Privacy protection against malicious adversaries in distributed information sharing systems

被引:0
|
作者
Zhang, Nan [1 ]
Zhao, Wei [2 ]
机构
[1] Univ Texas Arlington, Dept Comp Sci & Engn, Arlington, TX 76019 USA
[2] Rensselaer Polytech Inst, Sch Sci, IC05 Jonsson Rowland Sci Ctr, Troy, NY 12180 USA
基金
美国国家科学基金会;
关键词
information sharing; privacy;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We address issues related to sharing information in a distributed system consisting of autonomous entities, each of which holds a private database. We consider threats from malicious adversaries that can deviate from the designated protocol and change their input databases. We classify malicious adversaries into two widely existing subclasses, namely, weakly and strongly malicious adversaries, and propose protocols that can effectively and efficiently protect privacy against malicious adversaries.
引用
收藏
页码:1028 / 1033
页数:6
相关论文
共 50 条
  • [1] Protection of Location Privacy in Continuous LBSs against Adversaries with Background Information
    Niu, Ben
    Gao, Sheng
    Li, Fenghua
    Li, Hui
    Lu, Zongqing
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2016,
  • [2] Privacy-friendly weighted-reputation aggregation protocols against malicious adversaries in cloud services
    Zhang, Mingwu
    Xia, Yong
    Yuan, Ou
    Morozov, Kirill
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (12) : 1863 - 1872
  • [3] Efficient Video Privacy Protection Against Malicious Face Recognition Models
    Guo, Enting
    Li, Peng
    Yu, Shui
    Wang, Hao
    [J]. IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY, 2022, 3 : 271 - 280
  • [4] Improved Private Set Intersection Against Malicious Adversaries
    Rindal, Peter
    Rosulek, Mike
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT I, 2017, 10210 : 235 - 259
  • [5] A Secure Scalar Product Protocol Against Malicious Adversaries
    Bo Yang
    Yong Yu
    Chung-Huang Yang
    [J]. Journal of Computer Science and Technology, 2013, 28 : 152 - 158
  • [6] A Secure Scalar Product Protocol Against Malicious Adversaries
    Yang, Bo
    Yu, Yong
    Yang, Chung-Huang
    [J]. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2013, 28 (01) : 152 - 158
  • [7] A Secure Scalar Product Protocol Against Malicious Adversaries
    杨波
    禹勇
    杨中皇
    [J]. Journal of Computer Science & Technology, 2013, 28 (01) : 152 - 158
  • [8] PRIVACY PROTECTION IN INFORMATION-SYSTEMS
    TURN, R
    [J]. ADVANCES IN COMPUTERS, 1977, 16 : 221 - 335
  • [9] Rational Secret Sharing Information-theoretically Secure Against Adaptive Adversaries
    Yu, Yang
    Zhou, Zhanfei
    [J]. 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 249 - 256
  • [10] Information sharing and privacy protection of terrorist or criminal social networks
    Yang, Christopher C.
    [J]. ISI 2008: 2008 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS, 2008, : 40 - +