Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1007/978-3-642-54069-1_3guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Privacy-Preserving Computation

Published: 10 October 2012 Publication History

Abstract

Private data is commonly revealed to the party performing the computation on it. This poses a problem, particularly when outsourcing storage and computation, e.g., to the cloud. In this paper we present a review of security mechanisms and a research agenda for privacy-preserving computation. We begin by reviewing current application scenarios where computation faces privacy requirements. We then review existing cryptographic techniques for privacy-preserving computation. And last, we outline research problems that need to be solved for implementing privacy-preserving computations. Once addressed, privacy-preserving computations can quickly become a reality enhancing the privacy protection of citizens.

References

[1]
Abadi, M., Morrisett, G., Sabelfeld, A.: Language-based security. Journal of Functional Programming 152, 129 2005
[2]
Abraham, I., Dolev, D., Gonen, R., Halpern, J.: Distributed computing meets game theory: Robust mechanisms for rational secret sharing and multiparty computation. In: Proceedings of the 25th ACM Symposium on Principles of Distributed Computing, PODC 2006 2006
[3]
Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order preserving encryption for numeric data. In: Proceedings of the ACM International Conference on Management of Data, SIGMOD 2004 2004
[4]
Almeida, J.B., Bangerter, E., Barbosa, M., Krenn, S., Sadeghi, A.-R., Schneider, T.: A certifying compiler for zero-knowledge proofs of knowledge based on -protocols. In: Gritzalis, D., Preneel, B., Theoharidou, M. eds. ESORICS 2010. LNCS, vol. 6345, pp. 151---167. Springer, Heidelberg 2010
[5]
Backes, M., Maffei, M., Pecina, K.: Automated synthesis of privacy-preserving distributed applications. In: Proceedings of 19th Network and Distributed System Security Symposium, NDSS 2012 2012
[6]
Balasch, J., Rial, A., Troncoso, C., Preneel, B., Verbauwhede, I., Geuens, C.: Pretp: privacy-preserving electronic toll pricing. In: Proceedings of the 19th USENIX Conference on Security, USENIX Security 2010 2010
[7]
Bauer, G., Stockinger, K., Lukowicz, P.: Recognizing the use-mode of kitchen appliances from their current consumption. In: Barnaghi, P., Moessner, K., Presser, M., Meissner, S. eds. EuroSSC 2009. LNCS, vol. 5741, pp. 163---176. Springer, Heidelberg 2009
[8]
Ben-David, A., Nisan, N., Pinkas, B.: Fairplaymp: a system for secure multi-party computation. In: Proceedings of the 15th ACM Conference on Computer and Communications Security, CCS 2008 2008
[9]
Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non-cryptographic fault-tolerant distributed computation. In: Proceedings of the 20th ACM Symposium on Theory of computing, STOC 1988 1988
[10]
Berthold, O., Federrath, H., Köhntopp, M.: Project "anonymity and unobservability in the internet". In: Proceedings of the 10th Conference on Computers, Freedom and Privacy: Challenging the Assumptions, CFP 2000 2000
[11]
Binnig, C., Hildenbrand, S., Färber, F.: Dictionary-based order-preserving string compression for main memory column stores. In: Proceedings of the ACM International Conference on Management of Data, SIGMOD 2009 2009
[12]
Bogdanov, D., Laur, S., Willemson, J.: Sharemind: A framework for fast privacy-preserving computations. In: Jajodia, S., Lopez, J. eds. ESORICS 2008. LNCS, vol. 5283, pp. 192---206. Springer, Heidelberg 2008
[13]
Boldyreva, A., Chenette, N., Lee, Y., O'Neill, A.: Order-preserving symmetric encryption. In: Joux, A. ed. EUROCRYPT 2009. LNCS, vol. 5479, pp. 224---241. Springer, Heidelberg 2009
[14]
Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. eds. EUROCRYPT 2004. LNCS, vol. 3027, pp. 506---522. Springer, Heidelberg 2004
[15]
Camenisch, J., Van Herreweghen, E.: Design and implementation of the idemix anonymous credential system. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002 2002
[16]
Cavoukian, A., Polonetskyand, J., Wolf, C.: Smart privacy for the smart grid: embedding privacy into the design of electricity conservation. Identity in the Information Society 32, 275---294 2010
[17]
Cramer, R., Damgård, I.B., Nielsen, J.B.: Multiparty computation from threshold homomorphic encryption. In: Pfitzmann, B. ed. EUROCRYPT 2001. LNCS, vol. 2045, pp. 280---300. Springer, Heidelberg 2001
[18]
Damgård, I., Geisler, M., KrØigaard, M., Nielsen, J.B.: Asynchronous multiparty computation: theory and implementation. In: Jarecki, S., Tsudik, G. eds. PKC 2009. LNCS, vol. 5443, pp. 160---179. Springer, Heidelberg 2009
[19]
Danezis, G., Livshits, B.: Towards ensuring client-side computational integrity position paper. In: Proceedings of the ACM Cloud Computing Security Workshop, CCSW 2011 2011
[20]
Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. In: Proceedings of the 13th USENIX Conference on Security, USENIX Security 2004 2004
[21]
Dwork, C.: Differential privacy. In: Proceedings of the 33rd International Colloquium on Automata, Languages and Programming 2006
[22]
Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proceedings of the 41st ACM Symposium on Theory of Computing, STOC 2009 2009
[23]
Gentry, C., Halevi, S.: Implementing gentry's fully-homomorphic encryption scheme. In: Paterson, K.G. ed. EUROCRYPT 2011. LNCS, vol. 6632, pp. 129---148. Springer, Heidelberg 2011
[24]
Goldreich, O.: The Foundations of Cryptography. Basic Applications, vol. 2. Cambridge University Press 2004
[25]
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game. In: Proceedings of the 19th ACM Symposium on Theory of Computing, STOC 1987 1987
[26]
Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof systems. SIAM Journal of Computing 181, 186---208 1989
[27]
Gordon, S.D., Katz, J.: Rational secret sharing, revisited. In: De Prisco, R., Yung, M. eds. SCN 2006. LNCS, vol. 4116, pp. 229---241. Springer, Heidelberg 2006
[28]
Halpern, J., Teague, V.: Rational secret sharing and multiparty computation: Extended abstract. In: Proceedings of the 36th ACM Symposium on Theory of Computing, STOC 2004 2004
[29]
Hart, G.W.: Nonintrusive appliance load monitoring. Proceedings of the IEEE 8012, 1870---1891 1992
[30]
Heck, W.: Smart energy meter will not be compulsory. NRC Handelsblad April 2009, http://www.nrc.nl/international/article2207260.ece/Smart_energy_meter_will_not_be_compulsory
[31]
Henecka, W., Kögl, S., Sadeghi, A.-R., Schneider, T., Wehrenberg, I.: Tasty: tool for automating secure two-party computations. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010 2010
[32]
Heydt-Benjamin, T.S., Chae, H.-J., Defend, B., Fu, K.: Privacy for public transportation. In: Danezis, G., Golle, P. eds. PET 2006. LNCS, vol. 4258, pp. 1---19. Springer, Heidelberg 2006
[33]
Huang, Y., Evans, D., Katz, J., Malka, L.: Faster secure two-party computation using garbled circuits. In: Proceedings of the 20th USENIX Conference on Security, USENIX Security 2011 2011
[34]
Izmalkov, S., Micali, S., Lepinski, M.: Rational secure computation and ideal mechanism design. In: Proceedings of the 46th IEEE Symposium on Foundations of Computer Science, FOCS 2005 2005
[35]
Jamieson, A.: Smart meters could be 'spy in the home'. Telegraph UK October 2009, http://www.telegraph.co.uk/finance/newsbysector/energy/6292809/Smart-meters-could-be-spy-in-the-home.html
[36]
Jawurek, M., Johns, M., Kerschbaum, F.: Plug-in privacy for smart metering billing. In: Fischer-Hübner, S., Hopper, N. eds. PETS 2011. LNCS, vol. 6794, pp. 192---210. Springer, Heidelberg 2011
[37]
Kerschbaum, F.: Adapting privacy-preserving computation to the service provider model. In: Proceedings of the International Conference on Privacy, Security, Risk and Trust, PASSAT 2009 2009
[38]
Kerschbaum, F.: Automatically optimizing secure computation. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011 2011
[39]
Kerschbaum, F., Schaad, A.: Privacy-preserving social network analysis for criminal investigations. In: Proceedings of the 7th ACM Workshop on Privacy in the Electronic Society, WPES 2008 2008
[40]
Lisovich, M.A., Mulligan, D.K., Wicker, S.B.: Inferring personal information from demand-response systems. IEEE Security and Privacy 81, 11---20 2010
[41]
Lysyanskaya, A., Triandopoulos, N.: Rationality and adversarial behavior in multi-party computation. In: Dwork, C. ed. CRYPTO 2006. LNCS, vol. 4117, pp. 180---197. Springer, Heidelberg 2006
[42]
Malkhi, D., Nisan, N., Pinkas, B., Sella, Y.: Fairplay --- a secure two-party computation system. In: Proceedings of the 13th USENIX Conference on Security, USENIX Security 2004 2004
[43]
Naehrig, M., Lauter, K., Vaikuntanathan, V.: Can homomorphic encryption be practical? In. In: Proceedings of the 3rd ACM Cloud Computing Security Workshop, CCSW 2011 2011
[44]
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. ed. EUROCRYPT 1999. LNCS, vol. 1592, pp. 223---238. Springer, Heidelberg 1999
[45]
Popa, R.A., Redfield, C.M.S., Zeldovich, N., Balakrishnan, H.: Cryptdb: protecting confidentiality with encrypted query processing. In: Proceedings of the 23rd ACM Symposium on Operating Systems Principles, SOSP 2011 2011
[46]
Rial, A., Danezis, G.: Privacy-preserving smart metering. In: Proceedings of the 10th ACM Workshop on Privacy in the Electronic Society, WPES 2011 2011
[47]
Schröpfer, A., Kerschbaum, F.: Forecasting run-times of secure two-party computation. In: Proceedings of the 8th International Conference on Quantitative Evaluation of Systems, QEST 2011 2011
[48]
Schröpfer, A., Kerschbaum, F., Müller, G.: L1 --- an intermediate language for mixed-protocol secure computation. In: Proceedings of the 35th IEEE Computer Software and Applications Conference, COMPSAC 2011 2011
[49]
Shi, E., Bethencourt, J., Chan, T.-H.H., Song, D., Perrig, A.: Multi-dimensional range query over encrypted data. In: Proceedings of the IEEE Symposium on Security and Privacy, SP 2007 2007
[50]
Shoham, Y., Tennenholtz, M.: Non-cooperative computation: boolean functions with correctness and exclusivity. Theoretical Computer Science 3431-2, 97---113 2005
[51]
Sultanem, F.: Using appliance signatures for monitoring residential loads at meter panel level. IEEE Transactions on Power Delivery 64, 1380---1385 1991
[52]
Sweeney, L.: k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 105 2002
[53]
Van Dijk, M., Juels, A.: On the impossibility of cryptography alone for privacy-preserving cloud computing. In: Proceedings of the 5th USENIX Workshop on Hot Topics in Security, HotSec 2010 2010
[54]
Yao, A.C.: Protocols for secure computations. In: Proceedings of the 23rd Annual Symposium on Foundations of Computer Science, FOCS 1982 1982

Cited By

View all
  • (2021)Precision health dataComputers in Biology and Medicine10.1016/j.compbiomed.2020.104130129:COnline publication date: 1-Feb-2021
  • (2017)Privacy FlagProceedings of the 21st Pan-Hellenic Conference on Informatics10.1145/3139367.3139432(1-4)Online publication date: 28-Sep-2017

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
APF 2012: Revised Selected Papers of the First Annual Privacy Forum on Privacy Technologies and Policy - Volume 8319
October 2012
214 pages
ISBN:9783642540684
  • Editors:
  • Bart Preneel,
  • Demosthenes Ikonomou

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 10 October 2012

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 29 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2021)Precision health dataComputers in Biology and Medicine10.1016/j.compbiomed.2020.104130129:COnline publication date: 1-Feb-2021
  • (2017)Privacy FlagProceedings of the 21st Pan-Hellenic Conference on Informatics10.1145/3139367.3139432(1-4)Online publication date: 28-Sep-2017

View Options

View options

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media