PRIVACY PRESERVING DISTANCE COMPUTATION USING SOMEWHAT-TRUSTED THIRD PARTIES

被引:0
|
作者
Jimenez, Abelino [1 ]
Raj, Bhiksha [1 ]
机构
[1] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
关键词
Secure Distance Computation; Information-theoretic Privacy; Locality Sensitive Hashing;
D O I
暂无
中图分类号
O42 [声学];
学科分类号
070206 ; 082403 ;
摘要
A critically important component of most signal processing procedures is that of computing the distance between signals. In multiparty processing applications where these signals belong to different parties, this introduces privacy challenges. The signals may themselves be private, and the parties to the computation may not be willing to expose them. Solutions proposed to the problem in the literature generally invoke homomorphic encryption schemes, secure multi-party computation, or other cryptographic methods which introduce significant computational complexity into the proceedings, often to the point of making more complex computations requiring repeated computations unfeasible. Other solutions invoke third parties, making unrealistic assumptions about their trustworthiness. In this paper we propose an alternate approach, also based on third party computation, but without assuming as much trust in the third party. Individual participants to the computation "secure" their data through a proposed secure hashing scheme with shared keys, prior to sharing it with the third party. The hashing ensures that the third party cannot recover any information about the individual signals or their statistics, either from analysis of individual computations or their long-term aggregate patterns. We provide theoretical proof of these properties and empirical demonstration of the feasibility of the computation.
引用
收藏
页码:6399 / 6403
页数:5
相关论文
共 50 条
  • [41] Privacy Preservation of Stream Data Patterns Using Offset and Trusted Third Party Computation in Retail-Shop Market Basket Analysis
    Keshavamurthy, B. N.
    Toshniwal, Durga
    [J]. ADVANCED COMPUTING, PT III, 2011, 133 : 358 - 366
  • [42] Attack on "A Privacy-Preserving Online Ride-Hailing System Without Involving a Third Trusted Server"
    Vivek, Srinivas
    [J]. 18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,
  • [43] A conditional privacy-preserving fair electronic payment scheme based on blockchain without trusted third party
    Zahra Hatefi
    Majid Bayat
    Mahdi R. Alaghband
    Negin Hamian
    Seyed Morteza Pournaghi
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2023, 14 : 10089 - 10102
  • [44] Privacy Preserving Association Rule Mining in Horizontally Partitioned Databases Without Involving Trusted Third Party (TTP)
    Modi, Chirag N.
    Patil, Ashwini R.
    [J]. PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND INFORMATICS, ICACNI 2015, VOL 2, 2016, 44 : 549 - 555
  • [45] A Framework for Privacy-Preserving Genomic Data Analysis Using Trusted Execution Environments
    Asvadishirehjini, Aref
    Kantarcioglu, Murat
    Malin, Bradley
    [J]. 2020 SECOND IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2020), 2020, : 138 - 147
  • [46] DarKnight: An Accelerated Framework for Privacy and Integrity Preserving Deep Learning Using Trusted Hardware
    Hashemi, Hanieh
    Wang, Yongqin
    Annavaram, Murali
    [J]. PROCEEDINGS OF 54TH ANNUAL IEEE/ACM INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE, MICRO 2021, 2021, : 212 - 224
  • [47] Web Application for Privacy-preserving Scheduling using Secure Computation
    Kiss, Agnes
    Schick, Oliver
    Schneider, Thomas
    [J]. PROCEEDINGS OF THE 16TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS, VOL 2: SECRYPT, 2019, : 456 - 463
  • [48] Privacy preserving cloud computation using Domingo-Ferrer scheme
    Alabdulatif, Abdulatif
    Kaosar, Mohammed
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2016, 28 (01) : 27 - 36
  • [49] Privacy-Preserving Biometric Identification Using Secure Multiparty Computation
    Bringer, Julien
    Chabanne, Herve
    Patey, Alain
    [J]. IEEE SIGNAL PROCESSING MAGAZINE, 2013, 30 (02) : 42 - 52
  • [50] Privacy Preserving Computation in Cloud Using Reusable Garbled Oblivious RAMs
    Wang, Yongge
    Malluhi, Qutaibah M.
    [J]. INFORMATION SECURITY, ISC 2022, 2022, 13640 : 3 - 19