A Privacy-Preserving and Verifiable Statistical Analysis Scheme for an E-Commerce Platform

被引:4
作者
Shen, Hua [1 ]
Wu, Ge [2 ]
Xia, Zhe [3 ]
Susilo, Willy [4 ]
Zhang, Mingwu [1 ]
机构
[1] Hubei Univ Technol HBUT, Sch Comp Sci, Wuhan 430068, Hubei, Peoples R China
[2] Southeast Univ, Sch Cyber Sci & Engn, Nanjing 211189, Peoples R China
[3] Wuhan Univ Technol WHUT, Sch Comp Sci & Technol, Wuhan 430068, Peoples R China
[4] Univ Wollongong, Inst Cybersecur & Cryptol, Sch Comp & Informat Technol, Wollongong, NSW 2522, Australia
基金
中国国家自然科学基金;
关键词
Cryptography; Servers; Electronic commerce; Cloud computing; Homomorphic encryption; Statistical analysis; Data analysis; Privacy-preservation; verifiability; statistical analysis; e-commerce platform; DATA AGGREGATION SCHEME; PUBLIC-KEY CRYPTOSYSTEM; SMART; EFFICIENT; LIGHTWEIGHT; SECURE;
D O I
10.1109/TIFS.2023.3269669
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
To know the most recent market conditions, an e-commerce platform needs to be aware of the sales situation of its sellers' commodities. The most recent market conditions can help to forecast future market trends and develop policies to guide sellers in reasonably allocating their inventory proportion. Statistical analysis is a fundamental approach to studying the sales situation. However, the sales data of an e-commerce platform usually has a significant volume. Therefore, outsourcing statistical analysis to cloud servers is an effective method. Nevertheless, sellers do not want their sales data leaked to anyone or any other organization. Moreover, in many circumstances, we cannot fully trust cloud servers. Thus, we need to utilize cryptographic or non-cryptographic tools to realize the above outsourcing. Secret sharing is a lightweight and powerful non-cryptographic tool to realize privacy-preserving data analysis. However, it needs secure channels to distribute secret shares. On the other hand, homomorphic encryption is a powerful cryptographic tool for designing privacy-preserving data analysis schemes. Nevertheless, these schemes usually do not allow the entity that holds the decryption key to collude with other entities. We propose a privacy-preserving and verifiable statistical analysis scheme for an e-commerce platform that combines a threshold secret sharing scheme with a verifiable threshold homomorphic encryption scheme. Our solution's demand for secure channels is reduced by 40%similar to 60% compared with a traditional threshold secret sharing scheme, thanking the designed novel distribution model for delivering secret shares. Furthermore, our solution has a stronger ability to resist collusive attacks, keep sales data private from any entity, and ensure that the platform can only obtain the analysis results with the help of some cloud servers, alleviating the single point of trust. And meanwhile, the novel distributed model makes our solution enjoy better robustness and fault tolerance. The proposed solution is validated through security analyses, performance evaluations, and comparison analyses.
引用
收藏
页码:2637 / 2652
页数:16
相关论文
共 44 条
[1]  
BENALOH JC, 1987, LECT NOTES COMPUT SC, V263, P251
[2]  
Boneh D, 2005, LECT NOTES COMPUT SC, V3378, P325
[3]  
Brakerski Zvika, 2014, ACM Transactions on Computation Theory, V6, DOI 10.1145/2633600
[4]  
Camenisch J, 2004, LECT NOTES COMPUT SC, V3152, P56
[5]   Batch Verification of Short Signatures [J].
Camenisch, Jan ;
Hohenberger, Susan ;
Pedersen, Michael Ostergaard .
JOURNAL OF CRYPTOLOGY, 2012, 25 (04) :723-747
[6]   Efficient and Provably Secure Aggregation of Encrypted Data in Wireless Sensor Networks [J].
Castelluccia, Claude ;
Chan, Aldar C-F ;
Mykletun, Einar ;
Tsudik, Gene .
ACM TRANSACTIONS ON SENSOR NETWORKS, 2009, 5 (03) :1-36
[7]   Encrypted data processing with Homomorphic Re-Encryption [J].
Ding, Wenxiu ;
Yan, Zheng ;
Deng, Robert H. .
INFORMATION SCIENCES, 2017, 409 :35-55
[8]   Differential privacy: A survey of results [J].
Dwork, Cynthia .
THEORY AND APPLICATIONS OF MODELS OF COMPUTATION, PROCEEDINGS, 2008, 4978 :1-19
[9]   A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS [J].
ELGAMAL, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) :469-472
[10]   Lightweight and Privacy-Friendly Spatial Data Aggregation for Secure Power Supply and Demand Management in Smart Grids [J].
Gope, Prosanta ;
Sikdar, Biplab .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (06) :1554-1566