Abstract
With the large deployment of smart devices, the collections and analysis of user data significantly benefit both industry and people’s daily life. However, it has showed a serious risk to people’s privacy in the process of the above applications. Recently, combining multiparty computation and differential privacy was a popular strategy to guarantee both computational security and output privacy in distributed data aggregation. To decrease the communication cost in traditional multiparty computation paradigm, the existing work introduces several trusted servers to undertake the main computing tasks. But we will lose the guarantee on both security and privacy when the trusted servers are vulnerable to adversaries. To address the privacy disclosure problem caused by the vulnerable servers, we provide a two-layer randomisation privacy preserved data aggregation framework with semi-honest servers (we only take their computation ability but do not trust them). Differing from the existing approach introduces differential privacy noises globally, our framework randomly adds random noises but maintains the same differential privacy guarantee. Theoretical and experimental analysis show that to achieve same security and privacy insurance, our framework provides better data utility than the existing approach.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Ács, G., Castelluccia, C.: I have a DREAM! (DiffeRentially privatE smArt Metering). In: Filler, T., Pevný, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 118–132. Springer, Heidelberg (2011). doi:10.1007/978-3-642-24178-9_9
Cramer, R., Damgård, I., Nielsen, J.B.: Multiparty computation, an introduction. In: Catalano, D., Cramer, R., Di Crescenzo, G., Damgård, I., Pointcheval, D., Takagi, T. (eds.) Contemporary cryptology. Advanced Courses in Mathematics - CRM Barcelona, pp. 41–87. Birkhäuser Basel, Basel (2009)
Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1–12. Springer, Heidelberg (2006). doi:10.1007/11787006_1
Eigner, F., Kate, A., Maffei, M., Pampaloni, F., Pryvalov, I.: Differentially private data aggregation with optimal utility. In: Proceedings of the 30th Annual Computer Security Applications Conference, pp. 316–325. ACM (2014)
Elahi, T., Danezis, G., Goldberg, I.: PrivEx: private collection of traffic statistics for anonymous communication networks. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 1068–1079. ACM (2014)
Goryczka, S., Xiong, L.: A comprehensive comparison of multiparty secure additions with differential privacy. Trans. Dependable Secure Comput. (2015). Preliminary version – Goryczka, S., Xiong, L., Sunderam, V.: Secure multiparty aggregation with differential privacy: a comparative study. In: Proceedings of the Joint EDBT/ICDT 2013 Workshops, EDBT 2013, Genoa, Italy, pp. 155–163. ACM, New York (2013). doi:10.1145/2457317.2457343
Goryczka, S., Xiong, L., Fung, B.C.: Privacy for collaborative data publishing. IEEE Trans. Knowl. Data Eng. 26(10), 2520–2533 (2014)
Gupta, A., Ligett, K., McSherry, F., Roth, A., Talwar, K.: Differentially private combinatorial optimization. In: Proceedings of the 21st Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2010, pp. 1106–1125 (2010)
Lu, Z., Shen, H.: A security-assured accuracy-maximised privacy preserving collaborative filtering recommendation algorithm. In: Proceedings of the 19th International Database Engineering & Applications Symposium, pp. 72–80. ACM (2015)
McSherry, F.: Privacy integrated queries. In: Proceedings of the 2009 ACM SIGMOD International Conference on Management of Data (SIGMOD). ACM (2009)
McSherry, F., Talwar, K.: Mechanism design via differential privacy. In: 48th Annual IEEE Symposium on Foundations of Computer Science, pp. 94–103. IEEE (2007)
Pettai, M., Laud, P.: Combining differential privacy and secure multiparty computation. In: Proceedings of the 31st Annual Computer Security Applications Conference, pp. 421–430. ACM (2015)
Rastogi, V., Nath, S.: Differentially private aggregation of distributed time-series with transformation and encryption. In: Proceedings of the 2010 ACM SIGMOD International Conference on Management of Data, pp. 735–746. ACM (2010)
Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
Shi, E., Chan, H., Rieffel, E., Chow, R., Song, D.: Privacy-preserving aggregation of time-series data. In: Annual Network & Distributed System Security Symposium (NDSS). Internet Society (2011)
Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10(05), 557–570 (2002)
Acknowledgements
The authors would like to thank the anonymous reviewers for their valuable comments. This work is supported by Australian Government Research Training Program Scholarship, Australian Research Council Discovery Project DP150104871, and Research Initiative Grant of Sun Yat-Sen University under Project 985. The corresponding author is Hong Shen.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Lu, Z., Shen, H. (2017). Secured Privacy Preserving Data Aggregation with Semi-honest Servers. In: Kim, J., Shim, K., Cao, L., Lee, JG., Lin, X., Moon, YS. (eds) Advances in Knowledge Discovery and Data Mining. PAKDD 2017. Lecture Notes in Computer Science(), vol 10235. Springer, Cham. https://doi.org/10.1007/978-3-319-57529-2_24
Download citation
DOI: https://doi.org/10.1007/978-3-319-57529-2_24
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-57528-5
Online ISBN: 978-3-319-57529-2
eBook Packages: Computer ScienceComputer Science (R0)