Asynchronous privacy-preserving iterative computation on peer-to-peer networks

被引:0
|
作者
J. A. M. Naranjo
L. G. Casado
Márk Jelasity
机构
[1] University of Almería,Department of Computer Architecture and Electronics
[2] University of Szeged,undefined
[3] and Hungarian Academy of Sciences,undefined
[4] Research Group on AI,undefined
来源
Computing | 2012年 / 94卷
关键词
Asynchrony; Churn; Power iteration; Privacy preservation; P2P; 94A62; 68M14; 68M15;
D O I
暂无
中图分类号
学科分类号
摘要
Privacy preserving algorithms allow several participants to compute a global function collaboratively without revealing local information to each other. Examples of applications include trust management, collaborative filtering, and ranking algorithms such as PageRank. Most solutions that can be proven to be privacy preserving theoretically are not appropriate for highly unreliable, large scale, distributed environments such as peer-to-peer (P2P) networks because they either require centralized components, or a high degree of synchronism among the participants. At the same time, in P2P networks privacy preservation is becoming a key requirement. Here, we propose an asynchronous privacy preserving communication layer for an important class of iterative computations in P2P networks, where each peer periodically computes a linear combination of data stored at its neighbors. Our algorithm tolerates realistic rates of message drop and delay, and node churn, and has a low communication overhead. We perform simulation experiments to compare our algorithm to related work. The problem we use as an example is power iteration (a method used to calculate the dominant eigenvector of a matrix), since eigenvector computation is at the core of several practical applications. We demonstrate that our novel algorithm also converges in the presence of realistic node churn, message drop rates and message delay, even when previous synchronized solutions are able to make almost no progress.
引用
收藏
页码:763 / 782
页数:19
相关论文
共 50 条
  • [1] Asynchronous privacy-preserving iterative computation on peer-to-peer networks
    Naranjo, J. A. M.
    Casado, L. G.
    Jelasity, Mark
    COMPUTING, 2012, 94 (8-10) : 763 - 782
  • [2] Secure and user privacy-preserving searching in peer-to-peer networks
    Sen, Jaydip
    LOGIC JOURNAL OF THE IGPL, 2013, 21 (04) : 603 - 629
  • [3] PPC: Privacy-preserving Chatting in Vehicular Peer-to-peer Networks
    Liang, Xiaohui
    Lu, Rongxing
    Lin, Xiaodong
    Shen, Xuemin
    2010 IEEE 72ND VEHICULAR TECHNOLOGY CONFERENCE FALL, 2010,
  • [4] Statistical privacy-preserving message broadcast for peer-to-peer networks
    Moedinger, David
    Lorenz, Jan-Hendrik
    Hauck, Franz J.
    PLOS ONE, 2021, 16 (05):
  • [5] Building a Privacy-Preserving Semantic Overlay for Peer-to-Peer Networks
    Zeilemaker, Niels
    Erkin, Zekeriya
    Palmieri, Paolo
    Pouwelse, Johan
    PROCEEDINGS OF THE 2013 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS'13), 2013, : 79 - 84
  • [6] Privacy-Preserving Computation for Peer-to-Peer Energy Trading on a Public Blockchain
    Mitrea, Dan
    Cioara, Tudor
    Anghel, Ionut
    SENSORS, 2023, 23 (10)
  • [7] Lightweight Privacy-Preserving Peer-to-Peer Data Integration
    Zhang, Ye
    Wong, Wai-Kit
    Yiu, S. M.
    Mamoulis, Nikos
    Cheung, David W.
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2013, 6 (03): : 157 - 168
  • [8] Privacy-preserving k-means clustering with local synchronization in peer-to-peer networks
    Zhu, Youwen
    Li, Xingxin
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (06) : 2272 - 2284
  • [9] Privacy-preserving k-means clustering with local synchronization in peer-to-peer networks
    Youwen Zhu
    Xingxin Li
    Peer-to-Peer Networking and Applications, 2020, 13 : 2272 - 2284
  • [10] Design of a privacy-preserving algorithm for peer-to-peer network based on differential privacy
    Yu J.
    Ingenierie des Systemes d'Information, 2019, 24 (04): : 433 - 437