Abstract
Large-scale problems in the physical and life sciences are being revolutionized by Internet computing technologies, like grid computing, that make possible the massive cooperative sharing of computational power, bandwidth, storage, and data. A weak computational device, once connected to such a grid, is no longer limited by its slow speed, small amounts of local storage, and limited bandwidth: It can avail itself of the abundance of these resources that is available elsewhere on the network. An impediment to the use of “computational outsourcing” is that the data in question is often sensitive, e.g., of national security importance, or proprietary and containing commercial secrets, or to be kept private for legal requirements such as the HIPAA legislation, Gramm-Leach-Bliley, or similar laws. This motivates the design of techniques for computational outsourcing in a privacy-preserving manner, i.e., without revealing to the remote agents whose computational power is being used, either one’s data or the outcome of the computation on the data. This paper investigates such secure outsourcing for widely applicable sequence comparison problems, and gives an efficient protocol for a customer to securely outsource sequence comparisons to two remote agents, such that the agents learn nothing about the customer’s two private sequences or the result of the comparison. The local computations done by the customer are linear in the size of the sequences, and the computational cost and amount of communication done by the external agents are close to the time complexity of the best known algorithm for solving the problem on a single machine (i.e., quadratic, which is a huge computational burden for the kinds of massive data on which such comparisons are made). The sequence comparison problem considered arises in a large number of applications, including speech recognition, machine vision, and molecular sequence comparisons. In addition, essentially the same protocol can solve a larger class of problems whose standard dynamic programming solutions are similar in structure to the recurrence that subtends the sequence comparison algorithm.
Portions of this work were supported by Grants IIS-0325345, IIS-0219560, IIS-0312357, and IIS-0242421 from the National Science Foundation, Contract N00014-02-1-0364 from the Office of Naval Research, by sponsors of the Center for Education and Research in Information Assurance and Security, and by Purdue Discovery Park’s e-enterprise Center.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Aho, A.V., Hirschberg, D.S., Ullman, J.D.: Bounds on the Complexity of the Longest Common Subsequence Problem. Journal of the ACM 23(1), 1–12 (1976)
Atallah, M.J., Kerschbaum, F., Du, W.: Secure and Private Sequence Comparisons. In: Proceedings of 2nd ACM Workshop on Privacy in Electronic Society (2003)
Atallah, M.J., Pantazopoulos, K.N., Rice, J., Spafford, E.H.: Secure Outsourcing of Scientific Computations. Advances in Computers 54(6), 215–272 (2001)
Beguin, P., Quisquater, J.J.: Fast Server-Aided RSA Signatures Secure Against Active Attacks. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 57–69. Springer, Heidelberg (1995)
Cachin, C.: Efficient Private Bidding and Auctions with an Oblivious Third Party. In: Proceedings of the 6th ACM Conference on Computer and Communications Security, pp. 120–127 (1999)
Du, W., Atallah, M.J.: Protocols for Secure Remote Database Access with Approximate Matching. In: Proceedings of the 1st ACM Workshop on Security and Privacy in E-Commerce (2000)
Fischlin, M.: A Cost-Effective Pay-Per-Multiplication Comparison Method for Millionaires. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 457–471. Springer, Heidelberg (2001)
Foster, I., Kesselman, C. (eds.): The Grid: Blueprint for a New Computing Infrastructure. Morgan Kaufmann Publishers, San Francisco (1999)
Goldreich, O.: Secure Multi-party Computation (working draft) (2001), Available at http://www.wisdom.weizmann.ac.il/home/oded/public_html/pp.html
Kawamura, S.I., Shimbo, A.: Fast Server-Aided Secret Computation Protocols for Modular Exponentiation. IEEE Journal on Selected Areas in Communications 11(5), 778–784 (1993)
Landau, G., Vishkin, U.: Introducing Efficient Parallelism into Approximate String Matching and a new Serial Algorithm. In: Proceedings of the 18-th ACM STOC, pp. 220–230 (1986)
Lim, C.H., Lee, P.J.: Security and Performance of Server-Aided RSA Computation Protocols. In: CRYPT0 1995, pp. 70–83 (1995)
Martinez, H.M. (ed.): Mathematical and Computational Problems in the Analysis of Molecular Sequences. Bulletin of Mathematical Biology (Special Issue Honoring M. O. Dayhoff), vol. 46(4) (1984)
Masek, W.J., Paterson, M.S.: A Faster Algorithm Computing String Edit Distances. Journal of Computer and System Science 20, 18–31 (1980)
Matsumoto, T., Kato, K., Imai, H.: Speeding Up Secret Computations with Insecure Auxiliary Devices. In: CRYPT0 1988, pp. 497–506 (1988)
Naccache, D., Stern, J.: A New Cryptosystem based on Higher Residues. In: Proceedings of the ACM Conference on Computer and Communications Security, vol. 5, pp. 59–66 (1998)
Needleman, S.B., Wunsch, C.D.: A General Method Applicable to the Search for Similarities in the Amino-acid Sequence of Two Proteins. Journal of Molecular Biology 48, 443–453 (1973)
Okamoto, T., Uchiyama, S.: A New Public-Key Cryptosystem as Secure as Factoring. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 308–318. Springer, Heidelberg (1998)
Pfitzmann, B., Waidner, M.: Attacks on Protocols for Server-Aided RSA Computations. In: Rueppel, R.A. (ed.) EUROCRYPT 1992. LNCS, vol. 658, pp. 153–162. Springer, Heidelberg (1993)
Rivest, R.L., Adleman, L., Dertouzos, M.L.: On Data Banks and Privacy Homomorphisms. In: DeMillo, R.A. (ed.) Foundations of Secure Computation, pp. 169–177. Academic Press, London (1978)
Sankoff, D.: Matching Sequences Under Deletion-insertion Constraints. Proceedings of the National Academy of Sciences of the U.S.A. 69, 4–6 (1972)
Sankoff, D., Kruskal, J.B. (eds.): Time Warps, String Edits and Macromolecules: The Theory and Practice of Sequence Comparison. Addison-Wesley, Reading (1983)
Schneier, B.: Applied cryptography: protocols, algorithms, and source code in C, 2nd edn. John Wiley & Sons, Inc, Chichester (1995)
Sellers, P.H.: An Algorithm for the Distance between two Finite Sequences. Journal of Combinatorial Theory 16, 253–258 (1974)
Sellers, P.H.: The Theory and Computation of Evolutionary Distance: Pattern Recognition. Journal of Algorithms 1, 359–373 (1980)
Ukkonen, E.: Finding Approximate Patterns in Strings. Journal of Algorithms 6, 132–137 (1985)
Wagner, R.A., Fischer, M.J.: The String to String Correction Problem. Journal of the ACM 21(1), 168–173 (1974)
Wong, C.K., Chandra, A.K.: Bounds for the String Editing Problem. Journal of the ACM 23(1), 13–16 (1976)
Yao, A.: Protocols for Secure Computations. Proceedings of the Annual IEEE Symposium on Foundations of Computer Science 23, 160–164 (1982)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Atallah, M.J., Li, J. (2005). Secure Outsourcing of Sequence Comparisons. In: Martin, D., Serjantov, A. (eds) Privacy Enhancing Technologies. PET 2004. Lecture Notes in Computer Science, vol 3424. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11423409_5
Download citation
DOI: https://doi.org/10.1007/11423409_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-26203-9
Online ISBN: 978-3-540-31960-3
eBook Packages: Computer ScienceComputer Science (R0)