Collusion-Resistant Anonymous Data Collection Method

被引:0
|
作者
Ashrafi, Mafruz Zaman
Ng, See Kiong
机构
关键词
Privacy; Anonymity; Data Mining;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The availability and the accuracy of the data dictate the success of a data mining application. Increasingly, there is a need to resort to on-line data collection to address the problem of data availability. However, participants in online data collection applications are naturally distrustful of the data collector as well as their peer respondents, resulting in inaccurate data collected as the respondents refuse to provide truthful data in fear of collusion attacks. The current anonymity-preserving solutions for on-line data collection are unable to adequately resist such attacks in a scalable fashion. In this paper, we present an efficient anonymous data collection protocol for a malicious environment such as the Internet. The protocol employs cryptographic and random shuffling techniques to preserve participants' anonymity. The proposed method is collusion-resistant and guarantees that an attacker will be unable to breach an honest participant's anonymity unless she controls all N-1 participants. In addition, our method is efficient and achieved 15-42% communication overhead reduction in comparison to the prior state-of-the-art methods.
引用
收藏
页码:69 / 77
页数:9
相关论文
共 50 条
  • [1] Collusion-resistant fingerprinting for multimedia
    Trappe, W
    Wu, M
    Liu, KR
    [J]. 2002 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS I-IV, PROCEEDINGS, 2002, : 3309 - 3312
  • [2] Data hiding in curves for collusion-resistant digital fingerprinting
    Gou, HM
    Wu, M
    [J]. ICIP: 2004 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1- 5, 2004, : 51 - 54
  • [3] Secure and collusion-resistant data aggregation from convertible tags
    Leontiadis, Iraklis
    Li, Ming
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2021, 20 (01) : 1 - 20
  • [4] Secure and collusion-resistant data aggregation from convertible tags
    Iraklis Leontiadis
    Ming Li
    [J]. International Journal of Information Security, 2021, 20 : 1 - 20
  • [5] A collusion-resistant video watermarking scheme
    Houmansadr, Amir
    Ghaemmaghami, Shahrokh
    [J]. INFORMATION HIDING, 2007, 4437 : 343 - +
  • [6] Collusion-resistant dynamic fingerprinting for multimedia
    He, Shan
    Wu, Min
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOL II, PTS 1-3, 2007, : 289 - +
  • [7] Optimal Collusion-Resistant Mechanisms with Verification
    Penna, Paolo
    Ventre, Carmine
    [J]. 10TH ACM CONFERENCE ON ELECTRONIC COMMERCE - EC 2009, 2009, : 147 - 156
  • [8] Optimal collusion-resistant mechanisms with verification
    Penna, Paolo
    Ventre, Carmine
    [J]. GAMES AND ECONOMIC BEHAVIOR, 2014, 86 : 491 - 509
  • [9] Collusion-Resistant Functional Encryption for RAMs
    Ananth, Prabhanjan
    Chung, Kai-Min
    Fan, Xiong
    Qian, Luowen
    [J]. ADVANCES IN CRYPTOLOGY- ASIACRYPT 2022, PT I, 2022, 13791 : 160 - 194
  • [10] A note on the limits of collusion-resistant watermarks
    Ergun, F
    Kilian, J
    Kumar, R
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT'99, 1999, 1592 : 140 - 149