2014","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1658","DOI":"10.1109\/SURV.2013.121313.00064","article-title":"Wireless Body Area Networks: A Survey","volume":"16","author":"Movassaghi","year":"2014","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1109\/MWC.2013.6590052","article-title":"MAC protocol in wireless body area networks for E-health: Challenges and a context-aware design","volume":"20","author":"Liu","year":"2013","journal-title":"IEEE Wirel. Commun."},{"key":"ref_5","unstructured":"Kline, N., and Snodgrass, R.T. (1995, January 6\u201310). Computing temporal aggregates. Proceedings of the International Conference on Data Engineering, Taipei, Taiwan."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"1940","DOI":"10.1109\/TIFS.2015.2472369","article-title":"PPM-HDA: Privacy-preserving and multifunctional health data aggregation with fault tolerance for cloud assisted WBANs","volume":"11","author":"Han","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"598","DOI":"10.1109\/JSYST.2013.2260937","article-title":"Human-Factor-Aware Privacy-Preserving Aggregation in Smart Grid","volume":"8","author":"Jia","year":"2014","journal-title":"IEEE Syst. J."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"1621","DOI":"10.1109\/TPDS.2012.86","article-title":"EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications","volume":"23","author":"Lu","year":"2012","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"1122","DOI":"10.1007\/s12083-014-0255-5","article-title":"PDAFT: A privacy-preserving data aggregation scheme with fault tolerance for smart grid communications","volume":"8","author":"Chen","year":"2014","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"777","DOI":"10.1007\/s12083-014-0292-0","article-title":"MuDA: Multifunctional data aggregation in privacy-preserving smart grid communications","volume":"8","author":"Chen","year":"2014","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/11787006_1","article-title":"Differential Privacy","volume":"Volume 4052","author":"Dwork","year":"2006","journal-title":"Automata, Languages and Programming"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"1021","DOI":"10.14778\/1920841.1920970","article-title":"Boosting the accuracy of differentially private histograms through consistency","volume":"3","author":"Hay","year":"2010","journal-title":"Proc. VLDB Endow."},{"key":"ref_13","unstructured":"Dwork, C., McSherry, F., Nissim, K., and Smith, A. (2006). Theory of Cryptography, Springer."},{"key":"ref_14","unstructured":"Boneh, D., Goh, E.J., and Nissim, K. (2005). Theory of Cryptography, Springer."},{"key":"ref_15","unstructured":"Goyal, V., Pandey, O., Sahai, A., and Waters, B. (November, January 30). Attribute-based encryption for fine-grained access control of encrypted data. Proceedings of the ACM Conference on Computer and Communications Security, Alexandria, VA, USA."},{"key":"ref_16","unstructured":"Menezes, A.J., Van Oorschot, P.C., and Vanstone, S.A. (1997). Handbook of Applied Cryptography (Discrete Mathematics and Its Applications), CRC Press."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","article-title":"How to Share a Secret","volume":"22","author":"Shamir","year":"1979","journal-title":"ACM Commun."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"1954","DOI":"10.14778\/2556549.2556576","article-title":"Understanding hierarchical methods for differentially private histograms","volume":"6","author":"Qardaji","year":"2013","journal-title":"Proc. VLDB Endow."},{"key":"ref_19","unstructured":"OpenSSL 1.0.2d. Available online: http:\/\/www.openssl.org\/source\/."},{"key":"ref_20","unstructured":"Liu, A., Liu, X., and Liu, Y. (2016). Security and Communication Networks, Wiley Online Library."},{"key":"ref_21","unstructured":"Hu, Y., and Liu, A. (2016). Computer Systems Science and Engineering, CRL Publishing."},{"key":"ref_22","unstructured":"Liu, A., Hu, Y., and Chen, Z. (2016). International Journal of Ad Hoc and Ubiquitous Computing, Inderscience Publishers."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"2053","DOI":"10.1109\/TPDS.2013.124","article-title":"EPPDR: An Efficient Privacy-Preserving Demand Response Scheme with Adaptive Key Evolution in Smart Grid","volume":"25","author":"Li","year":"2014","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1109\/TCSS.2016.2517205","article-title":"SCLPV: Secure Certificateless Public Verification for Cloud-Based Cyber-Physical-Social Systems Against Malicious Auditors","volume":"2","author":"Zhang","year":"2015","journal-title":"IEEE Trans. Comput. Social Syst."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/MWC.2015.7224730","article-title":"Engineering Searchable Encryption of Mobile Cloud Networks: When QoE Meets QoP","volume":"22","author":"Li","year":"2015","journal-title":"IEEE Wirel. Commun."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"655","DOI":"10.1109\/JSYST.2013.2271537","article-title":"An Efficient Merkle-Tree-Based Authentication Scheme for Smart Grid","volume":"8","author":"Li","year":"2014","journal-title":"IEEE Syst. J."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1109\/TDSC.2013.31","article-title":"Efficient and Privacy-Aware Data Aggregation in Mobile Sensing","volume":"11","author":"Li","year":"2014","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_28","unstructured":"Shi, E., Chan, T.H.H., Rieffel, E.G., Chow, R., and Song, D. (2011, January 6\u20139). Privacy-preserving aggregation of time-serier data. Proceedings of the 18th Annual Network and Distributed System Security Symposium, San Diego, CA, USA."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Blum, A., Dwork, C., McSherry, F., and Nissim, K. (2005, January 13\u201316). Practical privacy: The SuLQ framework. Proceedings of the Twenty-Fourth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, Baltimore, MD, USA.","DOI":"10.1145\/1065167.1065184"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Dinur, I., and Nissim, K. (2003, January 9\u201312). Revealing information while preserving privacy. Proceedings of the ACM SIGMOD-SIGACT-SIGART Symposium on PODS, San Diego, CA, USA.","DOI":"10.1145\/773153.773173"},{"key":"ref_31","unstructured":"Dwork, C., and Nissim, K. (2004). Advances in Cryptology\u2013CRYPTO, Springer."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1145\/2450142.2450148","article-title":"A learning theory approach to noninteractive database privacy","volume":"60","author":"Blum","year":"2013","journal-title":"J. ACM"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1109\/TDSC.2013.22","article-title":"Secure Two-Party Differentially Private Data Release for Vertically Partitioned Data","volume":"11","author":"Mohammed","year":"2014","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"797","DOI":"10.1007\/s00778-013-0309-y","article-title":"Differentially private histogram publication","volume":"22","author":"Xu","year":"2013","journal-title":"VLDB J."},{"key":"ref_35","unstructured":"Xiao, Y., Xiong, L., and Yuan, C. (2010). Secure Data Management, Springer."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"341","DOI":"10.14778\/2732269.2732271","article-title":"A Data- and Workload-Aware Algorithm for Range Queries under Differential Privacy","volume":"7","author":"Li","year":"2014","journal-title":"Proc. VLDB Endow."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Barak, B., Chaudhuri, K., Dwork, C., Kale, S., McSherry, F., and Talwar, K. (2007, January 11\u201314). Privacy, accuracy, and consistency too: A holistic solution to contingency table release. Proceedings of the 26th ACM SIGMOD-SIGACT-SIGART Symposium on PODS, Beijing, China.","DOI":"10.1145\/1265530.1265569"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Lee, J., Wang, Y., and Kifer, D. (2015, January 10\u201313). Maximum likelihood postprocessing for differential privacy under consistency constraints. Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Sydney, Australia.","DOI":"10.1145\/2783258.2783366"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/16\/9\/1463\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T19:30:37Z","timestamp":1760211037000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/16\/9\/1463"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,10]]},"references-count":38,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2016,9]]}},"alternative-id":["s16091463"],"URL":"https:\/\/doi.org\/10.3390\/s16091463","relation":{"has-preprint":[{"id-type":"doi","id":"10.32920\/14639934.v1","asserted-by":"object"},{"id-type":"doi","id":"10.32920\/14639934","asserted-by":"object"}]},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,9,10]]}}}