Efficient and Secure Quantile Aggregation of Private Data Streams

被引:0
|
作者
Lan, Xiao [1 ,2 ]
Jin, Hongjian [3 ]
Guo, Hui [2 ]
Wang, Xiao [4 ]
机构
[1] Sichuan Univ, Cyber Sci Res Inst, Chengdu 610207, Peoples R China
[2] State Key Lab Cryptol, Beijing 100878, Peoples R China
[3] Sichuan Univ, Coll Cyber Sci & Engn, Chengdu 610207, Peoples R China
[4] Northwestern Univ, Dept Comp Sci, Evanston, IL 60208 USA
基金
中国国家自然科学基金;
关键词
Quantile aggregation; multi-party computation; differential privacy;
D O I
10.1109/TIFS.2023.3272775
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Computing the quantile of a massive data stream has been a crucial task in networking and data management. However, existing solutions assume a centralized model where one data owner has access to all data. In this paper, we put forward a study of secure quantile aggregation between private data streams, where data streams owned by different parties would like to obtain a quantile of the union of their data without revealing anything else about their inputs. To this end, we designed efficient cryptographic protocols that are secure in the semi-honest setting as well as the malicious setting. By incorporating differential privacy, we further improve the efficiency by 1.1x to 73.1x. We implemented our protocol, which shows practical efficiency to aggregate real-world data streams efficiently.
引用
收藏
页码:3058 / 3073
页数:16
相关论文
共 50 条
  • [1] Efficient Aggregation Methods for Probabilistic Data Streams
    Goman, Maksim
    BUSINESS MODELING AND SOFTWARE DESIGN, BMSD 2018, 2018, 319 : 116 - 132
  • [2] WiP: Verifiable, Secure and Energy-Efficient Private Data Aggregation in Wireless Sensor Networks
    Tsaloli, Georgia
    Lancho, Alejandro
    Mitrokotsa, Katerina
    Durisi, Giuseppe
    PROCEEDINGS OF THE 27TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2022, 2022, : 61 - 66
  • [3] Private aggregation for presence streams
    Rieffel, Eleanor G.
    Biehl, Jacob T.
    Lee, Adam J.
    van Melle, William
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 31 : 169 - 181
  • [4] In the Shadows We Trust: A Secure Aggregation Tolerant Watermark for Data Streams
    Panah, Arezou Soltani
    van Schyndel, Ron
    Sellis, Timos
    Bertino, Elisa
    2015 IEEE 16TH INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (WOWMOM), 2015,
  • [5] Efficient and Secure Outsourcing of Differentially Private Data Publication
    Li, Jin
    Ye, Heng
    Wang, Wei
    Lou, Wenjing
    Hou, Y. Thomas
    Liu, Jiqiang
    Lu, Rongxing
    COMPUTER SECURITY (ESORICS 2018), PT II, 2018, 11099 : 187 - 206
  • [6] Secure and Efficient Data Aggregation for IoT Monitoring Systems
    Rezaeibagha, Fatemeh
    Mu, Yi
    Huang, Ke
    Chen, Lanxiang
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (10): : 8056 - 8063
  • [7] An Efficient and Secure Data Aggregation Scheme in Smart Grid
    Le, Yiwen
    He, Jinghan
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2017, 10 (01): : 269 - 282
  • [8] Efficient and Secure Data Aggregation for Smart Metering Networks
    Abdullah, Muhammad Daniel Hafiz
    Welch, Ian
    Seah, Winston K. G.
    2013 IEEE EIGHTH INTERNATIONAL CONFERENCE ON INTELLIGENT SENSORS, SENSOR NETWORKS AND INFORMATION PROCESSING, 2013, : 71 - 76
  • [9] Secure and Efficient Data Aggregation for Wireless Sensor Networks
    Wang, Xiaoyan
    Li, Jie
    Peng, Xiaoning
    Zou, Beiji
    2010 IEEE 72ND VEHICULAR TECHNOLOGY CONFERENCE FALL, 2010,
  • [10] A Novel Secure and Efficient Data Aggregation Scheme for IoT
    Li, Ruinian
    Sturtivant, Carl
    Yu, Jiguo
    Cheng, Xiuzhen
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02) : 1551 - 1560