PUDA - Privacy and Unforgeability for Data Aggregation

نویسندگان

  • Iraklis Leontiadis
  • Kaoutar Elkhiyaoui
  • Melek Önen
  • Refik Molva
چکیده

Existing work on secure data collection and aggregation is mainly focused on confidentiality issues. That is, ensuring that the untrusted Aggregator learns only the aggregation result without divulging individual data inputs. In this paper however we consider a malicious Aggregator which is not only interested in compromising users’ privacy but also is interested in providing bogus aggregate values. More concretely, we extend existing security models with the requirement of aggregate unforgeability. Moreover, we instantiate an efficient protocol for private and unforgeable data aggregation that allows the Aggregator to compute the sum of users’ inputs without learning individual values and constructs a proof of correct computation that can be verified by any third party. The proposed protocol is provably secure and its communication and computation overhead is minimal.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions

Aggregator oblivious encryption was proposed by Shi et al. (NDSS 2011), where an aggregator can compute an aggregated sum of data and is unable to learn anything else (aggregator obliviousness). Since the aggregator does not learn individual data that may reveal users’ habits and behaviors, several applications, such as privacy-preserving smart metering, have been considered. In this paper, we ...

متن کامل

Collusion Resistant Aggregation from Convertible Tags

The progress in communication and hardware technology increases the computational capabilities of personal devices. Data is produced massively from ubiquitous devices that cannot be stored locally. Moreover, third party authorities in order to increase their value in the market with more knowledge, seek to collect individual data inputs, such that they can make a decision with more relevant inf...

متن کامل

Performing Data Aggregation on Encrypted data for Preserving Privacy in WSNs

Energy and Privacy are the two important aspects in the Battery limited wireless sensor networks. Currently adopting hop by hop encryption for privacy preserving protocols are not efficient in terms of the energy and privacy in WSNs because these protocols decrypts and encrypts the data at the aggregator node since the decrypts at every aggregator node consumes more power and it also increases ...

متن کامل

A New Data Aggregation Scheme to Support Energy Efficiency and Privacy Preservation for Wireless Sensor Networks

Because a sensor node has limited resources, such as battery capacity, data aggregation techniques have been proposed for wireless sensor networks (WSNs). On the other hand, the provision of efficient data aggregation for preserving data privacy is challenging issue in WSNs. Existing data aggregation methods for preserving data privacy are CPDA, SMART, Twin-Key based method, and GP2S. However, ...

متن کامل

Concealed data aggregation in wireless sensor networks: A comprehensive survey

The objectives of concealed data aggregation are to provide end-to-end privacy and en route aggregation of reverse multicast traffic in wireless sensor networks. Privacy homomorphism has been used for realizing these objectives together. Although privacy homomorphism achieves the conflicting objectives, such as privacy and data aggregation, it negatively affects other security objectives such a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2015  شماره 

صفحات  -

تاریخ انتشار 2015