Supporting privacy of computations in mobile big data systems

作者: Sriram Nandha Premnath , Zygmunt Haas

DOI: 10.3390/FI8020017

关键词: Computer networkComputer securityMobile deviceCloud computingComputer scienceMobile computingSecure multi-party computationServerThe InternetMobile searchBig data

摘要: Cloud computing systems enable clients to rent and share resources of third party platforms, have gained widespread use in recent years. Numerous varieties mobile, small-scale devices such as smartphones, red e-health devices, etc., across users, are connected one another through the massive internetwork vastly powerful servers on cloud. While mobile store “private information” users location, payment, health data, they may also contribute “semi-public (which include crowdsourced data transit, traffic, nearby points interests, etc.) for analytics. In a scenario, device seek obtain result computation, which depend its private inputs, from other and/or any “public inputs” Internet. We demonstrate new method delegating real-world computations resource-constrained using an encrypted program known garbled circuit. Using version client’s server cloud executes circuit returns resulting outputs. Our system assures privacy input output enables client verify that evaluator actually performed computation. analyze complexity our system. measure time taken construct well evaluate it varying number servers. we practical, preserving search application locates nearest point interest feasibility.

参考文章(33)
Xenofontas Dimitropoulos, Martin Burkhart, Mario Strasser, Dilip Many, SEPIA: privacy-preserving aggregation of multi-domain network events and statistics usenix security symposium. pp. 15- 15 ,(2010)
Jonathan Katz, David Evans, Yan Huang, Private Set Intersection: Are Garbled Circuits Better than Custom Protocols? network and distributed system security symposium. ,(2012)
Ronald L Rivest, Len Adleman, Michael L Dertouzos, ON DATA BANKS AND PRIVACY HOMOMORPHISMS ,(1978)
Noam Nisan, Benny Pinkas, Yaron Sella, Dahlia Malkhi, Fairplay—a secure two-party computation system usenix security symposium. pp. 20- 20 ,(2004)
Benjamin Mood, Kevin Butler, Patrick Traynor, Henry Carter, Secure outsourced garbled circuit evaluation for mobile devices usenix security symposium. pp. 289- 304 ,(2013)
Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider, Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima cryptology and network security. ,vol. 5888, pp. 1- 20 ,(2009) , 10.1007/978-3-642-10433-6_1
Rosario Gennaro, Craig Gentry, Bryan Parno, Non-interactive verifiable computing: outsourcing computation to untrusted workers international cryptology conference. ,vol. 2009, pp. 465- 482 ,(2010) , 10.1007/978-3-642-14623-7_25
Sven Bugiel, Stefan Nürnberger, Ahmad-Reza Sadeghi, Thomas Schneider, Twin Clouds: Secure Cloud Computing with Low Latency Communications and Multimedia Security. pp. 32- 44 ,(2011) , 10.1007/978-3-642-24712-5_3
Yitao Duan, John Canny, Justin Zhan, P4P: practical large-scale privacy-preserving distributed computation robust against malicious users usenix security symposium. pp. 14- 14 ,(2010)