Achieving Secure and Differentially Private Computations in Multiparty Settings

被引:8
|
作者
Acar, Abbas [1 ]
Celik, Z. Berkay [2 ]
Aksu, Hidayet [1 ]
Uluagac, A. Selcuk [1 ]
McDaniel, Patrick [2 ]
机构
[1] Florida Int Univ, Dept ECE, CPS Secur Lab, Miami, FL 33199 USA
[2] Penn State Univ, Dept CSE, SIIS Lab, University Pk, PA 16802 USA
基金
美国国家科学基金会;
关键词
Secure computation; differential privacy; multiparty; distributed differential privacy; predictive models; regression;
D O I
10.1109/PAC.2017.12
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Sharing and working on sensitive data in distributed settings from healthcare to finance is a major challenge due to security and privacy concerns. Secure multiparty computation (SMC) is a viable panacea for this, allowing distributed parties to make computations while the parties learn nothing about their data, but the final result. Although SMC is instrumental in such distributed settings, it does not provide any guarantees not to leak any information about individuals to adversaries. Differential privacy (DP) can be utilized to address this; however, achieving SMC with DP is not a trivial task, either. In this paper, we propose a novel Secure Multiparty Distributed Differentially Private (SM-DDP) protocol to achieve secure and private computations in a multiparty environment. Specifically, with our protocol, we simultaneously achieve SMC and DP in distributed settings focusing on linear regression on horizontally distributed data. That is, parties do not see each others' data and further, can not infer information about individuals from the final constructed statistical model. Any statistical model function that allows independent calculation of local statistics can be computed through our protocol. The protocol implements homomorphic encryption for SMC and functional mechanism for DP to achieve the desired security and privacy guarantees. In this work, we first introduce the theoretical foundation for the SM-DDP protocol and then evaluate its efficacy and performance on two different datasets. Our results show that one can achieve individual-level privacy through the proposed protocol with distributed DP, which is independently applied by each party in a distributed fashion. Moreover, our results also show that the SM-DDP protocol incurs minimal computational overhead, is scalable, and provides security and privacy guarantees.
引用
收藏
页码:49 / 59
页数:11
相关论文
共 50 条
  • [1] Secure Multiparty Computations on Bitcoin
    Andrychowicz, Marcin
    Dziembowski, Stefan
    Malinowski, Daniel
    Mazurek, Lukasz
    [J]. COMMUNICATIONS OF THE ACM, 2016, 59 (04) : 76 - 84
  • [2] Secure Multiparty Computations on Bitcoin
    Andrychowicz, Marcin
    Dziembowski, Stefan
    Malinowski, Daniel
    Mazurek, Lukasz
    [J]. 2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014), 2014, : 443 - 458
  • [3] Secure multiparty computations without computers
    Niemi, V
    Renvall, A
    [J]. THEORETICAL COMPUTER SCIENCE, 1998, 191 (1-2) : 173 - 183
  • [4] Amortizing randomness in private multiparty computations
    Kushilevitz, E
    Ostrovsky, R
    Rosén, A
    [J]. SIAM JOURNAL ON DISCRETE MATHEMATICS, 2003, 16 (04) : 533 - 544
  • [5] Editorial: Multiparty secure quantum and semiquantum computations
    Ye, Tianyu
    [J]. FRONTIERS IN PHYSICS, 2023, 11
  • [6] Secure multiparty computations using a dial lock
    Mizuki, Takaaki
    Kugimoto, Yoshinori
    Sone, Hideaki
    [J]. THEORY AND APPLICATIONS OF MODELS OF COMPUTATION, PROCEEDINGS, 2007, 4484 : 499 - +
  • [7] Multiparty computations in non-private environments
    Liskiewicz, M.
    [J]. General Theory of Information Transfer and Combinatorics, 2006, 4123 : 1097 - 1099
  • [8] Coding for Private and Secure Multiparty Computing
    Yu, Qian
    Raviv, Netanel
    Avestimehr, A. Salman
    [J]. 2018 IEEE INFORMATION THEORY WORKSHOP (ITW), 2018, : 360 - 364
  • [9] Secure multiparty computations in floating-point arithmetic
    Guo, Chuan
    Hannun, Awni
    Knott, Brian
    van der Maaten, Laurens
    Tygert, Mark
    Zhu, Ruiyu
    [J]. INFORMATION AND INFERENCE-A JOURNAL OF THE IMA, 2022, 11 (01) : 103 - 135
  • [10] Efficient multiparty computations secure against an adaptive adversary
    Cramer, R
    Damgård, I
    Dziembowski, S
    Hirt, M
    Rabin, T
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT'99, 1999, 1592 : 311 - 326