Privacy-Preserving Secure Computation of Skyline Query in Distributed Multi-Party Databases †

被引:10
作者
Qaosar, Mahboob [1 ,2 ]
Zaman, Asif [2 ]
Siddique, Md. Anisuzzaman [2 ]
Annisa [3 ]
Morimoto, Yasuhiko [1 ]
机构
[1] Hiroshima Univ, Grad Sch Engn, Higashihiroshima 7398527, Japan
[2] Univ Rajshahi, Dept Comp Sci & Engn, Rajshahi 6205, Bangladesh
[3] Bogor Agr Univ, Dept Comp Sci, Bogor 1668, Indonesia
关键词
secure skyline; homomorphic encryption; Paillier cryptosystem; information security; data-mining; data privacy; semi-honest adversary model; multi-party computation; EFFICIENT;
D O I
10.3390/info10030119
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Selecting representative objects from a large-scale database is an essential task to understand the database. A skyline query is one of the popular methods for selecting representative objects. It retrieves a set of non-dominated objects. In this paper, we consider a distributed algorithm for computing skyline, which is efficient enough to handle "big data". We have noticed the importance of "big data" and want to use it. On the other hand, we must take care of its privacy. In conventional distributed algorithms for computing a skyline query, we must disclose the sensitive values of each object of a private database to another for comparison. Therefore, the privacy of the objects is not preserved. However, such disclosures of sensitive information in conventional distributed database systems are not allowed in the modern privacy-aware computing environment. Recently several privacy-preserving skyline computation frameworks have been introduced. However, most of them use computationally expensive secure comparison protocol for comparing homomorphically encrypted data. In this work, we propose a novel and efficient approach for computing the skyline in a secure multi-party computing environment without disclosing the individual attributes' value of the objects. We use a secure multi-party sorting protocol that uses the homomorphic encryption in the semi-honest adversary model for transforming each attribute value of the objects without changing their order on each attribute. To compute skyline we use the order of the objects on each attribute for comparing the dominance relationship among the objects. The security analysis confirms that the proposed framework can achieve multi-party skyline computation without leaking the sensitive attribute value to others. Besides that, our experimental results also validate the effectiveness and scalability of the proposed privacy-preserving skyline computation framework.
引用
收藏
页数:20
相关论文
共 50 条
[41]   Minimal Complete Primitives for Secure Multi-Party Computation [J].
Matthias Fitzi ;
Juan A. Garay ;
Ueli Maurer ;
Rafail Ostrovsky .
Journal of Cryptology, 2005, 18 :37-61
[42]   SecSkyline: Fast Privacy-Preserving Skyline Queries Over Encrypted Cloud Databases [J].
Zheng, Yifeng ;
Wang, Weibo ;
Wang, Songlei ;
Jia, Xiaohua ;
Huang, Hejiao ;
Wang, Cong .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2023, 35 (09) :8955-8967
[43]   Minimal complete primitives for secure multi-party computation [J].
Fitzi, M ;
Garay, JA ;
Maurer, U ;
Ostrovsky, R .
JOURNAL OF CRYPTOLOGY, 2005, 18 (01) :37-61
[44]   Secure Multi-party Computation Minimizing Online Rounds [J].
Choi, Seung Geol ;
Elbaz, Ariel ;
Malkin, Tal ;
Yung, Moti .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2009, 2009, 5912 :268-286
[45]   Secure Multi-Party Computation for Minimum and Its Applications [J].
Dou J.-W. ;
Ma L. ;
Li S.-D. .
Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2017, 45 (07) :1715-1721
[46]   Rabbit: Efficient Comparison for Secure Multi-Party Computation [J].
Makri, Eleftheria ;
Rotaru, Dragos ;
Vercauteren, Frederik ;
Wagh, Sameer .
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2021, PT I, 2021, 12674 :249-270
[47]   Trinocchio: Privacy-Preserving Outsourcing by Distributed Verifiable Computation [J].
Schoenmakers, Berry ;
Veeningen, Meilof ;
de Vreede, Niels .
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2016, 2016, 9696 :346-366
[48]   Multi-Party Privacy-Preserving Logistic Regression with Poor Quality Data Filtering for IoT Contributors [J].
Edemacu, Kennedy ;
Kim, Jong Wook .
ELECTRONICS, 2021, 10 (17)
[49]   Privacy-preserving multi-party deep learning based on homomorphic proxy re-encryption [J].
Shen, Xiaoying ;
Luo, Xue ;
Yuan, Feng ;
Wang, Baocang ;
Chen, Yange ;
Tang, Dianhua ;
Gao, Le .
JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 144
[50]   CR-SMTC: Privacy Preserving Collusion-Resistant Multi-Party Trust Computation [J].
Fathabadi, Zohre Fath ;
Nogoorani, Sadegh Dorri ;
Hemmatyar, Ali Mohammad .
2014 11TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2014, :167-172