On practical privacy-preserving fault-tolerant data aggregation

被引:9
作者
Grining, Krzysztof [1 ]
Klonowski, Marek [1 ]
Syga, Piotr [1 ]
机构
[1] Wroclaw Univ Sci & Technol, Dept Comp Sci, Fac Fundamental Problems Technol, Wroclaw, Poland
关键词
Data aggregation; Differential privacy; Fault tolerance; Distributed systems; Untrusted aggregator; INFORMATION;
D O I
10.1007/s10207-018-0413-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a fault-tolerant privacy-preserving data aggregation protocol which utilizes limited local communication between nodes. As a starting point, we analyze the Binary Protocol presented by Chan et al. Comparing to previous work, their scheme guaranteed provable privacy of individuals and could work even if some number of users refused to participate. In our paper we demonstrate that despite its merits, their method provides unacceptably low accuracy of aggregated data for a wide range of assumed parameters and cannot be used in majority of real-life systems. To show this we use both analytic and experimental methods. On the positive side, we present a precise data aggregation protocol that provides provable level of privacy even when facing massive failures of nodes. Moreover, our protocol requires significantly less computation (limited exploiting of heavy cryptography) than most of currently known fault-tolerant aggregation protocols and offers better security guarantees that make it suitable for systems of limited resources (including sensor networks). Most importantly, our protocol significantly decreases the error (compared to Binary Protocol). However, to obtain our result we relax the model and allow some limited communication between the nodes. Our approach is a general way to enhance privacy of nodes in networks that allow such limited communication, i.e., social networks, VANETs or other IoT appliances. Additionally, we conduct experiments on real data (Facebook social network) to compare our protocol with protocol presented by Chan et al.
引用
收藏
页码:285 / 304
页数:20
相关论文
共 50 条
[41]   An Efficient Privacy-Preserving Data Aggregation Scheme in Smart Grid [J].
Karampour, Afshin ;
Ashouri-Talouki, Maede ;
Ladani, Behrouz Tork .
2019 27TH IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE 2019), 2019, :1967-1971
[42]   A Survey on the Privacy-Preserving Data Aggregation in Wireless Sensor Networks [J].
XU Jian ;
YANG Geng ;
CHEN Zhengyu ;
WANG Qianqian .
中国通信, 2015, 12 (05) :162-180
[43]   PPMA: Privacy-Preserving Multisubset Data Aggregation in Smart Grid [J].
Li, Shaohua ;
Xue, Kaiping ;
Yang, Qingyou ;
Hong, Peilin .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (02) :462-471
[44]   An Efficient Privacy-Preserving Aggregation Scheme for Multidimensional Data in IoT [J].
Peng, Cong ;
Luo, Min ;
Wang, Huaqun ;
Khan, Muhammad Khurram ;
He, Debiao .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (01) :589-600
[45]   A privacy-preserving data aggregation system based on blockchain in VANET [J].
Yang, Ruicheng ;
Dong, Guofang ;
Xu, Zhengnan ;
Ning, Juangui ;
Du, Jianming .
BLOCKCHAIN-RESEARCH AND APPLICATIONS, 2024, 5 (03)
[46]   Privacy-Preserving Selective Aggregation of Online User Behavior Data [J].
Qian, Jianwei ;
Qiu, Fudong ;
Wu, Fan ;
Ruan, Na ;
Chen, Guihai ;
Tang, Shaojie .
IEEE TRANSACTIONS ON COMPUTERS, 2017, 66 (02) :326-338
[47]   Lightweight and Privacy-Preserving Data Aggregation for Mobile Multimedia Security [J].
Ma, Sugang ;
Zhang, Tiantian ;
Wu, Axin ;
Zhao, Xiangmo .
IEEE ACCESS, 2019, 7 :114131-114140
[48]   A Survey on the Privacy-Preserving Data Aggregation in Wireless Sensor Networks [J].
Xu Jian ;
Yang Geng ;
Chen Zhengyu ;
Wang Qianqian .
CHINA COMMUNICATIONS, 2015, 12 (05) :162-180
[49]   A privacy-preserving data aggregation scheme in wireless sensor networks [J].
Fu S. ;
Jiang Q. ;
Ma J. .
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2016, 53 (09) :2030-2038
[50]   Privacy-preserving robust data aggregation in wireless sensor networks [J].
Conti, Mauro ;
Zhang, Lei ;
Roy, Sankardas ;
Di Pietro, Roberto ;
Jajodia, Sushil ;
Mancini, Luigi Vincenzo .
SECURITY AND COMMUNICATION NETWORKS, 2009, 2 (02) :195-213