Collusion-Resistant Anonymous Data Collection Method

被引:0
|
作者
Ashrafi, Mafruz Zaman
Ng, See Kiong
机构
关键词
Privacy; Anonymity; Data Mining;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The availability and the accuracy of the data dictate the success of a data mining application. Increasingly, there is a need to resort to on-line data collection to address the problem of data availability. However, participants in online data collection applications are naturally distrustful of the data collector as well as their peer respondents, resulting in inaccurate data collected as the respondents refuse to provide truthful data in fear of collusion attacks. The current anonymity-preserving solutions for on-line data collection are unable to adequately resist such attacks in a scalable fashion. In this paper, we present an efficient anonymous data collection protocol for a malicious environment such as the Internet. The protocol employs cryptographic and random shuffling techniques to preserve participants' anonymity. The proposed method is collusion-resistant and guarantees that an attacker will be unable to breach an honest participant's anonymity unless she controls all N-1 participants. In addition, our method is efficient and achieved 15-42% communication overhead reduction in comparison to the prior state-of-the-art methods.
引用
收藏
页码:69 / 77
页数:9
相关论文
共 50 条
  • [41] Collusion-Resistant Mechanisms with Verification Yielding Optimal Solutions
    Penna, Paolo
    Ventre, Carmine
    [J]. ACM TRANSACTIONS ON COMPUTATION THEORY, 2012, 4 (02)
  • [42] Security Analysis of Collusion-Resistant Nearest Neighbor Query Scheme on Encrypted Cloud Data
    Zhu, Youwen
    Takagi, Tsuyoshi
    Hu, Rong
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2014, E97D (02): : 326 - 330
  • [43] Collusion-resistant dynamic spectrum resource renting and offering mechanism
    Liu, Ying-Ting
    Liu, Xin
    Li, Zan
    Zhang, Hai-Lin
    [J]. Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 2011, 41 (05): : 1497 - 1502
  • [44] Collusion-Resistant Jamming for Securing Legacy Clients in Wireless Networks
    Xie, Dianhan
    Mao, Wenguang
    Tang, Aimin
    Wang, Xudong
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2020, 19 (10) : 2264 - 2277
  • [45] Certified Everlasting Secure Collusion-Resistant Functional Encryption, and More
    Hiroka, Taiga
    Kitagawa, Fuyuki
    Morimae, Tomoyuki
    Nishimaki, Ryo
    Pal, Tapas
    Yamakawa, Takashi
    [J]. ADVANCES IN CRYPTOLOGY, PT III, EUROCRYPT 2024, 2024, 14653 : 434 - 456
  • [46] Collusion-Resistant Query Anonymization for Location-Based Services
    Zhang, Qin
    Lazos, Loukas
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 768 - 774
  • [47] Collusion-resistant and privacy-preserving data sharing scheme on outsourced data in e-healthcare system
    Maurya, Chanchal
    Chaurasiya, Vijay Kumar
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (26) : 40443 - 40472
  • [48] Fully collusion-resistant traitor tracing scheme with shorter ciphertexts
    Jong Hwan Park
    Dong Hoon Lee
    [J]. Designs, Codes and Cryptography, 2011, 60 : 255 - 276
  • [49] Collusion-resistant fingerprinting based on OFDM-IDMA modulation
    Lin, Pei
    He, Qianhua
    Li, Yanxiong
    [J]. ELECTRONICS LETTERS, 2013, 49 (03) : 225 - 226
  • [50] Design of Collusion-Resistant Fingerprinting Systems: Review and New Results
    Kuo, C. -C. Jay
    [J]. DIGITAL WATERMARKING, 2009, 5450 : 469 - 469