Skip to main content

2017 | OriginalPaper | Buchkapitel

Secured Privacy Preserving Data Aggregation with Semi-honest Servers

verfasst von : Zhigang Lu, Hong Shen

Erschienen in: Advances in Knowledge Discovery and Data Mining

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the large deployment of smart devices, the collections and analysis of user data significantly benefit both industry and people’s daily life. However, it has showed a serious risk to people’s privacy in the process of the above applications. Recently, combining multiparty computation and differential privacy was a popular strategy to guarantee both computational security and output privacy in distributed data aggregation. To decrease the communication cost in traditional multiparty computation paradigm, the existing work introduces several trusted servers to undertake the main computing tasks. But we will lose the guarantee on both security and privacy when the trusted servers are vulnerable to adversaries. To address the privacy disclosure problem caused by the vulnerable servers, we provide a two-layer randomisation privacy preserved data aggregation framework with semi-honest servers (we only take their computation ability but do not trust them). Differing from the existing approach introduces differential privacy noises globally, our framework randomly adds random noises but maintains the same differential privacy guarantee. Theoretical and experimental analysis show that to achieve same security and privacy insurance, our framework provides better data utility than the existing approach.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Ács, G., Castelluccia, C.: I have a DREAM! (DiffeRentially privatE smArt Metering). In: Filler, T., Pevný, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 118–132. Springer, Heidelberg (2011). doi:10.1007/978-3-642-24178-9_9 CrossRef Ács, G., Castelluccia, C.: I have a DREAM! (DiffeRentially privatE smArt Metering). In: Filler, T., Pevný, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 118–132. Springer, Heidelberg (2011). doi:10.​1007/​978-3-642-24178-9_​9 CrossRef
2.
Zurück zum Zitat Cramer, R., Damgård, I., Nielsen, J.B.: Multiparty computation, an introduction. In: Catalano, D., Cramer, R., Di Crescenzo, G., Damgård, I., Pointcheval, D., Takagi, T. (eds.) Contemporary cryptology. Advanced Courses in Mathematics - CRM Barcelona, pp. 41–87. Birkhäuser Basel, Basel (2009) Cramer, R., Damgård, I., Nielsen, J.B.: Multiparty computation, an introduction. In: Catalano, D., Cramer, R., Di Crescenzo, G., Damgård, I., Pointcheval, D., Takagi, T. (eds.) Contemporary cryptology. Advanced Courses in Mathematics - CRM Barcelona, pp. 41–87. Birkhäuser Basel, Basel (2009)
3.
Zurück zum Zitat Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1–12. Springer, Heidelberg (2006). doi:10.1007/11787006_1 CrossRef Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1–12. Springer, Heidelberg (2006). doi:10.​1007/​11787006_​1 CrossRef
4.
Zurück zum Zitat Eigner, F., Kate, A., Maffei, M., Pampaloni, F., Pryvalov, I.: Differentially private data aggregation with optimal utility. In: Proceedings of the 30th Annual Computer Security Applications Conference, pp. 316–325. ACM (2014) Eigner, F., Kate, A., Maffei, M., Pampaloni, F., Pryvalov, I.: Differentially private data aggregation with optimal utility. In: Proceedings of the 30th Annual Computer Security Applications Conference, pp. 316–325. ACM (2014)
5.
Zurück zum Zitat Elahi, T., Danezis, G., Goldberg, I.: PrivEx: private collection of traffic statistics for anonymous communication networks. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 1068–1079. ACM (2014) Elahi, T., Danezis, G., Goldberg, I.: PrivEx: private collection of traffic statistics for anonymous communication networks. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 1068–1079. ACM (2014)
6.
Zurück zum Zitat Goryczka, S., Xiong, L.: A comprehensive comparison of multiparty secure additions with differential privacy. Trans. Dependable Secure Comput. (2015). Preliminary version – Goryczka, S., Xiong, L., Sunderam, V.: Secure multiparty aggregation with differential privacy: a comparative study. In: Proceedings of the Joint EDBT/ICDT 2013 Workshops, EDBT 2013, Genoa, Italy, pp. 155–163. ACM, New York (2013). doi:10.1145/2457317.2457343 Goryczka, S., Xiong, L.: A comprehensive comparison of multiparty secure additions with differential privacy. Trans. Dependable Secure Comput. (2015). Preliminary version – Goryczka, S., Xiong, L., Sunderam, V.: Secure multiparty aggregation with differential privacy: a comparative study. In: Proceedings of the Joint EDBT/ICDT 2013 Workshops, EDBT 2013, Genoa, Italy, pp. 155–163. ACM, New York (2013). doi:10.​1145/​2457317.​2457343
7.
Zurück zum Zitat Goryczka, S., Xiong, L., Fung, B.C.: Privacy for collaborative data publishing. IEEE Trans. Knowl. Data Eng. 26(10), 2520–2533 (2014)CrossRef Goryczka, S., Xiong, L., Fung, B.C.: Privacy for collaborative data publishing. IEEE Trans. Knowl. Data Eng. 26(10), 2520–2533 (2014)CrossRef
8.
Zurück zum Zitat Gupta, A., Ligett, K., McSherry, F., Roth, A., Talwar, K.: Differentially private combinatorial optimization. In: Proceedings of the 21st Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2010, pp. 1106–1125 (2010) Gupta, A., Ligett, K., McSherry, F., Roth, A., Talwar, K.: Differentially private combinatorial optimization. In: Proceedings of the 21st Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2010, pp. 1106–1125 (2010)
9.
Zurück zum Zitat Lu, Z., Shen, H.: A security-assured accuracy-maximised privacy preserving collaborative filtering recommendation algorithm. In: Proceedings of the 19th International Database Engineering & Applications Symposium, pp. 72–80. ACM (2015) Lu, Z., Shen, H.: A security-assured accuracy-maximised privacy preserving collaborative filtering recommendation algorithm. In: Proceedings of the 19th International Database Engineering & Applications Symposium, pp. 72–80. ACM (2015)
10.
Zurück zum Zitat McSherry, F.: Privacy integrated queries. In: Proceedings of the 2009 ACM SIGMOD International Conference on Management of Data (SIGMOD). ACM (2009) McSherry, F.: Privacy integrated queries. In: Proceedings of the 2009 ACM SIGMOD International Conference on Management of Data (SIGMOD). ACM (2009)
11.
Zurück zum Zitat McSherry, F., Talwar, K.: Mechanism design via differential privacy. In: 48th Annual IEEE Symposium on Foundations of Computer Science, pp. 94–103. IEEE (2007) McSherry, F., Talwar, K.: Mechanism design via differential privacy. In: 48th Annual IEEE Symposium on Foundations of Computer Science, pp. 94–103. IEEE (2007)
12.
Zurück zum Zitat Pettai, M., Laud, P.: Combining differential privacy and secure multiparty computation. In: Proceedings of the 31st Annual Computer Security Applications Conference, pp. 421–430. ACM (2015) Pettai, M., Laud, P.: Combining differential privacy and secure multiparty computation. In: Proceedings of the 31st Annual Computer Security Applications Conference, pp. 421–430. ACM (2015)
13.
Zurück zum Zitat Rastogi, V., Nath, S.: Differentially private aggregation of distributed time-series with transformation and encryption. In: Proceedings of the 2010 ACM SIGMOD International Conference on Management of Data, pp. 735–746. ACM (2010) Rastogi, V., Nath, S.: Differentially private aggregation of distributed time-series with transformation and encryption. In: Proceedings of the 2010 ACM SIGMOD International Conference on Management of Data, pp. 735–746. ACM (2010)
15.
Zurück zum Zitat Shi, E., Chan, H., Rieffel, E., Chow, R., Song, D.: Privacy-preserving aggregation of time-series data. In: Annual Network & Distributed System Security Symposium (NDSS). Internet Society (2011) Shi, E., Chan, H., Rieffel, E., Chow, R., Song, D.: Privacy-preserving aggregation of time-series data. In: Annual Network & Distributed System Security Symposium (NDSS). Internet Society (2011)
16.
Zurück zum Zitat Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10(05), 557–570 (2002)MathSciNetCrossRefMATH Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10(05), 557–570 (2002)MathSciNetCrossRefMATH
Metadaten
Titel
Secured Privacy Preserving Data Aggregation with Semi-honest Servers
verfasst von
Zhigang Lu
Hong Shen
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-57529-2_24