PRISM: Private Verifiable Set Computation over Multi-Owner Outsourced Databases

被引:11
|
作者
Li, Yin [1 ]
Ghosh, Dhrubajyoti [2 ]
Gupta, Peeyush [2 ]
Mehrotra, Sharad [2 ]
Panwar, Nisha [3 ]
Sharma, Shantanu [2 ]
机构
[1] Dongguan Univ Technol, Dongguan, Guangdong, Peoples R China
[2] Univ Calif Irvine, Irvine, CA 92697 USA
[3] Augusta Univ, Augusta, GA USA
关键词
D O I
10.1145/3448016.3452839
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes PRISM, a secret sharing based approach to compute private set operations (i.e., intersection and union), as well as aggregates over outsourced databases belonging to multiple owners. PRISM enables data owners to pre-load the data onto non-colluding servers and exploits the additive and multiplicative properties of secret-shares to compute the above-listed operations in (at most) two rounds of communication between the servers (storing the secret-shares) and the querier, resulting in a very efficient implementation. Also, PRISM does not require communication among the servers and supports result verification techniques for each operation to detect malicious adversaries. Experimental results show that PRISM scales both in terms of the number of data owners and database sizes, to which prior approaches do not scale.
引用
收藏
页码:1116 / 1128
页数:13
相关论文
共 43 条
  • [1] Verifiable Set Operations over Outsourced Databases
    Canetti, Ran
    Paneth, Omer
    Papadopoulos, Dimitrios
    Triandopoulos, Nikos
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2014, 2014, 8383 : 113 - 130
  • [2] Verifiable outsourced computation over encrypted data
    Yu, Xixun
    Yan, Zheng
    Zhang, Rui
    [J]. INFORMATION SCIENCES, 2019, 479 : 372 - 385
  • [3] VKSE-MO: verifiable keyword search over encrypted data in multi-owner settings
    Miao, Yinbin
    Ma, Jianfeng
    Liu, Ximeng
    Zhang, Junwei
    Liu, Zhiquan
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2017, 60 (12)
  • [4] VKSE-MO: verifiable keyword search over encrypted data in multi-owner settings
    Yinbin MIAO
    Jianfeng MA
    Ximeng LIU
    Junwei ZHANG
    Zhiquan LIU
    [J]. Science China(Information Sciences), 2017, 60 (12) : 192 - 206
  • [5] Tag-Based Verifiable Delegated Set Intersection Over Outsourced Private Datasets
    Wang, Qiang
    Zhou, Fucai
    Xu, Jian
    Peng, Su
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (02) : 1201 - 1214
  • [6] Optimized verifiable delegated private set intersection on outsourced private datasets
    Jiang, Guangshang
    Zhang, Hanlin
    Lin, Jie
    Kong, Fanyu
    Yu, Leyun
    [J]. COMPUTERS & SECURITY, 2024, 141
  • [7] Verifiable Attribute-Based Multi-Keyword Search over Encrypted Cloud Data in Multi-Owner Setting
    Fan, Yaqing
    Liu, Zhenhua
    [J]. 2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 441 - 449
  • [8] Secure and Verifiable Multi-owner Ranked-Keyword Search in Cloud Computing
    Li, Jinguo
    Lin, Yaping
    Wen, Mi
    Gu, Chunhua
    Yin, Bo
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, 2015, 9204 : 325 - 334
  • [9] Verifiable Privacy-Preserving Image Retrieval in Multi-Owner Multi-User Settings
    Khan, Shahzad
    Abbas, Haider
    Iqbal, Waseem
    [J]. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE, 2024, 8 (02): : 1640 - 1655
  • [10] Multi-Client Verifiable Computation Service for Outsourced Data
    Wu, Ying
    Zhang, Rui
    Xue, Rui
    Liu, Ling
    [J]. 2017 IEEE 24TH INTERNATIONAL CONFERENCE ON WEB SERVICES (ICWS 2017), 2017, : 556 - 563