Communication-Efficient and Privacy-Preserving Protocol for Computing Over-Threshold Set-Union

被引:0
|
作者
Gong, Xuhui
Hua, Qiang-sheng [1 ]
Jin, Hai
机构
[1] Huazhong Univ Sci & Technol, Natl Engn Res Ctr Big Data Technol & Syst, Sch Comp Sci & Technol, Serv Comp Technol, Wuhan 430074, Peoples R China
基金
中国国家自然科学基金;
关键词
Over-threshold set-union; Data aggregation; Secure multi-party computation; Privacy;
D O I
10.1007/978-3-030-59016-1_11
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a variety of applications, the data items of multiple participants are collected and analyzed, and meanwhile the participants' privacy needs to be protected. This paper studies an over-threshold data aggregation problem, i.e., over-threshold set-union. In our model, we assume there are n participants, an untrusted data aggregator and a proxy, and each participant has a sensitive data item. The over-threshold set-union is normally defined as follows: given a threshold t, the aggregator only learns the data items which appear at least t times in the union of data items of all participants without learning anything else. Existing solutions either suffer from high communication cost or leak the multiplicity information of data items. In order to handle this defect, we present an efficient protocol in the honest-but-curious model by leveraging threshold secret sharing and dual pairing vector spaces. We prove that the proposed protocol not only has O(n log(2) n) communication complexity which nearly matches the lower bound Omega(n/ log n) but also protects the data privacy.
引用
收藏
页码:121 / 133
页数:13
相关论文
共 50 条
  • [31] A Dynamic Efficient Protocol Secure for Privacy-Preserving Communication-Based VANET
    Mekonnen, Wubishet Girma
    Hailu, Tegegne Ayalew
    Tamene, Melaku
    Karthika, P.
    COMPUTATIONAL INTELLIGENCE IN PATTERN RECOGNITION, CIPR 2020, 2020, 1120 : 383 - 393
  • [32] An efficient privacy-preserving rank query over encrypted data in cloud computing
    Cheng, Fang-Quan
    Peng, Zhi-Yong
    Song, Wei
    Wang, Shu-Lin
    Cui, Yi-Hui
    Jisuanji Xuebao/Chinese Journal of Computers, 2012, 35 (11): : 2215 - 2227
  • [33] Efficient Privacy-Preserving Range Queries over Encrypted Data in Cloud Computing
    Samanthula, Bharath K.
    Jiang, Wei
    2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2013), 2013, : 51 - 58
  • [34] Achieving Efficient and Privacy-Preserving Set Containment Search Over Encrypted Data
    Zheng, Yandong
    Lu, Rongxing
    Guan, Yunguo
    Shao, Jun
    Zhu, Hui
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (05) : 2604 - 2618
  • [35] Computing Betweenness Centrality: An Efficient Privacy-Preserving Approach
    Kukkala, Varsha Bhat
    Iyengar, S. R. S.
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2018, 2018, 11124 : 23 - 42
  • [36] Efficient Privacy-Preserving Biometric Identification in Cloud Computing
    Yuan, Jiawei
    Yu, Shucheng
    2013 PROCEEDINGS IEEE INFOCOM, 2013, : 2652 - 2660
  • [37] An Efficient Privacy-Preserving Localization Algorithm for Pervasive Computing
    Wang, Guanghui
    Pan, Jianping
    He, Jianping
    Shen, Subin
    2017 26TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN 2017), 2017,
  • [38] Efficient and Secure Protocols for Privacy-Preserving Set Operations
    Sang, Yingpeng
    Shen, Hong
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2009, 13 (01)
  • [39] An efficient privacy-preserving localization algorithm for pervasive computing
    Wang, Guanghui
    Pan, Jianping
    He, Jianping
    Shen, Subin
    2017 26th International Conference on Computer Communications and Networks, ICCCN 2017, 2017,
  • [40] DPCrowd: Privacy-Preserving and Communication-Efficient Decentralized Statistical Estimation for Real-Time Crowdsourced Data
    Ren, Xuebin
    Yu, Chia-Mu
    Yu, Wei
    Yang, Xinyu
    Zhao, Jun
    Yang, Shusen
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (04): : 2775 - 2791