Skip to main content
Top
Published in: Computing 9/2015

01-09-2015

A distributed protocol for privacy preserving aggregation with non-permanent participants

Authors: Yahya Benkaouz, Mohammed Erradi

Published in: Computing | Issue 9/2015

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Recent advances in techniques that combine and analyze data collected from multiple partners led to many new promising distributed collaborative applications. Such collaborative computations could occur between trusted partners, between partially trusted partners, or between competitors. Therefore preserving privacy is an important issue in this context. This paper presents a distributed protocol for privacy-preserving aggregation to enable computing a class of aggregation functions that can be expressed as Abelian group. The proposed protocol is based on an overlay structure that enables secret sharing without the need of any central authority or heavyweight cryptography. It preserves data privacy such that participant data is only known to their owner with a given probability. The aggregation result is computed by participants themselves without interacting with a specific aggregator. The aggregation result is accurate when there is no data loss. A strategy to handle the problem of nodes failures is given, along with a study of the privacy ensured by the suggested protocol.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Applebaum B, Ringberg H, Freedman MJ, Caeser M, Rexford J (2010) Collaborative, privacy-preserving data aggregation at scale. In: Proceedings of the 10th international conference on Privacy enhancing technologies (PETS’10), Springer, Berlin, pp 56–74 Applebaum B, Ringberg H, Freedman MJ, Caeser M, Rexford J (2010) Collaborative, privacy-preserving data aggregation at scale. In: Proceedings of the 10th international conference on Privacy enhancing technologies (PETS’10), Springer, Berlin, pp 56–74
2.
go back to reference Oualha N, Roudier Y (2010) Peer-to-peer storage: security and protocols. Nova Science Publishers, New York (August 1 2010) Oualha N, Roudier Y (2010) Peer-to-peer storage: security and protocols. Nova Science Publishers, New York (August 1 2010)
3.
go back to reference Goldwasser S (1997) Multi party computations: past and present. In: Proceedings of the sixteenth annual ACM symposium on Principles of distributed computing (PODC’97), ACM, New York Goldwasser S (1997) Multi party computations: past and present. In: Proceedings of the sixteenth annual ACM symposium on Principles of distributed computing (PODC’97), ACM, New York
4.
go back to reference Yao AC (1982) Protocols for secure computations. In: Proceedings of the 23rd annual symposium on foundations of computer science (SFCS’82), IEEE Computer Society, Washington, DC, pp 160–164 Yao AC (1982) Protocols for secure computations. In: Proceedings of the 23rd annual symposium on foundations of computer science (SFCS’82), IEEE Computer Society, Washington, DC, pp 160–164
5.
go back to reference Pfitsmann B, Waidner M (1992) Unconditionally untraceable and fault-tolerant broadcast and secret ballot election. In: Communications of the ACM 21(21):7–8 Pfitsmann B, Waidner M (1992) Unconditionally untraceable and fault-tolerant broadcast and secret ballot election. In: Communications of the ACM 21(21):7–8
6.
go back to reference Cramer R, Gennaro R, Schoenmakers B (1997) A secure and optimally efficient multi-authority election scheme. In: Proceedings of the 16th annual international conference on theory and application of cryptographic techniques (EUROCRYPT’97), Konstanz, Germany, May 11–15, 1997, pp 103–118 Cramer R, Gennaro R, Schoenmakers B (1997) A secure and optimally efficient multi-authority election scheme. In: Proceedings of the 16th annual international conference on theory and application of cryptographic techniques (EUROCRYPT’97), Konstanz, Germany, May 11–15, 1997, pp 103–118
7.
go back to reference Su B, Wang T (2012) Design and analysis for private determination protocol of segment-circle position relation. In: Proceedings of the international conference on industrial control and electronics engineering (ICICEE’12), IEEE, 23–25 August 2012, pp 1430–1433 Su B, Wang T (2012) Design and analysis for private determination protocol of segment-circle position relation. In: Proceedings of the international conference on industrial control and electronics engineering (ICICEE’12), IEEE, 23–25 August 2012, pp 1430–1433
8.
go back to reference Kreitz G, Dam M, Wikström D (2012) Practical private information aggregation in large networks. In: Proceedings of the 15th Nordic conference on information security technology for applications (NordSec), LNCS 7127, Springer, Berlin, pp 89–103 Kreitz G, Dam M, Wikström D (2012) Practical private information aggregation in large networks. In: Proceedings of the 15th Nordic conference on information security technology for applications (NordSec), LNCS 7127, Springer, Berlin, pp 89–103
9.
go back to reference Jung T, Mao X, Li X-Y, Tang S-J, Gong W, Zhang L (2013) Privacy-preserving data aggregation without secure channel: multivariate polynomial evaluation. In: Proceedings of the 32nd IEEE international conference on computer communications (INFOCOM’13), Turin, Italy, 14–19 April 2013, pp 2634–2642 Jung T, Mao X, Li X-Y, Tang S-J, Gong W, Zhang L (2013) Privacy-preserving data aggregation without secure channel: multivariate polynomial evaluation. In: Proceedings of the 32nd IEEE international conference on computer communications (INFOCOM’13), Turin, Italy, 14–19 April 2013, pp 2634–2642
10.
go back to reference Rastogi V, Nath S, (2010) Differentially private aggregation of distributed time-series with transformation and encryption. In: Proceedings of the 2010 international conference on management of data (SIGMOD’10), ACM, New York, pp 735–746 Rastogi V, Nath S, (2010) Differentially private aggregation of distributed time-series with transformation and encryption. In: Proceedings of the 2010 international conference on management of data (SIGMOD’10), ACM, New York, pp 735–746
11.
go back to reference Shi E, Hubert Chan TH, Rieffel EG, Chow R, Song D (2011) Privacy-preserving aggregation of time-series data. In: Proceedings of the network and distributed system security symposium (NDSS’11), San Diego Shi E, Hubert Chan TH, Rieffel EG, Chow R, Song D (2011) Privacy-preserving aggregation of time-series data. In: Proceedings of the network and distributed system security symposium (NDSS’11), San Diego
12.
go back to reference Bogetoft P, Christensen DL, Damgård I, Geisler M, Jakobsen T, Kroigaard M, Nielsen JD, Nielsen JB, Nielsen K, Pagter J, Schwartzbach M, Toft T (2009) Secure multiparty computation goes live, in financial cryptography and data security. LNCS 5628, Springer, Berlin, pp 325–343 Bogetoft P, Christensen DL, Damgård I, Geisler M, Jakobsen T, Kroigaard M, Nielsen JD, Nielsen JB, Nielsen K, Pagter J, Schwartzbach M, Toft T (2009) Secure multiparty computation goes live, in financial cryptography and data security. LNCS 5628, Springer, Berlin, pp 325–343
13.
go back to reference Bickson D, Dolev D, Bezman G, Pinkas B (2008) Peer-to-peer secure multi-party numerical computation. In: Proceedings of the 8th international conference on peer-to-peer computing (P2P ’08), IEEE computer society, Washington, DC, pp 257–266 Bickson D, Dolev D, Bezman G, Pinkas B (2008) Peer-to-peer secure multi-party numerical computation. In: Proceedings of the 8th international conference on peer-to-peer computing (P2P ’08), IEEE computer society, Washington, DC, pp 257–266
14.
go back to reference Guerraoui R, Huguenin K, Kermarrec AM, Monod M, Vigfússon Y (2012) Decentralized polling with respectable participants. J Parallel Distrib. Comput. 72(1):13–26MATHCrossRef Guerraoui R, Huguenin K, Kermarrec AM, Monod M, Vigfússon Y (2012) Decentralized polling with respectable participants. J Parallel Distrib. Comput. 72(1):13–26MATHCrossRef
15.
go back to reference Gambs S, Guerraoui R, Harkous H, Huc F, Kermarrec A-M (2012) Scalable and secure polling in dynamic distributed networks. In: Proceedings of the 31st symposium on reliable distributed systems (SRDS’12), IEEE computer society, Washington, DC, pp 181–190 Gambs S, Guerraoui R, Harkous H, Huc F, Kermarrec A-M (2012) Scalable and secure polling in dynamic distributed networks. In: Proceedings of the 31st symposium on reliable distributed systems (SRDS’12), IEEE computer society, Washington, DC, pp 181–190
16.
go back to reference Damgård I, Jurik M, Nielsen JB (2010) A generalization of Paillier’s public-key system with applications to electronic voting. In: The international journal of information security-special issue on special purpose protocols 9(6):371–385 Damgård I, Jurik M, Nielsen JB (2010) A generalization of Paillier’s public-key system with applications to electronic voting. In: The international journal of information security-special issue on special purpose protocols 9(6):371–385
17.
go back to reference Malkhi D, Margo O, Pavlov E (2003) E-voting without ‘Cryptography’. In: Proceedings of the 6th international conference on financial cryptography (FC’02), LNCS 2357, Springer, Berlin, pp 1–15 Malkhi D, Margo O, Pavlov E (2003) E-voting without ‘Cryptography’. In: Proceedings of the 6th international conference on financial cryptography (FC’02), LNCS 2357, Springer, Berlin, pp 1–15
18.
go back to reference Bocek T, Peric D, Hecht FV, Hausheer D, Stiller B (2009) PeerVote: a decentralized voting mechanism for P2P collaboration systems. In: Proceedings of the 3rd international conference on autonomous infrastructure, management and security (AIMS’09), LNCS 5637, Springer, Berlin, pp 56–69 Bocek T, Peric D, Hecht FV, Hausheer D, Stiller B (2009) PeerVote: a decentralized voting mechanism for P2P collaboration systems. In: Proceedings of the 3rd international conference on autonomous infrastructure, management and security (AIMS’09), LNCS 5637, Springer, Berlin, pp 56–69
19.
go back to reference Blum A, Dwork C, McSherry F, Nissim K (2005) Practical privacy: the SuLQ framework. In: Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on principles of database systems (PODS ’05), ACM, New York, pp 128–138 Blum A, Dwork C, McSherry F, Nissim K (2005) Practical privacy: the SuLQ framework. In: Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on principles of database systems (PODS ’05), ACM, New York, pp 128–138
20.
go back to reference Castelluccia C, Mykletun E, Tsudik G (2005) Efficient aggregation of encrypted data in wireless sensor networks. In: Proceedings of the second annual international conference on mobile and ubiquitous systems: networking and services (MobiQuitous’05), 17–21 July 2005, pp 109–117 Castelluccia C, Mykletun E, Tsudik G (2005) Efficient aggregation of encrypted data in wireless sensor networks. In: Proceedings of the second annual international conference on mobile and ubiquitous systems: networking and services (MobiQuitous’05), 17–21 July 2005, pp 109–117
21.
go back to reference Benkaouz Y, Erradi M (2013) A distributed protocol for privacy preserving aggregation, In: Proceedings of the international conference on networked systems (NETYS), LNCS 7853, Springer, Berlin, pp 221–232 Benkaouz Y, Erradi M (2013) A distributed protocol for privacy preserving aggregation, In: Proceedings of the international conference on networked systems (NETYS), LNCS 7853, Springer, Berlin, pp 221–232
22.
go back to reference Legtchenko S, Monnet S, Sens P, Muller G (2009) Churn-resilient replication strategy for peer-to-peer distributed hash-tables. In: Proceedings of the 11th international symposium on stabilization, safety, and security of distributed systems (SSS 2009). LNCS 5873, Springer, Berlin, pp 485–499 Legtchenko S, Monnet S, Sens P, Muller G (2009) Churn-resilient replication strategy for peer-to-peer distributed hash-tables. In: Proceedings of the 11th international symposium on stabilization, safety, and security of distributed systems (SSS 2009). LNCS 5873, Springer, Berlin, pp 485–499
23.
go back to reference Rhea S, Geels D, Roscoe T, Kubiatowicz J (2004) Handling churn in a DHT. In: Proceedings of the 2004 USENIX technical conference, USENIX Association, Berkeley Rhea S, Geels D, Roscoe T, Kubiatowicz J (2004) Handling churn in a DHT. In: Proceedings of the 2004 USENIX technical conference, USENIX Association, Berkeley
24.
go back to reference Castro M, Costa M, Rowstron A (2004) Performance and dependability of structured peer-to-peer overlays. In: Proceedings of the international conference on dependable systems and networks (DSN’04), IEEE computer society, Washington, DC, pp 9–18 Castro M, Costa M, Rowstron A (2004) Performance and dependability of structured peer-to-peer overlays. In: Proceedings of the international conference on dependable systems and networks (DSN’04), IEEE computer society, Washington, DC, pp 9–18
25.
go back to reference Gramoli V, Kermarrec A-M, Mostefaoui A, Raynal M, Sericola B (2006) Core persistence in peer-to-peer systems: relating size to lifetime. In: Proceedings of the OTM workshops 2006. LNCS 4278, Springer, Berlin, pp 1470–1479 Gramoli V, Kermarrec A-M, Mostefaoui A, Raynal M, Sericola B (2006) Core persistence in peer-to-peer systems: relating size to lifetime. In: Proceedings of the OTM workshops 2006. LNCS 4278, Springer, Berlin, pp 1470–1479
26.
go back to reference Rowstron AIT, Druschel P (2001) Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility. In: Proceedings of the 8th ACM symposium on operating systems principles (SOSP ’01), December 2001, pp 188–201 Rowstron AIT, Druschel P (2001) Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility. In: Proceedings of the 8th ACM symposium on operating systems principles (SOSP ’01), December 2001, pp 188–201
27.
go back to reference Dabek F, Li J, Sit E, Robertson J, Kaashoek FF, Morris R (2004) Designing a DHT for low latency and high throughput. In: Proceedings of the 1st symposium on networked systems design and implementation (NSDI’04), USENIX Association, Berkeley Dabek F, Li J, Sit E, Robertson J, Kaashoek FF, Morris R (2004) Designing a DHT for low latency and high throughput. In: Proceedings of the 1st symposium on networked systems design and implementation (NSDI’04), USENIX Association, Berkeley
28.
go back to reference Kumar A (1998) Comparative performance analysis of versions of TCP in a local network with a lossy link. In: Journal IEEE/ACM transactions on networking, vol 6, no. 4, IEEE Press Piscataway, NJ Kumar A (1998) Comparative performance analysis of versions of TCP in a local network with a lossy link. In: Journal IEEE/ACM transactions on networking, vol 6, no. 4, IEEE Press Piscataway, NJ
29.
go back to reference Chen H-SA, Nahrstedt K (1999) Feedback consolidation and timeout algorithms for point-to-multipoint ABR service. In: Ihe IEEE international conference on communications (ICC’99) 1:135–139 Chen H-SA, Nahrstedt K (1999) Feedback consolidation and timeout algorithms for point-to-multipoint ABR service. In: Ihe IEEE international conference on communications (ICC’99) 1:135–139
30.
go back to reference Griwodz C, Halvorsen P (2006) The fun of using TCP for an MMORPG. In: Proceedings of the 2006 international workshop on Network and operating systems support for digital audio and video (NOSSDAV’06), ACM, New York Griwodz C, Halvorsen P (2006) The fun of using TCP for an MMORPG. In: Proceedings of the 2006 international workshop on Network and operating systems support for digital audio and video (NOSSDAV’06), ACM, New York
Metadata
Title
A distributed protocol for privacy preserving aggregation with non-permanent participants
Authors
Yahya Benkaouz
Mohammed Erradi
Publication date
01-09-2015
Publisher
Springer Vienna
Published in
Computing / Issue 9/2015
Print ISSN: 0010-485X
Electronic ISSN: 1436-5057
DOI
https://doi.org/10.1007/s00607-013-0373-6

Other articles of this Issue 9/2015

Computing 9/2015 Go to the issue

Premium Partner