Skip to main content

A Privacy-Preserving Platform for User-Centric Quantitative Benchmarking

  • Conference paper
Trust, Privacy and Security in Digital Business (TrustBus 2009)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5695))

Abstract

We propose a centralised platform for quantitative benchmarking of key performance indicators (KPI) among mutually distrustful organisations. Our platform offers users the opportunity to request an ad-hoc benchmarking for a specific KPI within a peer group of their choice. Architecture and protocol are designed to provide anonymity to its users and to hide the sensitive KPI values from other clients and the central server. To this end, we integrate user-centric peer group formation, exchangeable secure multi-party computation protocols, short-lived ephemeral key pairs as pseudonyms, and attribute certificates. We show by empirical evaluation of a prototype that the performance is acceptable for reasonably sized peer groups.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Bogetoft, P., Nielsen, K.: Internet Based Benchmarking. Technical report, Dept. of Economics, The Royal Veterinary and Agricultural University, Denmark (2002)

    Google Scholar 

  2. Crotts, J., Pan, B., Dimitry, C., Goldman, H.: A Case Study on Developing an Internet-Based Competitive Analysis and Benchmarking Tool for Hospitality Industry. In: Proc. Conference of Travel and Tourism Research Association (2006)

    Google Scholar 

  3. Atallah, M., Bykova, M., Li, J., Frikken, K., Topkara, M.: Private collaborative forecasting and benchmarking. In: Proc. 2004 ACM workshop on Privacy in the Electronic Society, pp. 103–114. ACM, New York (2004)

    Chapter  Google Scholar 

  4. Yao, A.: Protocols for Secure Computations. In: Proc. 23rd annual IEEE Symposium on Foundations of Computer Science, pp. 160–164 (1982)

    Google Scholar 

  5. Malkhi, D., Nisan, N., Pinkas, B., Sella, Y.: Fairplay – a Secure Two-Party Computation System. In: Proc. 13th USENIX Security Symposium, pp. 287–302 (2004)

    Google Scholar 

  6. Liu, W., Luo, S.S., Chen, P.: A Study of Secure Multi-party Ranking Problem. In: 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, pp. 727–732 (2007)

    Google Scholar 

  7. Bogetoft, P., DamgÃ¥rd, I.B., Jakobsen, T., Nielsen, K., Pagter, J.I., Toft, T.: A practical implementation of secure auctions based on multiparty integer computation. In: Di Crescenzo, G., Rubin, A. (eds.) FC 2006. LNCS, vol. 4107, pp. 142–147. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  8. Bogetoft, P., Christensen, D.L., Damgard, I., Geisler, M., Jakobsen, T., Krøigaard, M., Nielsen, J.D., Nielsen, J.B., Nielsen, K., Pagter, J., Schwartzbach, M., Toft, T.: Multiparty Computation Goes Live. Cryptology ePrint Archive, Report 2008/068 (2008)

    Google Scholar 

  9. Feigenbaum, J., Pinkas, B., Ryger, R., Saint-Jean, F.: Secure Computation of Surveys. In: Proc. EU Workshop on Secure Multiparty Protocols (2004)

    Google Scholar 

  10. Kerschbaum, F., Terzidis, O.: Filtering for private collaborative benchmarking. In: Müller, G. (ed.) ETRICS 2006. LNCS, vol. 3995, pp. 409–422. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  11. Kerschbaum, F.: Practical Privacy-Preserving Benchmarking. In: Jajodia, S., Samarati, P., Cimato, S. (eds.) Proc. IFIP TC-11 23rd International Information Security Conference. IFIP, vol. 278, pp. 17–31. Springer, Heidelberg (2008)

    Google Scholar 

  12. Kerschbaum, F.: Building A Privacy-Preserving Benchmarking Enterprise System. Enterprise Information Systems 2(4) (2008)

    Google Scholar 

  13. Catrina, O., Kerschbaum, F.: Fostering the Uptake of Secure Multiparty Computation in E-Commerce. In: Proc. Third International Conference on Availability, Reliability and Security, pp. 693–700 (2008)

    Google Scholar 

  14. Rannenberg, K., Pfitzmann, A., Müller, G.: In: Multilateral Security in Communications, vol. 3, pp. 21–29. Addison-Wesley, Reading (1999)

    Google Scholar 

  15. Canetti, R., Lindell, Y., Ostrovsky, R., Sahai, A.: Universally Composable Two-Party and Multi-Party Secure Computation. In: Proc. 34th annual ACM symposium on Theory of Computing, pp. 494–503. ACM, New York (2002)

    Google Scholar 

  16. Ziv, A.: Information Sharing in Oligopoly: the Truth-Telling Problem. RAND Journal of Economics 24(3), 455–465 (1993)

    Article  Google Scholar 

  17. Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Herrmann, D., Scheuer, F., Feustel, P., Nowey, T., Federrath, H. (2009). A Privacy-Preserving Platform for User-Centric Quantitative Benchmarking. In: Fischer-Hübner, S., Lambrinoudakis, C., Pernul, G. (eds) Trust, Privacy and Security in Digital Business. TrustBus 2009. Lecture Notes in Computer Science, vol 5695. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03748-1_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-03748-1_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-03747-4

  • Online ISBN: 978-3-642-03748-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics