Revisiting Privacy-Preserving Min and k-th Min Protocols for Mobile Sensing

被引:0
作者
Gao, Jiacheng [1 ]
Zhang, Yuan [1 ]
Zhong, Sheng [1 ]
机构
[1] Nanjing Univ, Dept Comp Sci & Technol, Nanjing 210093, Jiangsu, Peoples R China
基金
美国国家科学基金会; 中国国家自然科学基金;
关键词
Protocols; Computational modeling; Sensors; Mobile handsets; Computational efficiency; Performance evaluation; Homomorphic encryption; Mobile sensing; min/k -th min; secret permutation generating; privacy; EFFICIENT; AWARE;
D O I
10.1109/TDSC.2023.3324802
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Exploiting participants' data without knowing them is the center topic of secure mobile sensing data aggregation. In this article, we study how to improve existing protocols for computing the minimum or k-th minimum of all participants' data in a privacy-preserving manner. Existing protocols for these two computations require relatively high communication cost or frequent interactions, which leads to unbearable time consumption when the network delay is high. We improve the min computation protocol proposed by Zhang et al. 2017, cutting down on its need for interactions and thus making it perform better in terms of efficiency. We also propose a new protocol as a secure substitute of the Bit-choosing Algorithm designed by Yu et al. 2018. It helps participants generate a secret permutation, which will be further used in the k-th min computation protocol to achieve higher accuracy and efficiency. Theoretical analyses are done to help predict and understand our new protocols' performances, and later evaluations show that both these new protocols perform notably better in comparison to the existing ones.
引用
收藏
页码:3211 / 3226
页数:16
相关论文
共 25 条
  • [1] Exploration of 85th Percentile Operating Speed Model on Horizontal Curve: A Case Study for Two-Lane Rural Highways
    Abbas, Syed Khairi Syed
    Adnan, Muhammad Akram
    Endut, Intan Rohani
    [J]. 6TH INTERNATIONAL SYMPOSIUM ON HIGHWAY CAPACITY AND QUALITY OF SERVICE, 2011, 16
  • [2] Adida B, 2007, LECT NOTES COMPUT SC, V4392, P555
  • [3] Becher K, 2020, IEEE SYMP COMP COMMU, P71
  • [4] Gong XH, 2018, IEEE INFOCOM SER, P1250, DOI 10.1109/INFOCOM.2018.8486265
  • [5] Hoffmann AnnaLauren., 2018, Philosophy Technology, V31, P209, DOI [10.1007/s13347-017-0295-x, DOI 10.1007/S13347-017-0295-X]
  • [6] Jiangpeng Dai, 2010, 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), P292, DOI 10.1109/PERCOMW.2010.5470652
  • [7] Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
    Li, Qinghua
    Cao, Guohong
    La Porta, Thomas F.
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2014, 11 (02) : 115 - 129
  • [8] Li QH, 2012, I C NETWORK PROTOCOL
  • [9] Movahedi Mahnush, 2015, Structural Information and Communication Complexity. 22nd International Colloquium, SIROCCO 2015. Post-Proceedings: LNCS 9439, P459, DOI 10.1007/978-3-319-25258-2_32
  • [10] Muheden K, 2016, INT SYMP COMP INTELL, P243, DOI 10.1109/CINTI.2016.7846411