Secure and collusion-resistant data aggregation from convertible tags

被引:3
|
作者
Leontiadis, Iraklis [1 ,2 ]
Li, Ming [3 ]
机构
[1] Inpher, New York, NY 10010 USA
[2] Inpher, Lausanne, Switzerland
[3] Univ Arizona, Dept Elect & Comp Engn, Tucson, AZ 85721 USA
关键词
Data privacy; Data security; Convertible tags; Collusion-resistant aggregation; FAULT-TOLERANCE;
D O I
10.1007/s10207-019-00485-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The progress in communication and hardware technology increases the computational capabilities of personal devices. Aggregators, acting as third parties, are interested in learning a statistical function as the sum over a census of data. Users are reluctant to reveal their information in cleartext, since it is treated as personal sensitive information. The paradoxical paradigm of preserving the privacy of individual data while granting an untrusted third party to learn in cleartext a function thereof, is partially addressed by the current privacy-preserving aggregation protocols. Current solutions are either focused on an honest-but-curious Aggregator who is trusted to follow the rules of the protocol or model a malicious Aggregator with trustworthy users. In this paper, we are the first to propose a protocol with fully malicious users who collude with a malicious Aggregator in order to forge a message of a trusted user. We introduce the new cryptographic primitive of convertible tag, that consists of a two-layer authentication tag. Users first tag their data with their secret key and then an untrusted Converter converts the first layer tags in a second layer. The final tags allow the Aggregator to produce a proof for the correctness of a computation over users' data. Security and privacy of the scheme is preserved against the Converter and the Aggregator, under the notions of Aggregator obliviousness and Aggregate unforgeability security definitions, augmented with malicious users. Our protocol is provably secure, and experimental evaluations demonstrate its practicality.
引用
收藏
页码:1 / 20
页数:20
相关论文
共 50 条
  • [21] A collusion-resistant certificateless provable data possession scheme for shared data with user revocation
    Yang, Guang
    Han, Lidong
    Bi, Jingguo
    Wang, Fuqun
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (02): : 2165 - 2179
  • [22] Collusion-Resistant Processing of SQL Range Predicates
    Kesarwani, Manish
    Kaul, Akshar
    Singh, Gagandeep
    Deshpande, Prasad M.
    Haritsa, Jayant R.
    DATA SCIENCE AND ENGINEERING, 2018, 3 (04) : 323 - 340
  • [23] Collusion-Resistant Worker Recruitment in Crowdsourcing Systems
    Xiao, Mingyan
    Jin, Wenqiang
    Li, Ming
    Yang, Lei
    Thapa, Arun
    Li, Pan
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2023, 22 (01) : 129 - 144
  • [24] Collusion-Resistant Processing of SQL Range Predicates
    Kesarwani, Manish
    Kaul, Akshar
    Singh, Gagandeep
    Deshpande, Prasad M.
    Haritsa, Jayant R.
    DATABASE SYSTEMS FOR ADVANCED APPLICATIONS (DASFAA 2018), PT II, 2018, 10828 : 211 - 227
  • [25] Collusion-resistant fingerprinting for compressed multimedia signals
    Varna, Avinash L.
    He, Shan
    Swaminathan, Ashwin
    Wu, Min
    Lu, Haiming
    Lu, Zengxiang
    2007 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOL II, PTS 1-3, 2007, : 165 - +
  • [26] A collusion-resistant certificateless provable data possession scheme for shared data with user revocation
    Guang Yang
    Lidong Han
    Jingguo Bi
    Fuqun Wang
    Cluster Computing, 2024, 27 : 2165 - 2179
  • [27] A high collusion-resistant approach to distributed privacy-preserving data mining
    Urabe, Shintaro
    Wang, Jiahong
    Kodama, Eiichiro
    Takata, Toyoo
    PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING AND NETWORKS, 2007, : 326 - +
  • [28] Collusion-resistant video fingerprinting for large user group
    He, Shan
    Wu, Min
    2006 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, ICIP 2006, PROCEEDINGS, 2006, : 2301 - +
  • [29] A collusion-resistant dynamic key management scheme for WSNs
    Zhan, Furui
    Yao, Nianmin
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 6351 - 6364
  • [30] An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata
    Kieseberg, Peter
    Schrittwieser, Sebastian
    Mulazzani, Martin
    Echizen, Isao
    Weippl, Edgar
    ELECTRONIC MARKETS, 2014, 24 (02) : 113 - 124