On practical privacy-preserving fault-tolerant data aggregation

被引:9
作者
Grining, Krzysztof [1 ]
Klonowski, Marek [1 ]
Syga, Piotr [1 ]
机构
[1] Wroclaw Univ Sci & Technol, Dept Comp Sci, Fac Fundamental Problems Technol, Wroclaw, Poland
关键词
Data aggregation; Differential privacy; Fault tolerance; Distributed systems; Untrusted aggregator; INFORMATION;
D O I
10.1007/s10207-018-0413-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a fault-tolerant privacy-preserving data aggregation protocol which utilizes limited local communication between nodes. As a starting point, we analyze the Binary Protocol presented by Chan et al. Comparing to previous work, their scheme guaranteed provable privacy of individuals and could work even if some number of users refused to participate. In our paper we demonstrate that despite its merits, their method provides unacceptably low accuracy of aggregated data for a wide range of assumed parameters and cannot be used in majority of real-life systems. To show this we use both analytic and experimental methods. On the positive side, we present a precise data aggregation protocol that provides provable level of privacy even when facing massive failures of nodes. Moreover, our protocol requires significantly less computation (limited exploiting of heavy cryptography) than most of currently known fault-tolerant aggregation protocols and offers better security guarantees that make it suitable for systems of limited resources (including sensor networks). Most importantly, our protocol significantly decreases the error (compared to Binary Protocol). However, to obtain our result we relax the model and allow some limited communication between the nodes. Our approach is a general way to enhance privacy of nodes in networks that allow such limited communication, i.e., social networks, VANETs or other IoT appliances. Additionally, we conduct experiments on real data (Facebook social network) to compare our protocol with protocol presented by Chan et al.
引用
收藏
页码:285 / 304
页数:20
相关论文
共 46 条
[1]  
[Anonymous], 2004, ACM SIGMOBILE Mobile Computing and Communications Review, DOI DOI 10.1145/1031483.1031487
[2]  
[Anonymous], 2006, P 3 INT WORKSH VEH A, DOI DOI 10.1145/1161064.1161070
[3]  
[Anonymous], 2010, IEEE INT C COMM ICC
[4]  
[Anonymous], 2011, P NDSS
[5]  
[Anonymous], 2008, TAMC, P1
[6]  
[Anonymous], LNCS
[7]  
[Anonymous], PDA PRIVACY PRESERVI
[8]   Security on VANETs: Privacy, misbehaving nodes, false information and secure data aggregation [J].
Antolino Rivas, David ;
Barcelo-Ordinas, Jose M. ;
Guerrero Zapata, Manel ;
Morillo-Pozo, Julian D. .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (06) :1942-1955
[9]  
Beimel Amos, 2011, Coding and Cryptology. Proceedings of the Third International Workshop, IWCC 2011, P11, DOI 10.1007/978-3-642-20901-7_2
[10]  
Benaloh J. C, 1987, ADV CRYPTOLOGY