Highly distributed and privacy-preserving queries on personal data management systems

被引:1
|
作者
Bouganim, Luc [1 ,2 ]
Loudet, Julien [1 ,2 ,3 ]
Popa, Iulian Sandu [1 ,2 ]
机构
[1] Inria Saclay Ile France, 1 Rue Honore dEstienne dOrves, F-91120 Palaiseau, France
[2] Univ Versailles St Quentin, Univ Paris Saclay, 45 Ave Etats Unis, F-78035 Versailles, France
[3] Cozy Cloud, 5 Quai Marcel Dassault, F-92150 Suresnes, France
关键词
Distributed systems; Privacy; Personal data management system; Peer-to-peer query processing; PEER; INFORMATION; SECURITY; SEARCH;
D O I
10.1007/s00778-022-00753-1
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Personal data management system (PDMS) solutions are flourishing, boosted by smart disclosure initiatives and new regulations. PDMSs allow users to easily store and manage data directly generated by their devices or resulting from their (digital) interactions. Users can then leverage the power of their PDMS to benefit from their personal data, for their own good and in the interest of the community. The PDMS paradigm thus brings exciting perspectives by unlocking novel usages, but also raises security issues. An effective approach, considered in several recent works, is to let the user data distributed on personal platforms, secured locally using hardware and/or software security mechanisms. This paper goes beyond the local security issues and addresses the important question of securely querying this massively distributed personal data. To this end, we propose DISPERS, a fully distributed PDMS peer-to-peer architecture. DISPERS allows users to securely and efficiently share and query their personal data, even in the presence of malicious nodes. We consider three increasingly powerful threat models and derive, for each, a security requirement that must be fulfilled to reach a lower-bound in terms of sensitive data leakage: (1) hidden communications, (2) random dispersion of data and (3) collaborative proofs. These requirements are incremental and, respectively, resist spied, leaking or corrupted nodes. We show that the expected security level can be guaranteed with near certainty and validate experimentally the efficiency of the proposed protocols, allowing for adjustable trade-off between the security level and its cost.
引用
收藏
页码:415 / 445
页数:31
相关论文
共 50 条
  • [41] Privacy-preserving clustering with distributed EM mixture modeling
    Xiaodong Lin
    Chris Clifton
    Michael Zhu
    Knowledge and Information Systems, 2005, 8 : 68 - 81
  • [42] Privacy-Preserving Data Mashup
    Barhamgi, Mahmoud
    Benslimane, Djamal
    Ghedira, Chirine
    Gancarski, Alda Lopes
    25TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA 2011), 2011, : 467 - 474
  • [43] Privacy-Preserving Alibi Systems
    Davis, Benjamin
    Chen, Hao
    Franklin, Matthew
    7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012), 2012,
  • [44] Privacy-preserving emergency access control for personal health records
    Thummavet, Phuwanai
    Vasupongayya, Sangsuree
    MAEJO INTERNATIONAL JOURNAL OF SCIENCE AND TECHNOLOGY, 2015, 9 (01) : 108 - 120
  • [45] Privacy-preserving SOM-based recommendations on horizontally distributed data
    Kaleli, Cihan
    Polat, Huseyin
    KNOWLEDGE-BASED SYSTEMS, 2012, 33 : 124 - 135
  • [46] Privacy-Preserving Concordance-based Recommendations on Vertically Distributed Data
    Kaleli, Cihan
    2012 TENTH INTERNATIONAL CONFERENCE ON ICT AND KNOWLEDGE ENGINEERING, 2012, : 19 - 24
  • [47] Privacy-Preserving Trust-based Recommendations on Vertically Distributed Data
    Kaleli, Cihan
    Polat, Huseyin
    FIFTH IEEE INTERNATIONAL CONFERENCE ON SEMANTIC COMPUTING (ICSC 2011), 2011, : 376 - 379
  • [48] PDSR: A Privacy-Preserving Diversified Service Recommendation Method on Distributed Data
    Wang, Lina
    Yang, Huan
    Shen, Yiran
    Liu, Chao
    Qi, Lianyong
    Cheng, Xiuzhen
    Li, Feng
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2024, 17 (05) : 2733 - 2746
  • [49] Achieving fully privacy-preserving private range queries over outsourced cloud data
    Shen, Yao
    Yang, Wei
    Li, Lu
    Fitiang, Liusheng
    PERVASIVE AND MOBILE COMPUTING, 2017, 39 : 36 - 51
  • [50] L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing
    Li, Jin
    Liu, Zheli
    Chen, Xiaofeng
    Xhafa, Fatos
    Tan, Xiao
    Wong, Duncan S.
    KNOWLEDGE-BASED SYSTEMS, 2015, 79 : 18 - 26