A cloud-aided privacy-preserving multi-dimensional data comparison protocol

被引:44
作者
Shen, Hua [1 ,2 ]
Zhang, Mingwu [1 ,2 ,3 ]
Wang, Hao [4 ]
Guo, Fuchun [4 ]
Susilo, Willy [5 ]
机构
[1] Hubei Univ Technol, Sch Comp Sci, Wuhan, Peoples R China
[2] Guilin Univ Elect Technol, Guangxi Key Lab Trusted Software, Guilin, Peoples R China
[3] State Key Lab Cryptol, Beijing, Peoples R China
[4] Shandong Normal Univ, Sch Informat Sci & Engn, Jinan, Peoples R China
[5] Univ Wollongong, Inst Cybersecur & Cryptol, Sch Comp & Informat Technol, Wollongong, NSW, Australia
基金
中国国家自然科学基金;
关键词
Privacy-preserving; Multi-dimensional data; Data comparison; Mobile social networks; DATA AGGREGATION SCHEME; MULTIPARTY COMPUTATION; EFFICIENT; EQUALITY;
D O I
10.1016/j.ins.2020.09.052
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the emergence of mobile social networks, users can make friends or negotiate projects at any time and anywhere in social communities through their mobile devices (such as smartphones, iPads). The two sides of making friends or cooperation want to know the comparison results between each other in many aspects. Aiming at the requirements of these interactive applications in social networks and considering the limited-resource setting of mobile users, in this paper, we propose a cloud-aided privacy-preserving multidimensional data comparison protocol. We introduce a novel comparison method for two multi-dimensional data. Because of the blinded processing trick in our comparison method and the Paillier encryption, the proposed protocol can realize our comparison method without revealing users' data and the comparison results. Besides, a fog device and a cloud server conduct most of the computations. Furthermore, users pack their multi-dimensional data into one data using Horner Rule, making finishing the comparison of two multi-dimensional data through one-round system communication. Therefore, the presented protocol can significantly lower the computation and communication costs of the system, especially that of the user-side. Security analysis is inducted to validate security properties. Moreover, performance evaluations illustrate the computation and communication efficiency of the proposed protocol. (C) 2020 Elsevier Inc. All rights reserved.
引用
收藏
页码:739 / 752
页数:14
相关论文
共 37 条
[1]   PPSDT: A Novel Privacy-Preserving Single Decision Tree Algorithm for Clinical Decision-Support Systems Using IoT Devices [J].
Alabdulkarim, Alia ;
Al-Rodhaan, Mznah ;
Ma, Tinghuai ;
Tian, Yuan .
SENSORS, 2019, 19 (01)
[2]  
Alexandru AB, 2018, IEEE DECIS CONTR P, P5014, DOI 10.1109/CDC.2018.8619835
[3]   A Secure Privacy-Preserving Data Aggregation Scheme Based on Bilinear ElGamal Cryptosystem for Remote Health Monitoring Systems [J].
Ara, Anees, Jr. ;
Al-Rodhaan, Mznah ;
Tian, Yuan ;
Al-Dhelaan, Abdullah .
IEEE ACCESS, 2017, 5 :12601-12617
[4]   Threshold Properties of Prime Power Subgroups with Application to Secure Integer Comparisons [J].
Carlton, Rhys ;
Essex, Aleksander ;
Kapulkin, Krzysztof .
TOPICS IN CRYPTOLOGY - CT-RSA 2018, 2018, 10808 :137-156
[5]  
Chen J., 2018, IEEE T DEPEND SECURE
[6]  
Chun H., 2014, P 9 ACM S INFORM COM, P401, DOI DOI 10.1145/2590296.2590343
[7]  
Couteau G, 2018, LECT NOTES COMPUT SC, V10892, P303, DOI 10.1007/978-3-319-93387-0_16
[8]  
Couteau Geoffroy, 2016, IACR CRYPTOL EPRINT, P544
[9]  
Damgard Ivan, 2008, International Journal of Applied Cryptography, V1, P22, DOI 10.1504/IJACT.2008.017048
[10]  
Damgård I, 2007, LECT NOTES COMPUT SC, V4586, P416