SlideShare a Scribd company logo
1 of 7
Download to read offline
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM
AND PRODUCT CALCULATION WITHOUT SECURE CHANNEL
ABSTRACT
Much research has been conducted to securely outsource multiple parties’ data
aggregation to an untrusted aggregator without disclosing each individual’s privately owned
data, or to enable multiple parties to jointly aggregate their data while preserving privacy.
However, those works either require secure pair-wise communication channels or suffer from
high complexity. In this paper, we consider how an external aggregator or multiple parties can
learn some algebraic statistics (e.g., sum, product) over participants’ privately owned data while
preserving the data privacy. We assume all channels are subject to eavesdropping attacks, and all
the communications throughout the aggregation are open to others. We first propose several
protocols that successfully guarantee data privacy under semi-honest model, and then present
advanced protocols which tolerate up to k passive adversaries who do not try to tamper the
computation. Under this weak assumption, we limit both the communication and computation
complexity of each participant to a small constant. At the end, we present applications which
solve several interesting problems via our protocols.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
EXISTING SYSTEM:
Many novel protocols have been proposed for privacy-preserving data aggregation or in
general secure multi-party computation. Castelluccia et al. presented a provable secure and
efficient aggregation of encrypted data in WSN which is extended from. They designed a
symmetric key homomorphism encryption scheme which is additively homomorphism to
conduct the aggregation operations on the cipher texts. Their scheme uses modular addition, so
the scheme is good for CPU-bounded devices such as sensor nodes in WSN. Their scheme can
also efficiently compute various statistical values such as mean, variance and deviation.
However, since they used the symmetric homomorphism encryption, their aggregator can
decrypt each individual sensor’s data, and they assumed the trusted aggregator in their model.
Sheikh et al. proposed a k-secure sum protocol, which is motivated by the work of Clifton et al. .
They significantly reduced the probability of data leakage by segmenting the data block of
individual party, and distributing segments to other parties. Here, sum of each party’s segments
is his data, therefore the final sum of all segments are sum of all parties’ data. This scheme can
be easily converted to k-secure product protocol by converting each addition to multiplication.
However, pair-wise unique secure communication channels should be given between each pair
of users such that only the receiver and the sender know the transmitted segment. Otherwise,
each party’s secret data can be calculated by performing Oaks computations. In this paper, we
remove the limitation of using secure communication channels.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
PROPOSED SYSTEM:
The main contributions of this paper are:
1) Formulation of a model without secure channel or trusted center. Different from many
other models in privacy preserving data aggregation problem, our model does not require
a secure communication channel nor a trusted central key issuer.
2) Efficient protocol in linear time. The total communication and computation complexity
of our work is proportional to the number of participants n, while the complexities of
many similar works are proportional to n2. We do not use complicated encryption
protocols, which makes our system much faster than other proposed systems.
3) Secure sum and product calculation. We generalize the privacy-preserving data
aggregation to multivariate sum and product calculation whose inputs are jointly
provided by multiple parties. That is, our scheme enables multiple parties to securely
compute
4) Tolerate up to k collusive adversaries. Our protocol is robust against up to k colluding
passive adversaries who do not try to tamper the computation.
Module 1
Security Model
First, we assume that all the communication channels in our protocol are insecure.
Anyone can eavesdrop them to intercept the data being transferred. To address the challenges of
insecure communication channel, we assume that the following CDH problem is computationally
intractable, i.e., any probabilistic polynomial time adversary (PPTA) has negligible chance to
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
solve the following problem: Definition 1 (CDH Problem in G). The Computational Diffie-
Hellman problem in a multiplicative group G with generator g is defined as follows: given only
g; ga; gb 2 G where a; b 2 Z, compute gab without knowing a or b. Definition 2 (DDH Problem
in G). The Decisional Diffie- Hellman problem in a multiplicative group G with generator g is
defined as follows: given only g; ga; gb; gc 2 G where a; b; c 2 Z, decide if gab ¼ gc. Informally,
we say our calculation is CDH-secure in G if illegally inferring an honest participant’s private
value during our calculation is at least as hard as CDH problem in G.
Module 2
Achieving sum and product under secure Channel
Before introducing our aggregation scheme without secure communication channel, we
first describe the basic idea of randomized secure sum calculation under secured communication
channel (It can be trivially converted to secure product calculation). The basic idea came from
Clifton et al. which is also reviewed, but we found their setting imposed unnecessary
communication overhead, and we reduced it while maintaining the same security level. Assume
participants p1; p2; . . . ; pn are arranged in a ring for computation purpose. Each participant pi
itself breaks its privately owned data block xi into k segments si;j such that the sum of all k
segments is equal to the value of the data block. The value of each segment is randomly decided.
For sum, we can simply assign random values to segments silt (1 _ j _ k _ 1) and let silk ¼ xi _
Pk_1 j¼1 si;j. Similar method can be used for product. In this scheme, each participant randomly
selects k _ 1 participants and transmit each of those participants a distinctive segment si;j. Thus
at the end of this redistribution each of participants holds several segments within which one
segment belongs to itself and the rest belongs to some other participants. The receiving
participant adds all its received segments and transmits its result to the next participant in the
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
ring. This process is repeated until all the segments of all the participants are added and the sum
is announced by the aggregator.
Module 3
Sum and product calculation without Secure channel
In this section, we first present two novel calculation protocols for each model which
calculate sum and product while preserving each participant’s data privacy against semihonest
adversaries who follow the protocol specification and do not collude with anyone. Then, we
show how to defend against passive adversaries who may adaptively choose their secret
parameters based on others’ public parameters and collude with each other.
Product Protocol—Participants Only Model
In this model, the participants want to jointly compute the value with their privately known
values where p is a large prime. The basic idea of our protocol is to find some random integers
such that and the user pi can compute the random number Ri easily while it is computationally
expensive for other participants to compute the value Ri. Our protocol for privacy preserving
product calculation Q i xi is composed of the following three algorithms: Setup, Encrypt,
Product.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
Product Protocol—One Aggregator Model
The product calculation in the One Aggregater Model is similar to the protocol above,
except that the aggregator A acts as the ðn þ 1Þth participant pnþ1. The second difference is that,
each participant pi will send the ciphertext Ci to the aggregator, instead of broadcasting to all
participants. However, since our communication channel is insecure, this is essentially the
broadcast from the adversary’s perspective. The last difference is that the aggregator A will not
announce its random number to any other participant. Each participant sends the ciphertext to
the aggregator A. The aggregator A then calculates to achieve the final product, where Rnþ1 is
kept secret to any participant.
Sum Protocol—Participants Only Model
Now, we present how to let n participants jointly compute xi given their privately known
values xi 2 G1. It seems we can exploit the aforementioned method in produPct calculation by
finding random numbers Ri such that but we found it is challenging to let participants
independently achieve such numbers. The previous method was secure because of the hardness
of the discrete logarithm, but the same analogue does not exist in the additions. The basic idea of
this protocol is to convert the sum of numbers into product of numbers. Previous solution [11]
essentially applied this approach also by computing the product and finding by computing the
discrete logarithm of the product. As discrete logarithm is computationally expensive, we will
not adopt this method. Instead, we propose a computationally efficient method here.
CONCLUSION
In this paper, we successfully achieve privacy-preserving sum and product calculation
protocols without secure communication channels or trusted key issuers. We allow up to k
(adjustable parameter) collusive participants who will not tamper the computation but try to
manipulate their parameters to infer others’ private values. We formally analyzed the security of
our protocols and showed that the protocols are secure if the CDH problem is assumed to be
intractable, and we also showed with implementation that the protocols are efficient to be
applicable in real life. At the end, we propose numerous applications that are achieved from our
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
protocols. One of our future works is to design privacy preserving data releasing protocols such
that general function of data can be evaluated correctly while preserving individuals’ data
privacy.

More Related Content

Viewers also liked

RavisankarSamynathan_ASP_Dot_Net_MVC_and_Silverlight_Technology
RavisankarSamynathan_ASP_Dot_Net_MVC_and_Silverlight_TechnologyRavisankarSamynathan_ASP_Dot_Net_MVC_and_Silverlight_Technology
RavisankarSamynathan_ASP_Dot_Net_MVC_and_Silverlight_TechnologyRavisankar Samynathan
 
1.ต่อจากคู่มือ
1.ต่อจากคู่มือ1.ต่อจากคู่มือ
1.ต่อจากคู่มือsripayom
 
An Introduction to Precision Growth Strategies
An Introduction to Precision Growth StrategiesAn Introduction to Precision Growth Strategies
An Introduction to Precision Growth StrategiesHoward P. Berkowitz
 
Marketing online: la nueva cara del Marketing - Fernando Maciá
Marketing online: la nueva cara del Marketing - Fernando MaciáMarketing online: la nueva cara del Marketing - Fernando Maciá
Marketing online: la nueva cara del Marketing - Fernando MaciáHuman Level
 
La historia detrás del festival: Tomorrowland
La historia detrás del festival: TomorrowlandLa historia detrás del festival: Tomorrowland
La historia detrás del festival: TomorrowlandItzelBonillaa
 
Book finished
Book finishedBook finished
Book finishedtoby96
 
Global retail theft barometer pētījuma rezultātu prezentācija
Global retail theft barometer pētījuma rezultātu prezentācijaGlobal retail theft barometer pētījuma rezultātu prezentācija
Global retail theft barometer pētījuma rezultātu prezentācijaStrongPoint
 

Viewers also liked (9)

RavisankarSamynathan_ASP_Dot_Net_MVC_and_Silverlight_Technology
RavisankarSamynathan_ASP_Dot_Net_MVC_and_Silverlight_TechnologyRavisankarSamynathan_ASP_Dot_Net_MVC_and_Silverlight_Technology
RavisankarSamynathan_ASP_Dot_Net_MVC_and_Silverlight_Technology
 
1.ต่อจากคู่มือ
1.ต่อจากคู่มือ1.ต่อจากคู่มือ
1.ต่อจากคู่มือ
 
Imants Ziedonis
Imants ZiedonisImants Ziedonis
Imants Ziedonis
 
An Introduction to Precision Growth Strategies
An Introduction to Precision Growth StrategiesAn Introduction to Precision Growth Strategies
An Introduction to Precision Growth Strategies
 
Marketing online: la nueva cara del Marketing - Fernando Maciá
Marketing online: la nueva cara del Marketing - Fernando MaciáMarketing online: la nueva cara del Marketing - Fernando Maciá
Marketing online: la nueva cara del Marketing - Fernando Maciá
 
La historia detrás del festival: Tomorrowland
La historia detrás del festival: TomorrowlandLa historia detrás del festival: Tomorrowland
La historia detrás del festival: Tomorrowland
 
Book finished
Book finishedBook finished
Book finished
 
Global retail theft barometer pētījuma rezultātu prezentācija
Global retail theft barometer pētījuma rezultātu prezentācijaGlobal retail theft barometer pētījuma rezultātu prezentācija
Global retail theft barometer pētījuma rezultātu prezentācija
 
Tomal Gaming New
Tomal Gaming NewTomal Gaming New
Tomal Gaming New
 

More from Shakas Technologies

A Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying DetectionA Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying DetectionShakas Technologies
 
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...Shakas Technologies
 
A Novel Framework for Credit Card.
A Novel Framework for Credit Card.A Novel Framework for Credit Card.
A Novel Framework for Credit Card.Shakas Technologies
 
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...Shakas Technologies
 
NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024Shakas Technologies
 
MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024Shakas Technologies
 
Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024Shakas Technologies
 
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...Shakas Technologies
 
E-COMMERCE PRICE NEGOTIATOR CHATBOT
E-COMMERCE PRICE NEGOTIATOR CHATBOTE-COMMERCE PRICE NEGOTIATOR CHATBOT
E-COMMERCE PRICE NEGOTIATOR CHATBOTShakas Technologies
 
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSECYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSEShakas Technologies
 
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...Shakas Technologies
 
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTIONCOMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTIONShakas Technologies
 
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCECO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCEShakas Technologies
 
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Shakas Technologies
 
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...Shakas Technologies
 
Optimal Ambulance Positioning for Road Accidents With Deep Embedded Clusterin...
Optimal Ambulance Positioning for Road Accidents With Deep Embedded Clusterin...Optimal Ambulance Positioning for Road Accidents With Deep Embedded Clusterin...
Optimal Ambulance Positioning for Road Accidents With Deep Embedded Clusterin...Shakas Technologies
 
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...Shakas Technologies
 
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...Shakas Technologies
 
Fighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxFighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxShakas Technologies
 
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...Shakas Technologies
 

More from Shakas Technologies (20)

A Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying DetectionA Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying Detection
 
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
 
A Novel Framework for Credit Card.
A Novel Framework for Credit Card.A Novel Framework for Credit Card.
A Novel Framework for Credit Card.
 
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
 
NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024
 
MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024
 
Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024
 
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
 
E-COMMERCE PRICE NEGOTIATOR CHATBOT
E-COMMERCE PRICE NEGOTIATOR CHATBOTE-COMMERCE PRICE NEGOTIATOR CHATBOT
E-COMMERCE PRICE NEGOTIATOR CHATBOT
 
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSECYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
 
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
 
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTIONCOMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
 
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCECO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
 
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
 
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
 
Optimal Ambulance Positioning for Road Accidents With Deep Embedded Clusterin...
Optimal Ambulance Positioning for Road Accidents With Deep Embedded Clusterin...Optimal Ambulance Positioning for Road Accidents With Deep Embedded Clusterin...
Optimal Ambulance Positioning for Road Accidents With Deep Embedded Clusterin...
 
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
 
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
 
Fighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxFighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docx
 
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
 

Recently uploaded

IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsSafe Software
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 

Recently uploaded (20)

IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 

Collusion tolerable privacy-preserving sum

  • 1. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SECURE CHANNEL ABSTRACT Much research has been conducted to securely outsource multiple parties’ data aggregation to an untrusted aggregator without disclosing each individual’s privately owned data, or to enable multiple parties to jointly aggregate their data while preserving privacy. However, those works either require secure pair-wise communication channels or suffer from high complexity. In this paper, we consider how an external aggregator or multiple parties can learn some algebraic statistics (e.g., sum, product) over participants’ privately owned data while preserving the data privacy. We assume all channels are subject to eavesdropping attacks, and all the communications throughout the aggregation are open to others. We first propose several protocols that successfully guarantee data privacy under semi-honest model, and then present advanced protocols which tolerate up to k passive adversaries who do not try to tamper the computation. Under this weak assumption, we limit both the communication and computation complexity of each participant to a small constant. At the end, we present applications which solve several interesting problems via our protocols.
  • 2. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com EXISTING SYSTEM: Many novel protocols have been proposed for privacy-preserving data aggregation or in general secure multi-party computation. Castelluccia et al. presented a provable secure and efficient aggregation of encrypted data in WSN which is extended from. They designed a symmetric key homomorphism encryption scheme which is additively homomorphism to conduct the aggregation operations on the cipher texts. Their scheme uses modular addition, so the scheme is good for CPU-bounded devices such as sensor nodes in WSN. Their scheme can also efficiently compute various statistical values such as mean, variance and deviation. However, since they used the symmetric homomorphism encryption, their aggregator can decrypt each individual sensor’s data, and they assumed the trusted aggregator in their model. Sheikh et al. proposed a k-secure sum protocol, which is motivated by the work of Clifton et al. . They significantly reduced the probability of data leakage by segmenting the data block of individual party, and distributing segments to other parties. Here, sum of each party’s segments is his data, therefore the final sum of all segments are sum of all parties’ data. This scheme can be easily converted to k-secure product protocol by converting each addition to multiplication. However, pair-wise unique secure communication channels should be given between each pair of users such that only the receiver and the sender know the transmitted segment. Otherwise, each party’s secret data can be calculated by performing Oaks computations. In this paper, we remove the limitation of using secure communication channels.
  • 3. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com PROPOSED SYSTEM: The main contributions of this paper are: 1) Formulation of a model without secure channel or trusted center. Different from many other models in privacy preserving data aggregation problem, our model does not require a secure communication channel nor a trusted central key issuer. 2) Efficient protocol in linear time. The total communication and computation complexity of our work is proportional to the number of participants n, while the complexities of many similar works are proportional to n2. We do not use complicated encryption protocols, which makes our system much faster than other proposed systems. 3) Secure sum and product calculation. We generalize the privacy-preserving data aggregation to multivariate sum and product calculation whose inputs are jointly provided by multiple parties. That is, our scheme enables multiple parties to securely compute 4) Tolerate up to k collusive adversaries. Our protocol is robust against up to k colluding passive adversaries who do not try to tamper the computation. Module 1 Security Model First, we assume that all the communication channels in our protocol are insecure. Anyone can eavesdrop them to intercept the data being transferred. To address the challenges of insecure communication channel, we assume that the following CDH problem is computationally intractable, i.e., any probabilistic polynomial time adversary (PPTA) has negligible chance to
  • 4. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com solve the following problem: Definition 1 (CDH Problem in G). The Computational Diffie- Hellman problem in a multiplicative group G with generator g is defined as follows: given only g; ga; gb 2 G where a; b 2 Z, compute gab without knowing a or b. Definition 2 (DDH Problem in G). The Decisional Diffie- Hellman problem in a multiplicative group G with generator g is defined as follows: given only g; ga; gb; gc 2 G where a; b; c 2 Z, decide if gab ¼ gc. Informally, we say our calculation is CDH-secure in G if illegally inferring an honest participant’s private value during our calculation is at least as hard as CDH problem in G. Module 2 Achieving sum and product under secure Channel Before introducing our aggregation scheme without secure communication channel, we first describe the basic idea of randomized secure sum calculation under secured communication channel (It can be trivially converted to secure product calculation). The basic idea came from Clifton et al. which is also reviewed, but we found their setting imposed unnecessary communication overhead, and we reduced it while maintaining the same security level. Assume participants p1; p2; . . . ; pn are arranged in a ring for computation purpose. Each participant pi itself breaks its privately owned data block xi into k segments si;j such that the sum of all k segments is equal to the value of the data block. The value of each segment is randomly decided. For sum, we can simply assign random values to segments silt (1 _ j _ k _ 1) and let silk ¼ xi _ Pk_1 j¼1 si;j. Similar method can be used for product. In this scheme, each participant randomly selects k _ 1 participants and transmit each of those participants a distinctive segment si;j. Thus at the end of this redistribution each of participants holds several segments within which one segment belongs to itself and the rest belongs to some other participants. The receiving participant adds all its received segments and transmits its result to the next participant in the
  • 5. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com ring. This process is repeated until all the segments of all the participants are added and the sum is announced by the aggregator. Module 3 Sum and product calculation without Secure channel In this section, we first present two novel calculation protocols for each model which calculate sum and product while preserving each participant’s data privacy against semihonest adversaries who follow the protocol specification and do not collude with anyone. Then, we show how to defend against passive adversaries who may adaptively choose their secret parameters based on others’ public parameters and collude with each other. Product Protocol—Participants Only Model In this model, the participants want to jointly compute the value with their privately known values where p is a large prime. The basic idea of our protocol is to find some random integers such that and the user pi can compute the random number Ri easily while it is computationally expensive for other participants to compute the value Ri. Our protocol for privacy preserving product calculation Q i xi is composed of the following three algorithms: Setup, Encrypt, Product.
  • 6. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com Product Protocol—One Aggregator Model The product calculation in the One Aggregater Model is similar to the protocol above, except that the aggregator A acts as the ðn þ 1Þth participant pnþ1. The second difference is that, each participant pi will send the ciphertext Ci to the aggregator, instead of broadcasting to all participants. However, since our communication channel is insecure, this is essentially the broadcast from the adversary’s perspective. The last difference is that the aggregator A will not announce its random number to any other participant. Each participant sends the ciphertext to the aggregator A. The aggregator A then calculates to achieve the final product, where Rnþ1 is kept secret to any participant. Sum Protocol—Participants Only Model Now, we present how to let n participants jointly compute xi given their privately known values xi 2 G1. It seems we can exploit the aforementioned method in produPct calculation by finding random numbers Ri such that but we found it is challenging to let participants independently achieve such numbers. The previous method was secure because of the hardness of the discrete logarithm, but the same analogue does not exist in the additions. The basic idea of this protocol is to convert the sum of numbers into product of numbers. Previous solution [11] essentially applied this approach also by computing the product and finding by computing the discrete logarithm of the product. As discrete logarithm is computationally expensive, we will not adopt this method. Instead, we propose a computationally efficient method here. CONCLUSION In this paper, we successfully achieve privacy-preserving sum and product calculation protocols without secure communication channels or trusted key issuers. We allow up to k (adjustable parameter) collusive participants who will not tamper the computation but try to manipulate their parameters to infer others’ private values. We formally analyzed the security of our protocols and showed that the protocols are secure if the CDH problem is assumed to be intractable, and we also showed with implementation that the protocols are efficient to be applicable in real life. At the end, we propose numerous applications that are achieved from our
  • 7. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com protocols. One of our future works is to design privacy preserving data releasing protocols such that general function of data can be evaluated correctly while preserving individuals’ data privacy.