Skip to main content
Erschienen in: Computing 9/2015

01.09.2015

A distributed protocol for privacy preserving aggregation with non-permanent participants

verfasst von: Yahya Benkaouz, Mohammed Erradi

Erschienen in: Computing | Ausgabe 9/2015

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Recent advances in techniques that combine and analyze data collected from multiple partners led to many new promising distributed collaborative applications. Such collaborative computations could occur between trusted partners, between partially trusted partners, or between competitors. Therefore preserving privacy is an important issue in this context. This paper presents a distributed protocol for privacy-preserving aggregation to enable computing a class of aggregation functions that can be expressed as Abelian group. The proposed protocol is based on an overlay structure that enables secret sharing without the need of any central authority or heavyweight cryptography. It preserves data privacy such that participant data is only known to their owner with a given probability. The aggregation result is computed by participants themselves without interacting with a specific aggregator. The aggregation result is accurate when there is no data loss. A strategy to handle the problem of nodes failures is given, along with a study of the privacy ensured by the suggested protocol.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Applebaum B, Ringberg H, Freedman MJ, Caeser M, Rexford J (2010) Collaborative, privacy-preserving data aggregation at scale. In: Proceedings of the 10th international conference on Privacy enhancing technologies (PETS’10), Springer, Berlin, pp 56–74 Applebaum B, Ringberg H, Freedman MJ, Caeser M, Rexford J (2010) Collaborative, privacy-preserving data aggregation at scale. In: Proceedings of the 10th international conference on Privacy enhancing technologies (PETS’10), Springer, Berlin, pp 56–74
2.
Zurück zum Zitat Oualha N, Roudier Y (2010) Peer-to-peer storage: security and protocols. Nova Science Publishers, New York (August 1 2010) Oualha N, Roudier Y (2010) Peer-to-peer storage: security and protocols. Nova Science Publishers, New York (August 1 2010)
3.
Zurück zum Zitat Goldwasser S (1997) Multi party computations: past and present. In: Proceedings of the sixteenth annual ACM symposium on Principles of distributed computing (PODC’97), ACM, New York Goldwasser S (1997) Multi party computations: past and present. In: Proceedings of the sixteenth annual ACM symposium on Principles of distributed computing (PODC’97), ACM, New York
4.
Zurück zum Zitat Yao AC (1982) Protocols for secure computations. In: Proceedings of the 23rd annual symposium on foundations of computer science (SFCS’82), IEEE Computer Society, Washington, DC, pp 160–164 Yao AC (1982) Protocols for secure computations. In: Proceedings of the 23rd annual symposium on foundations of computer science (SFCS’82), IEEE Computer Society, Washington, DC, pp 160–164
5.
Zurück zum Zitat Pfitsmann B, Waidner M (1992) Unconditionally untraceable and fault-tolerant broadcast and secret ballot election. In: Communications of the ACM 21(21):7–8 Pfitsmann B, Waidner M (1992) Unconditionally untraceable and fault-tolerant broadcast and secret ballot election. In: Communications of the ACM 21(21):7–8
6.
Zurück zum Zitat Cramer R, Gennaro R, Schoenmakers B (1997) A secure and optimally efficient multi-authority election scheme. In: Proceedings of the 16th annual international conference on theory and application of cryptographic techniques (EUROCRYPT’97), Konstanz, Germany, May 11–15, 1997, pp 103–118 Cramer R, Gennaro R, Schoenmakers B (1997) A secure and optimally efficient multi-authority election scheme. In: Proceedings of the 16th annual international conference on theory and application of cryptographic techniques (EUROCRYPT’97), Konstanz, Germany, May 11–15, 1997, pp 103–118
7.
Zurück zum Zitat Su B, Wang T (2012) Design and analysis for private determination protocol of segment-circle position relation. In: Proceedings of the international conference on industrial control and electronics engineering (ICICEE’12), IEEE, 23–25 August 2012, pp 1430–1433 Su B, Wang T (2012) Design and analysis for private determination protocol of segment-circle position relation. In: Proceedings of the international conference on industrial control and electronics engineering (ICICEE’12), IEEE, 23–25 August 2012, pp 1430–1433
8.
Zurück zum Zitat Kreitz G, Dam M, Wikström D (2012) Practical private information aggregation in large networks. In: Proceedings of the 15th Nordic conference on information security technology for applications (NordSec), LNCS 7127, Springer, Berlin, pp 89–103 Kreitz G, Dam M, Wikström D (2012) Practical private information aggregation in large networks. In: Proceedings of the 15th Nordic conference on information security technology for applications (NordSec), LNCS 7127, Springer, Berlin, pp 89–103
9.
Zurück zum Zitat Jung T, Mao X, Li X-Y, Tang S-J, Gong W, Zhang L (2013) Privacy-preserving data aggregation without secure channel: multivariate polynomial evaluation. In: Proceedings of the 32nd IEEE international conference on computer communications (INFOCOM’13), Turin, Italy, 14–19 April 2013, pp 2634–2642 Jung T, Mao X, Li X-Y, Tang S-J, Gong W, Zhang L (2013) Privacy-preserving data aggregation without secure channel: multivariate polynomial evaluation. In: Proceedings of the 32nd IEEE international conference on computer communications (INFOCOM’13), Turin, Italy, 14–19 April 2013, pp 2634–2642
10.
Zurück zum Zitat Rastogi V, Nath S, (2010) Differentially private aggregation of distributed time-series with transformation and encryption. In: Proceedings of the 2010 international conference on management of data (SIGMOD’10), ACM, New York, pp 735–746 Rastogi V, Nath S, (2010) Differentially private aggregation of distributed time-series with transformation and encryption. In: Proceedings of the 2010 international conference on management of data (SIGMOD’10), ACM, New York, pp 735–746
11.
Zurück zum Zitat Shi E, Hubert Chan TH, Rieffel EG, Chow R, Song D (2011) Privacy-preserving aggregation of time-series data. In: Proceedings of the network and distributed system security symposium (NDSS’11), San Diego Shi E, Hubert Chan TH, Rieffel EG, Chow R, Song D (2011) Privacy-preserving aggregation of time-series data. In: Proceedings of the network and distributed system security symposium (NDSS’11), San Diego
12.
Zurück zum Zitat Bogetoft P, Christensen DL, Damgård I, Geisler M, Jakobsen T, Kroigaard M, Nielsen JD, Nielsen JB, Nielsen K, Pagter J, Schwartzbach M, Toft T (2009) Secure multiparty computation goes live, in financial cryptography and data security. LNCS 5628, Springer, Berlin, pp 325–343 Bogetoft P, Christensen DL, Damgård I, Geisler M, Jakobsen T, Kroigaard M, Nielsen JD, Nielsen JB, Nielsen K, Pagter J, Schwartzbach M, Toft T (2009) Secure multiparty computation goes live, in financial cryptography and data security. LNCS 5628, Springer, Berlin, pp 325–343
13.
Zurück zum Zitat Bickson D, Dolev D, Bezman G, Pinkas B (2008) Peer-to-peer secure multi-party numerical computation. In: Proceedings of the 8th international conference on peer-to-peer computing (P2P ’08), IEEE computer society, Washington, DC, pp 257–266 Bickson D, Dolev D, Bezman G, Pinkas B (2008) Peer-to-peer secure multi-party numerical computation. In: Proceedings of the 8th international conference on peer-to-peer computing (P2P ’08), IEEE computer society, Washington, DC, pp 257–266
14.
Zurück zum Zitat Guerraoui R, Huguenin K, Kermarrec AM, Monod M, Vigfússon Y (2012) Decentralized polling with respectable participants. J Parallel Distrib. Comput. 72(1):13–26MATHCrossRef Guerraoui R, Huguenin K, Kermarrec AM, Monod M, Vigfússon Y (2012) Decentralized polling with respectable participants. J Parallel Distrib. Comput. 72(1):13–26MATHCrossRef
15.
Zurück zum Zitat Gambs S, Guerraoui R, Harkous H, Huc F, Kermarrec A-M (2012) Scalable and secure polling in dynamic distributed networks. In: Proceedings of the 31st symposium on reliable distributed systems (SRDS’12), IEEE computer society, Washington, DC, pp 181–190 Gambs S, Guerraoui R, Harkous H, Huc F, Kermarrec A-M (2012) Scalable and secure polling in dynamic distributed networks. In: Proceedings of the 31st symposium on reliable distributed systems (SRDS’12), IEEE computer society, Washington, DC, pp 181–190
16.
Zurück zum Zitat Damgård I, Jurik M, Nielsen JB (2010) A generalization of Paillier’s public-key system with applications to electronic voting. In: The international journal of information security-special issue on special purpose protocols 9(6):371–385 Damgård I, Jurik M, Nielsen JB (2010) A generalization of Paillier’s public-key system with applications to electronic voting. In: The international journal of information security-special issue on special purpose protocols 9(6):371–385
17.
Zurück zum Zitat Malkhi D, Margo O, Pavlov E (2003) E-voting without ‘Cryptography’. In: Proceedings of the 6th international conference on financial cryptography (FC’02), LNCS 2357, Springer, Berlin, pp 1–15 Malkhi D, Margo O, Pavlov E (2003) E-voting without ‘Cryptography’. In: Proceedings of the 6th international conference on financial cryptography (FC’02), LNCS 2357, Springer, Berlin, pp 1–15
18.
Zurück zum Zitat Bocek T, Peric D, Hecht FV, Hausheer D, Stiller B (2009) PeerVote: a decentralized voting mechanism for P2P collaboration systems. In: Proceedings of the 3rd international conference on autonomous infrastructure, management and security (AIMS’09), LNCS 5637, Springer, Berlin, pp 56–69 Bocek T, Peric D, Hecht FV, Hausheer D, Stiller B (2009) PeerVote: a decentralized voting mechanism for P2P collaboration systems. In: Proceedings of the 3rd international conference on autonomous infrastructure, management and security (AIMS’09), LNCS 5637, Springer, Berlin, pp 56–69
19.
Zurück zum Zitat Blum A, Dwork C, McSherry F, Nissim K (2005) Practical privacy: the SuLQ framework. In: Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on principles of database systems (PODS ’05), ACM, New York, pp 128–138 Blum A, Dwork C, McSherry F, Nissim K (2005) Practical privacy: the SuLQ framework. In: Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on principles of database systems (PODS ’05), ACM, New York, pp 128–138
20.
Zurück zum Zitat Castelluccia C, Mykletun E, Tsudik G (2005) Efficient aggregation of encrypted data in wireless sensor networks. In: Proceedings of the second annual international conference on mobile and ubiquitous systems: networking and services (MobiQuitous’05), 17–21 July 2005, pp 109–117 Castelluccia C, Mykletun E, Tsudik G (2005) Efficient aggregation of encrypted data in wireless sensor networks. In: Proceedings of the second annual international conference on mobile and ubiquitous systems: networking and services (MobiQuitous’05), 17–21 July 2005, pp 109–117
21.
Zurück zum Zitat Benkaouz Y, Erradi M (2013) A distributed protocol for privacy preserving aggregation, In: Proceedings of the international conference on networked systems (NETYS), LNCS 7853, Springer, Berlin, pp 221–232 Benkaouz Y, Erradi M (2013) A distributed protocol for privacy preserving aggregation, In: Proceedings of the international conference on networked systems (NETYS), LNCS 7853, Springer, Berlin, pp 221–232
22.
Zurück zum Zitat Legtchenko S, Monnet S, Sens P, Muller G (2009) Churn-resilient replication strategy for peer-to-peer distributed hash-tables. In: Proceedings of the 11th international symposium on stabilization, safety, and security of distributed systems (SSS 2009). LNCS 5873, Springer, Berlin, pp 485–499 Legtchenko S, Monnet S, Sens P, Muller G (2009) Churn-resilient replication strategy for peer-to-peer distributed hash-tables. In: Proceedings of the 11th international symposium on stabilization, safety, and security of distributed systems (SSS 2009). LNCS 5873, Springer, Berlin, pp 485–499
23.
Zurück zum Zitat Rhea S, Geels D, Roscoe T, Kubiatowicz J (2004) Handling churn in a DHT. In: Proceedings of the 2004 USENIX technical conference, USENIX Association, Berkeley Rhea S, Geels D, Roscoe T, Kubiatowicz J (2004) Handling churn in a DHT. In: Proceedings of the 2004 USENIX technical conference, USENIX Association, Berkeley
24.
Zurück zum Zitat Castro M, Costa M, Rowstron A (2004) Performance and dependability of structured peer-to-peer overlays. In: Proceedings of the international conference on dependable systems and networks (DSN’04), IEEE computer society, Washington, DC, pp 9–18 Castro M, Costa M, Rowstron A (2004) Performance and dependability of structured peer-to-peer overlays. In: Proceedings of the international conference on dependable systems and networks (DSN’04), IEEE computer society, Washington, DC, pp 9–18
25.
Zurück zum Zitat Gramoli V, Kermarrec A-M, Mostefaoui A, Raynal M, Sericola B (2006) Core persistence in peer-to-peer systems: relating size to lifetime. In: Proceedings of the OTM workshops 2006. LNCS 4278, Springer, Berlin, pp 1470–1479 Gramoli V, Kermarrec A-M, Mostefaoui A, Raynal M, Sericola B (2006) Core persistence in peer-to-peer systems: relating size to lifetime. In: Proceedings of the OTM workshops 2006. LNCS 4278, Springer, Berlin, pp 1470–1479
26.
Zurück zum Zitat Rowstron AIT, Druschel P (2001) Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility. In: Proceedings of the 8th ACM symposium on operating systems principles (SOSP ’01), December 2001, pp 188–201 Rowstron AIT, Druschel P (2001) Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility. In: Proceedings of the 8th ACM symposium on operating systems principles (SOSP ’01), December 2001, pp 188–201
27.
Zurück zum Zitat Dabek F, Li J, Sit E, Robertson J, Kaashoek FF, Morris R (2004) Designing a DHT for low latency and high throughput. In: Proceedings of the 1st symposium on networked systems design and implementation (NSDI’04), USENIX Association, Berkeley Dabek F, Li J, Sit E, Robertson J, Kaashoek FF, Morris R (2004) Designing a DHT for low latency and high throughput. In: Proceedings of the 1st symposium on networked systems design and implementation (NSDI’04), USENIX Association, Berkeley
28.
Zurück zum Zitat Kumar A (1998) Comparative performance analysis of versions of TCP in a local network with a lossy link. In: Journal IEEE/ACM transactions on networking, vol 6, no. 4, IEEE Press Piscataway, NJ Kumar A (1998) Comparative performance analysis of versions of TCP in a local network with a lossy link. In: Journal IEEE/ACM transactions on networking, vol 6, no. 4, IEEE Press Piscataway, NJ
29.
Zurück zum Zitat Chen H-SA, Nahrstedt K (1999) Feedback consolidation and timeout algorithms for point-to-multipoint ABR service. In: Ihe IEEE international conference on communications (ICC’99) 1:135–139 Chen H-SA, Nahrstedt K (1999) Feedback consolidation and timeout algorithms for point-to-multipoint ABR service. In: Ihe IEEE international conference on communications (ICC’99) 1:135–139
30.
Zurück zum Zitat Griwodz C, Halvorsen P (2006) The fun of using TCP for an MMORPG. In: Proceedings of the 2006 international workshop on Network and operating systems support for digital audio and video (NOSSDAV’06), ACM, New York Griwodz C, Halvorsen P (2006) The fun of using TCP for an MMORPG. In: Proceedings of the 2006 international workshop on Network and operating systems support for digital audio and video (NOSSDAV’06), ACM, New York
Metadaten
Titel
A distributed protocol for privacy preserving aggregation with non-permanent participants
verfasst von
Yahya Benkaouz
Mohammed Erradi
Publikationsdatum
01.09.2015
Verlag
Springer Vienna
Erschienen in
Computing / Ausgabe 9/2015
Print ISSN: 0010-485X
Elektronische ISSN: 1436-5057
DOI
https://doi.org/10.1007/s00607-013-0373-6

Weitere Artikel der Ausgabe 9/2015

Computing 9/2015 Zur Ausgabe

Premium Partner