PRIVACY PRESERVING DISTANCE COMPUTATION USING SOMEWHAT-TRUSTED THIRD PARTIES

被引:0
|
作者
Jimenez, Abelino [1 ]
Raj, Bhiksha [1 ]
机构
[1] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
关键词
Secure Distance Computation; Information-theoretic Privacy; Locality Sensitive Hashing;
D O I
暂无
中图分类号
O42 [声学];
学科分类号
070206 ; 082403 ;
摘要
A critically important component of most signal processing procedures is that of computing the distance between signals. In multiparty processing applications where these signals belong to different parties, this introduces privacy challenges. The signals may themselves be private, and the parties to the computation may not be willing to expose them. Solutions proposed to the problem in the literature generally invoke homomorphic encryption schemes, secure multi-party computation, or other cryptographic methods which introduce significant computational complexity into the proceedings, often to the point of making more complex computations requiring repeated computations unfeasible. Other solutions invoke third parties, making unrealistic assumptions about their trustworthiness. In this paper we propose an alternate approach, also based on third party computation, but without assuming as much trust in the third party. Individual participants to the computation "secure" their data through a proposed secure hashing scheme with shared keys, prior to sharing it with the third party. The hashing ensures that the third party cannot recover any information about the individual signals or their statistics, either from analysis of individual computations or their long-term aggregate patterns. We provide theoretical proof of these properties and empirical demonstration of the feasibility of the computation.
引用
收藏
页码:6399 / 6403
页数:5
相关论文
共 50 条
  • [1] A PRIVACY PRESERVING CONTENT DISTRIBUTION MECHANISM FOR DRM WITHOUT TRUSTED THIRD PARTIES
    Win, Lei Lei
    Thomas, Tony
    Emmanuel, Sabu
    [J]. 2011 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO (ICME), 2011,
  • [2] Privacy Preserving Naive Bayes Classification Using Trusted Third Party Computation over Distributed Progressive Databases
    Keshavamurthy, B. N.
    Toshniwal, Durga
    [J]. ADVANCES IN COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, PT I, 2011, 131 : 24 - 32
  • [3] An Effective Privacy-Preserving and Enhanced Dummy Location Scheme for Semi-trusted Third Parties
    Zuo, Meijing
    Peng, Luyao
    Song, Jun
    [J]. WEB AND BIG DATA, PT II, APWEB-WAIM 2023, 2024, 14332 : 193 - 208
  • [4] Privacy-Preserving Naive Bayes Classification Using Trusted Third Party and Offset Computation over Distributed Databases
    Keshavamurthy, B. N.
    Sharma, Mitesh
    Toshniwal, Durga
    [J]. INFORMATION AND COMMUNICATION TECHNOLOGIES, 2010, 101 : 529 - 534
  • [5] A Lattice-Based Approach to Privacy-Preserving Biometric Authentication Without Relying on Trusted Third Parties
    Dinh, Trung
    Steinfeld, Ron
    Bhattacharjee, Nandita
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2017, 2017, 10701 : 297 - 319
  • [6] Privacy-Preserving Data Analysis without Trusted Third Party
    Miyaji, Atsuko
    Takahashi, Tomoka
    Wang, Ping-Lun
    Yamatsuki, Tatsuhiro
    Mimoto, Tomoaki
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 710 - 717
  • [7] Privacy Preserving Probabilistic Record Linkage Without Trusted Third Party
    Lazrig, Ibrahim
    Ong, Toan C.
    Ray, Indrajit
    Ray, Indrakshi
    Jiang, Xiaoqian
    Vaidya, Jaideep
    [J]. 2018 16TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2018, : 75 - 84
  • [8] Brief Announcement: Privacy Preserving Mining of Distributed Data Using a Trusted and Partitioned Third Party
    Maoz, Nir
    Gudes, Ehud
    [J]. CYBER SECURITY CRYPTOGRAPHY AND MACHINE LEARNING (CSCML 2017), 2017, 10332 : 193 - 195
  • [9] PRIVACY-PRESERVING SMART METERING WITHOUT A TRUSTED-THIRD-PARTY
    Jeske, Tobias
    [J]. SECRYPT 2011: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2011, : 114 - 123
  • [10] Faster Privacy-Preserving Computation of Edit Distance with Moves
    Yoshimoto, Yohei
    Kataoka, Masaharu
    Takabatake, Yoshimasa
    Tomohiro, I
    Shin, Kilho
    Sakamoto, Hiroshi
    [J]. WALCOM: ALGORITHMS AND COMPUTATION (WALCOM 2020), 2020, 12049 : 308 - 320