SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET ISO 9001:2008 Certified Journal Page 133
A SURVEY ON PRIVACY-PRESERVING DATA AGGREGATION WITHOUT
SECURE CHANNEL
Kshitija Nandgaonkar1, Swarupa Kamble2
1 M.E. Student, Computer Engg ., RMD Sinhgad School of Engineering, Pune ,Maharashtra, India
2 Assistant Professor ,Dept. Computer Engg. ,RMD Sinhgad School of Engineering, Pune, Maharashtra ,India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - The Privacy-preserving data aggregation
problem becoming an important issue in the field of
applied cryptography. Most research has been carried
out to securely outsource individual's privately owned
data to an untrusted aggregator, or to enable multiple
parties to jointly aggregate their sensitive data while
preserving privacy. However many research require
secure pair-wise channel and it suffers from high
complexity. This paper describes sum and product
calculation protocol that enables an external
aggregator or multiple parties to perform data
aggregation over participants data while preserving
the data privacy.
Key Words: Privacy-preserving, Data aggregation,
Secure channels, SMC, Homomorphic.
1. INTRODUCTION
As people are becoming more concerned about their
privacy these days, the privacy-preservability is very
important. A fundamental problem is that of private data
analysis where a third party has to compute some
aggregate statistics over some sensitive data held by
individuals. This problem finds concrete applications in a
number of situations. When the third party, called
hereafter aggregator, is trusted an easy solution would be
to ask the users to encrypt their data using the
aggregator's public key. Upon receiving the ciphertexts the
aggregator applies its private key to recover the data in
clear and then compute statistics. The problem becomes
much more challenging in the case of an untrusted
aggregator.
In many real life applications such as crowd sourcing or
mobile cloud computing, individuals need to give their
delicate data (location-specific or personal information
related) to get particular services from the entire system
(e.g., location based services or mobile based social
networking services).
The data aggregation problem usually involves two
different models:
 an external aggregator will gather the data and
performs an aggregation function on participants'
data (e.g., crowd sourcing);
 participants will together calculate a specific
aggregation function where input data being
provided by themselves (e.g., social networking
services).
However, the individual's data should be kept secret, and
the aggregator or other participants are not supposed to
learn any useful information about it. Secure Multi-party
Computation (SMC), Homomorphic Encryption (HE) and
other cryp tographic methodologies can be employed to
solve this problem, but these techniques are subject to
some limitations in this problem. Many real-world
applications have benefitted tremendously from the ability
to collect and mine data coming from multiple individuals
and organizations. These applications have also spurred
numerous concerns over the privacy of user data.
In this paper, we study how an untrusted aggregator or
mutiple parties can gather information and learn
aggregate statistics over individual privacy. For example,
consider a smart grid operator who wishes to track the
total electricity consumption of a neighborhood every 15
minutes, for scheduling and optimization purposes. Since
such power consumption data can reveal sensitive
information about individuals presence and activities, we
wish to perform such aggregation in a privacy-preserving
manner.
2. LITERATURE SURVEY
C. Castelluccia, A. Chan, E. Mykletun, and G. Tsudik has
published paper on Efficient and provably secure
aggregation of encrypted data in wireless sensor network
[1], in this authors had designed a symmetric key
homomorphic encryption scheme which is an addition to
homomorphic for conducting the aggregation operations
on the ciphertexts. They uses a modular addition, so the
scheme is good for CPU bounded devices such as sensor
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET ISO 9001:2008 Certified Journal Page 134
nodes in WSN. Their scheme can also efficiently compute
various statistical values such as mean, variance and
deviation. However, since they used the symmetric
homomorphic encryption, their aggregator could decrypt
each individual sensors data, and they assumed the
trusted aggregator in their model.
R. Sheikh, B. Kumar, and D. Mishra, presented a paper on
Privacy preserving k secure sum protocol [2], in this
paper author proposed a k-secure sum protocol, which is
extended from the work of Clifton et al. [3]. They
significantly reduced the probability of data leakage
occurring in [3] by segmenting the data block of individual
party, and distributing segments to other parties. Here,
sum of each party’s segments is his data, therefore the
final sum of all segments are sum of all parties data. This
scheme can be easily converted to k-secure product
protocol by converting each addition to multiplication.
However, pair-wise unique secure communication
channels should be given between each pair of users such
that only the receiver and the sender know the
transmitted segment. Otherwise, each party’s secret data
can be calculated by performing O(k) computations. In this
paper, we remove the limitation of using secure
communication channels.
T. Jung, X. Mao, X.-y. Li, S.-J. Tang, W. Gong, and L. Zhang,
published a paper on Privacy-preserving data aggregation
without secure channel: multivariate polynomial
evaluation [4], in this paper author assume that all the
communication channels in protocol are insecure. Anyone
can eavesdrop them to intercept the data being
transferred. To address the challenges of insecure
communication channel, they assume that the discrete
logarithm problem is computationally hard if: 1) the
orders of the integer groups are large prime numbers; 2)
the involved integer numbers are large numbers. The
security of their scheme relies on this assumption. They
further assume that there is a secure pseudorandom
function (PRF) which can choose a random element from a
group such that this element is computationally
indistinguishable to uniform random.
M. Joye and B. Libert, has published paper on A scalable
scheme for privacy-preserving aggregation of time-series
data [5] in this authors have proposed a solution for
accommodating large plaintext data from multiple users.
In this paper they address problem of private data analysis
where a third party has to compute some aggregate
statistics over some sensitive data held by individuals. A
scheme supports a large plaintext spaces and number of
users. It also allows the decryption algorithm to operate
in constant time, regardless of the number of users.
Additionally the scheme also provides a on-line/off-line
efficiency using pre-computations, the encryptor is left
with a mere modular multiplication in the on-line phase
(i.e., when the data to be encrypted is known), which is
highly desirable when computations take place on
resource-limited devices. This paper presented a new
scheme allowing an untrusted aggregator to evaluate the
sum of user’s private inputs. In contrast to prior solutions,
there is no restriction on the message space or on the
number of users. This results in always fast decryption
and aggregation, even over large plaintext spaces and/or
population of users
We note that Dong et al. [6] investigated verifiable privacy
preserving dot production of two vectors and Zhang et al.
[7] proposed verifiable multiparty computation, both of
which can be partially or fully exploited later. Designing
privacy preserving data aggregation while providing
verification of the correctness of the provided data is a
future work.
Shi et al. [8] proposed a construction that n participants
periodically upload encrypted values to an aggregator, and
the aggregator computes the sum of those values without
learning anything else. This scheme is close to our
solution, but they assumed a trusted key dealer in their
model. In this paper, the trusted aggregator in [1] is
removed since data privacy against the aggregator is also a
top concern these days. Unlike [2], we assumed insecure
channels, which enabled us to get rid of expensive and
vulnerable key pre-distribution. We did not segment each
individuals data, our protocols only incur constant
communication overhead for each participant. Our scheme
is also based on the hardness of the discrete logarithm
problem like [8], but we do not trivially employ brute-
force manner in decryption, instead, we employ our novel
efficient protocols for sum and product calculation.
3. PROBLEM STATEMENT
3.1 Problem Analysis
Assume that there are n participants { p1,p2,....,pn } and
each participant pi has a privately known data xi from Zp.
The privacy-preserving data aggregation problem is to
compute sum or product of xi jointly or by an aggregator
while preserving the data privacy. That is, the objective of
the aggregator or the participants is to compute the
following polynomial without knowing any individual xi:
Or
Here vector x = (x1; x2,....xn). For simplicity, we assume
that the final result f(x) is positive and bounded from
above by a large prime number P.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET ISO 9001:2008 Certified Journal Page 135
3.2 Security Model
Firstly, we assume that all the communication channels in
our protocol are insecure. Anyone can eavesdrop them to
intercept the data being transferred. To address the
challenges of insecure communication channel, we assume
that the following CDH problem is computationally
intractable, i.e., any probabilistic polynomial time
adversary has negligible chance to solve the following
problem:
3.2.1 Definition 1 (CDH Problem in G)
The Computational Diffe-Hellman problem in a
multiplicative group G with generator g is defined as
follows:
given only g, ga, gb ε G where a, b ε Z, compute gab without
knowing a or b.
Additionally, similar Decisional Diffe-Hellman(DDH)
problem is defined as follows:
3.2.2 Definition 2 (DDH Problem in G)
The Decisional Diffe-Hellman problem in a multiplicative
group G with generator g is defined as follows:
given only g, ga, gb , gc ε G where a, b, c ε Z, decide if gab =
gc.
Our protocol is based on the assumption that it is
computational expensive to solve the CDH problem. Then,
we define the security of our privacy-preserving sum and
product calculation as follows.
3.2.3 Definition 3 (CDH-Security in G)
We say our privacy-preserving (sum or product)
calculation is CDH-secure in G if any Probabilistic
Polynomial Time Adversary (PPTA) who cannot solve the
CDH problem with non-negligible chance has negligible
chance to infer any honest participants private value in G.
4. SYSTEM ARCHITECTURE AND DESIGN
There are two models for aggregation of private data as:
One Aggregator Model and Participants Only Model. These
two models are general cases we are faced with in real
applications
Fig. 1 – System Architecture
A figure shows a system architecture of data aggregation.
In this data comes from different user like medical data,
location based data, or personal information etc. has been
aggregated by external aggregator. An external aggregator
or multiple parties will perform encryption on aggregated
data to maintain data privacy. The aggregator or
participants need to learn privacy preserving sum and
product calculation protocol.
4.1 One Aggregator Model
In the first model, we have one aggregator A who wants to
compute the function f(x). We assume the aggregator is
untrustful and curious. That is, he always eavesdrops the
communications between participants and tries to access
their input data, but also follow the protocol specification.
We also assume participants do not trust each other and
that they are curious as well, i.e., they also eavesdrop all
the communications and follow the protocol specification.
In this model, any single participant pi is not allowed to
compute the final result f(x).
4.1.1 Sum and Product Calculation
One Aggregator Model can be used to calculate product
and sum of participants privately owned data. In this
aggregator A acts as n+1th participant and will compute
sum and product for each participants. Here, each
participant will broadcast its ciphertext data to
aggregator.
4.2 Participant Only Model
The second model is similar to the first one except that
there are n participants only and there is no aggregator. In
this model, all the participants are equal and they all will
calculate the final aggregation result f(x).
4.2.1 Sum and Product Calculation
In participant only model, all participant will jointly
compute sum and product of each participants data. In this
data is share among all participants of communication. To
encrypt data a random key is generated and it is share
among all participants.
5. CONCLUSION
This paper presents a privacy preserving sum and product
calculation of privately owned data without need of secure
channel. Two models can be used for aggregation of data:
One aggregator model and Participant only model. A
survey describes that, sum and product of sensitive data
can be computed without the need of pair wise secure
channel. Thus reduces overhead of maintaining each
participants key pair.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET ISO 9001:2008 Certified Journal Page 136
REFERENCES
[1] C. Castelluccia, A. Chan, E. Mykletun, and G. Tsudik,
“Efficient and Provably secure aggregation of
encrypted data in wireless sensor networks”,
Transactions on sensor Networks(TOSN), 2009
[2] R. Sheikh, B. Kumar, D. Mishra, “ Privacy preserving k-
secure Sum Protocol”, Arxiv Preprint arXiv:0912.0956,
2009
[3] C. Clifton, M. Kantarcioglu, J. Vaidya, X. Lin, and
M.Zhu, “ Tools for privacy preserving distributed data
mining”, SIGKDD Explorations Newsletter,2002
[4] T. Jung, X. Mao, X.-y. Li, S.-J. Tang, W. Gong, and L.
Zhang, “ Privacy-preserving data aggregation without
secure channel: multivariate polynomial evaluation,”
in INFOCOM. IEEE, 2013.
[5] M. Joye and B. Libert, “A scalable scheme for privacy-
preserving aggregation of time-series data”, in
Financial Cryptography and Data Security, (IFCA)
2013.
[6] W. Dong, V. Dave, L. Qiu, and Y. Zhang, “Secure friend
discovery in mobile social networks,” in IEEE
INFOCOM, 2011, pp. 16471655.
[7] L. Zhang, X. Li, Y. Liu, and T. Jung, “ Verifiable private
multi-party computation: ranging and ranking”, in
INFOCOM Mini-conference, IEEE, 2013
[8] E. Shi, T. Chan, E. Rieffel, R. Chow, and D. Song, “
Privacy-preserving aggregation of time-series data”,
in NDSS, vol.17, 2011.

More Related Content

PDF
Dft based individual extraction of steganographic compression of images
PDF
Dft based individual extraction of steganographic compression of images
PDF
Ijnsa050202
PDF
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
PDF
A hybrid security and compressive sensing based sensor data gathering scheme
PDF
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
PDF
STUDY OF DISTANCE MEASUREMENT TECHNIQUES IN CONTEXT TO PREDICTION MODEL OF WE...
PDF
An Improved Differential Evolution Algorithm for Data Stream Clustering
Dft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of images
Ijnsa050202
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
A hybrid security and compressive sensing based sensor data gathering scheme
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
STUDY OF DISTANCE MEASUREMENT TECHNIQUES IN CONTEXT TO PREDICTION MODEL OF WE...
An Improved Differential Evolution Algorithm for Data Stream Clustering

What's hot (18)

DOCX
Dotnet 2015 2016 2017 ieee project list-with abstract
PDF
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
PDF
A Reliable Routing Technique for Wireless Sensor Networks
PDF
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
PPTX
Incentive Compatible Privacy Preserving Data Analysis
PDF
Intrusion detection in heterogeneous network by multipath routing based toler...
PDF
Intrusion detection in heterogeneous network by multipath routing based toler...
PDF
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
PDF
Observability for modern applications
PDF
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
PDF
Gf3311081111
PDF
The Champion Supervisor
PDF
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
PDF
SECURE TRANSMISSION OF DATA IN SMART GRID WITH THE AID OF ELLIPTIC CURVE CRYP...
PDF
A COMPARISON BETWEEN PARALLEL AND SEGMENTATION METHODS USED FOR IMAGE ENCRYPT...
PDF
Ijcnc050208
PDF
Paper id 212014109
Dotnet 2015 2016 2017 ieee project list-with abstract
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
A Reliable Routing Technique for Wireless Sensor Networks
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
Incentive Compatible Privacy Preserving Data Analysis
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
Observability for modern applications
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
Gf3311081111
The Champion Supervisor
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
SECURE TRANSMISSION OF DATA IN SMART GRID WITH THE AID OF ELLIPTIC CURVE CRYP...
A COMPARISON BETWEEN PARALLEL AND SEGMENTATION METHODS USED FOR IMAGE ENCRYPT...
Ijcnc050208
Paper id 212014109
Ad

Similar to A Survey on Privacy-Preserving Data Aggregation Without Secure Channel (20)

DOCX
Collusion tolerable privacy-preserving sum
DOCX
Collusion tolerable privacy-preserving sum
DOCX
COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...
DOCX
COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...
PDF
Securing Personal Information in Data Mining
PDF
PRIVATE OVER-THRESHOLD AGGREGATION PROTOCOLS OVER DISTRIBUTED DATASETS
DOC
Efficient and privacy aware data aggregation in mobile sensing
DOCX
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
DOCX
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
DOCX
2014 IEEE JAVA NETWORK SECURITY PROJECT Efficient and privacy aware data aggr...
DOCX
JPJ1429 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
PDF
International Journal of Engineering Research and Development (IJERD)
PDF
REU Group 2 - Paper
PDF
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
PDF
Efficient Data Mining Of Association Rules in Horizontally Distributed Databases
PDF
Private and Secured data Transmission and Analysis for Wireless Ad-hoc Network
PDF
To allot secrecy-safe association rules mining schema using FP tree
PDF
PUBLIC INTEGRIYT AUDITING FOR SHARED DYNAMIC DATA STORAGE UNDER ONTIME GENERA...
PDF
Ijarcet vol-2-issue-3-901-903
DOCX
efficient and privacy aware data aggregation in mobile sensing
Collusion tolerable privacy-preserving sum
Collusion tolerable privacy-preserving sum
COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...
COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...
Securing Personal Information in Data Mining
PRIVATE OVER-THRESHOLD AGGREGATION PROTOCOLS OVER DISTRIBUTED DATASETS
Efficient and privacy aware data aggregation in mobile sensing
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
2014 IEEE JAVA NETWORK SECURITY PROJECT Efficient and privacy aware data aggr...
JPJ1429 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
International Journal of Engineering Research and Development (IJERD)
REU Group 2 - Paper
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
Efficient Data Mining Of Association Rules in Horizontally Distributed Databases
Private and Secured data Transmission and Analysis for Wireless Ad-hoc Network
To allot secrecy-safe association rules mining schema using FP tree
PUBLIC INTEGRIYT AUDITING FOR SHARED DYNAMIC DATA STORAGE UNDER ONTIME GENERA...
Ijarcet vol-2-issue-3-901-903
efficient and privacy aware data aggregation in mobile sensing
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
bas. eng. economics group 4 presentation 1.pptx
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PDF
Well-logging-methods_new................
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPT
Mechanical Engineering MATERIALS Selection
PPT
Project quality management in manufacturing
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
Geodesy 1.pptx...............................................
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
web development for engineering and engineering
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
CH1 Production IntroductoryConcepts.pptx
Operating System & Kernel Study Guide-1 - converted.pdf
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
bas. eng. economics group 4 presentation 1.pptx
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Well-logging-methods_new................
Embodied AI: Ushering in the Next Era of Intelligent Systems
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Mechanical Engineering MATERIALS Selection
Project quality management in manufacturing
Foundation to blockchain - A guide to Blockchain Tech
CYBER-CRIMES AND SECURITY A guide to understanding
Geodesy 1.pptx...............................................
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
web development for engineering and engineering

A Survey on Privacy-Preserving Data Aggregation Without Secure Channel

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET ISO 9001:2008 Certified Journal Page 133 A SURVEY ON PRIVACY-PRESERVING DATA AGGREGATION WITHOUT SECURE CHANNEL Kshitija Nandgaonkar1, Swarupa Kamble2 1 M.E. Student, Computer Engg ., RMD Sinhgad School of Engineering, Pune ,Maharashtra, India 2 Assistant Professor ,Dept. Computer Engg. ,RMD Sinhgad School of Engineering, Pune, Maharashtra ,India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - The Privacy-preserving data aggregation problem becoming an important issue in the field of applied cryptography. Most research has been carried out to securely outsource individual's privately owned data to an untrusted aggregator, or to enable multiple parties to jointly aggregate their sensitive data while preserving privacy. However many research require secure pair-wise channel and it suffers from high complexity. This paper describes sum and product calculation protocol that enables an external aggregator or multiple parties to perform data aggregation over participants data while preserving the data privacy. Key Words: Privacy-preserving, Data aggregation, Secure channels, SMC, Homomorphic. 1. INTRODUCTION As people are becoming more concerned about their privacy these days, the privacy-preservability is very important. A fundamental problem is that of private data analysis where a third party has to compute some aggregate statistics over some sensitive data held by individuals. This problem finds concrete applications in a number of situations. When the third party, called hereafter aggregator, is trusted an easy solution would be to ask the users to encrypt their data using the aggregator's public key. Upon receiving the ciphertexts the aggregator applies its private key to recover the data in clear and then compute statistics. The problem becomes much more challenging in the case of an untrusted aggregator. In many real life applications such as crowd sourcing or mobile cloud computing, individuals need to give their delicate data (location-specific or personal information related) to get particular services from the entire system (e.g., location based services or mobile based social networking services). The data aggregation problem usually involves two different models:  an external aggregator will gather the data and performs an aggregation function on participants' data (e.g., crowd sourcing);  participants will together calculate a specific aggregation function where input data being provided by themselves (e.g., social networking services). However, the individual's data should be kept secret, and the aggregator or other participants are not supposed to learn any useful information about it. Secure Multi-party Computation (SMC), Homomorphic Encryption (HE) and other cryp tographic methodologies can be employed to solve this problem, but these techniques are subject to some limitations in this problem. Many real-world applications have benefitted tremendously from the ability to collect and mine data coming from multiple individuals and organizations. These applications have also spurred numerous concerns over the privacy of user data. In this paper, we study how an untrusted aggregator or mutiple parties can gather information and learn aggregate statistics over individual privacy. For example, consider a smart grid operator who wishes to track the total electricity consumption of a neighborhood every 15 minutes, for scheduling and optimization purposes. Since such power consumption data can reveal sensitive information about individuals presence and activities, we wish to perform such aggregation in a privacy-preserving manner. 2. LITERATURE SURVEY C. Castelluccia, A. Chan, E. Mykletun, and G. Tsudik has published paper on Efficient and provably secure aggregation of encrypted data in wireless sensor network [1], in this authors had designed a symmetric key homomorphic encryption scheme which is an addition to homomorphic for conducting the aggregation operations on the ciphertexts. They uses a modular addition, so the scheme is good for CPU bounded devices such as sensor
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET ISO 9001:2008 Certified Journal Page 134 nodes in WSN. Their scheme can also efficiently compute various statistical values such as mean, variance and deviation. However, since they used the symmetric homomorphic encryption, their aggregator could decrypt each individual sensors data, and they assumed the trusted aggregator in their model. R. Sheikh, B. Kumar, and D. Mishra, presented a paper on Privacy preserving k secure sum protocol [2], in this paper author proposed a k-secure sum protocol, which is extended from the work of Clifton et al. [3]. They significantly reduced the probability of data leakage occurring in [3] by segmenting the data block of individual party, and distributing segments to other parties. Here, sum of each party’s segments is his data, therefore the final sum of all segments are sum of all parties data. This scheme can be easily converted to k-secure product protocol by converting each addition to multiplication. However, pair-wise unique secure communication channels should be given between each pair of users such that only the receiver and the sender know the transmitted segment. Otherwise, each party’s secret data can be calculated by performing O(k) computations. In this paper, we remove the limitation of using secure communication channels. T. Jung, X. Mao, X.-y. Li, S.-J. Tang, W. Gong, and L. Zhang, published a paper on Privacy-preserving data aggregation without secure channel: multivariate polynomial evaluation [4], in this paper author assume that all the communication channels in protocol are insecure. Anyone can eavesdrop them to intercept the data being transferred. To address the challenges of insecure communication channel, they assume that the discrete logarithm problem is computationally hard if: 1) the orders of the integer groups are large prime numbers; 2) the involved integer numbers are large numbers. The security of their scheme relies on this assumption. They further assume that there is a secure pseudorandom function (PRF) which can choose a random element from a group such that this element is computationally indistinguishable to uniform random. M. Joye and B. Libert, has published paper on A scalable scheme for privacy-preserving aggregation of time-series data [5] in this authors have proposed a solution for accommodating large plaintext data from multiple users. In this paper they address problem of private data analysis where a third party has to compute some aggregate statistics over some sensitive data held by individuals. A scheme supports a large plaintext spaces and number of users. It also allows the decryption algorithm to operate in constant time, regardless of the number of users. Additionally the scheme also provides a on-line/off-line efficiency using pre-computations, the encryptor is left with a mere modular multiplication in the on-line phase (i.e., when the data to be encrypted is known), which is highly desirable when computations take place on resource-limited devices. This paper presented a new scheme allowing an untrusted aggregator to evaluate the sum of user’s private inputs. In contrast to prior solutions, there is no restriction on the message space or on the number of users. This results in always fast decryption and aggregation, even over large plaintext spaces and/or population of users We note that Dong et al. [6] investigated verifiable privacy preserving dot production of two vectors and Zhang et al. [7] proposed verifiable multiparty computation, both of which can be partially or fully exploited later. Designing privacy preserving data aggregation while providing verification of the correctness of the provided data is a future work. Shi et al. [8] proposed a construction that n participants periodically upload encrypted values to an aggregator, and the aggregator computes the sum of those values without learning anything else. This scheme is close to our solution, but they assumed a trusted key dealer in their model. In this paper, the trusted aggregator in [1] is removed since data privacy against the aggregator is also a top concern these days. Unlike [2], we assumed insecure channels, which enabled us to get rid of expensive and vulnerable key pre-distribution. We did not segment each individuals data, our protocols only incur constant communication overhead for each participant. Our scheme is also based on the hardness of the discrete logarithm problem like [8], but we do not trivially employ brute- force manner in decryption, instead, we employ our novel efficient protocols for sum and product calculation. 3. PROBLEM STATEMENT 3.1 Problem Analysis Assume that there are n participants { p1,p2,....,pn } and each participant pi has a privately known data xi from Zp. The privacy-preserving data aggregation problem is to compute sum or product of xi jointly or by an aggregator while preserving the data privacy. That is, the objective of the aggregator or the participants is to compute the following polynomial without knowing any individual xi: Or Here vector x = (x1; x2,....xn). For simplicity, we assume that the final result f(x) is positive and bounded from above by a large prime number P.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET ISO 9001:2008 Certified Journal Page 135 3.2 Security Model Firstly, we assume that all the communication channels in our protocol are insecure. Anyone can eavesdrop them to intercept the data being transferred. To address the challenges of insecure communication channel, we assume that the following CDH problem is computationally intractable, i.e., any probabilistic polynomial time adversary has negligible chance to solve the following problem: 3.2.1 Definition 1 (CDH Problem in G) The Computational Diffe-Hellman problem in a multiplicative group G with generator g is defined as follows: given only g, ga, gb ε G where a, b ε Z, compute gab without knowing a or b. Additionally, similar Decisional Diffe-Hellman(DDH) problem is defined as follows: 3.2.2 Definition 2 (DDH Problem in G) The Decisional Diffe-Hellman problem in a multiplicative group G with generator g is defined as follows: given only g, ga, gb , gc ε G where a, b, c ε Z, decide if gab = gc. Our protocol is based on the assumption that it is computational expensive to solve the CDH problem. Then, we define the security of our privacy-preserving sum and product calculation as follows. 3.2.3 Definition 3 (CDH-Security in G) We say our privacy-preserving (sum or product) calculation is CDH-secure in G if any Probabilistic Polynomial Time Adversary (PPTA) who cannot solve the CDH problem with non-negligible chance has negligible chance to infer any honest participants private value in G. 4. SYSTEM ARCHITECTURE AND DESIGN There are two models for aggregation of private data as: One Aggregator Model and Participants Only Model. These two models are general cases we are faced with in real applications Fig. 1 – System Architecture A figure shows a system architecture of data aggregation. In this data comes from different user like medical data, location based data, or personal information etc. has been aggregated by external aggregator. An external aggregator or multiple parties will perform encryption on aggregated data to maintain data privacy. The aggregator or participants need to learn privacy preserving sum and product calculation protocol. 4.1 One Aggregator Model In the first model, we have one aggregator A who wants to compute the function f(x). We assume the aggregator is untrustful and curious. That is, he always eavesdrops the communications between participants and tries to access their input data, but also follow the protocol specification. We also assume participants do not trust each other and that they are curious as well, i.e., they also eavesdrop all the communications and follow the protocol specification. In this model, any single participant pi is not allowed to compute the final result f(x). 4.1.1 Sum and Product Calculation One Aggregator Model can be used to calculate product and sum of participants privately owned data. In this aggregator A acts as n+1th participant and will compute sum and product for each participants. Here, each participant will broadcast its ciphertext data to aggregator. 4.2 Participant Only Model The second model is similar to the first one except that there are n participants only and there is no aggregator. In this model, all the participants are equal and they all will calculate the final aggregation result f(x). 4.2.1 Sum and Product Calculation In participant only model, all participant will jointly compute sum and product of each participants data. In this data is share among all participants of communication. To encrypt data a random key is generated and it is share among all participants. 5. CONCLUSION This paper presents a privacy preserving sum and product calculation of privately owned data without need of secure channel. Two models can be used for aggregation of data: One aggregator model and Participant only model. A survey describes that, sum and product of sensitive data can be computed without the need of pair wise secure channel. Thus reduces overhead of maintaining each participants key pair.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET ISO 9001:2008 Certified Journal Page 136 REFERENCES [1] C. Castelluccia, A. Chan, E. Mykletun, and G. Tsudik, “Efficient and Provably secure aggregation of encrypted data in wireless sensor networks”, Transactions on sensor Networks(TOSN), 2009 [2] R. Sheikh, B. Kumar, D. Mishra, “ Privacy preserving k- secure Sum Protocol”, Arxiv Preprint arXiv:0912.0956, 2009 [3] C. Clifton, M. Kantarcioglu, J. Vaidya, X. Lin, and M.Zhu, “ Tools for privacy preserving distributed data mining”, SIGKDD Explorations Newsletter,2002 [4] T. Jung, X. Mao, X.-y. Li, S.-J. Tang, W. Gong, and L. Zhang, “ Privacy-preserving data aggregation without secure channel: multivariate polynomial evaluation,” in INFOCOM. IEEE, 2013. [5] M. Joye and B. Libert, “A scalable scheme for privacy- preserving aggregation of time-series data”, in Financial Cryptography and Data Security, (IFCA) 2013. [6] W. Dong, V. Dave, L. Qiu, and Y. Zhang, “Secure friend discovery in mobile social networks,” in IEEE INFOCOM, 2011, pp. 16471655. [7] L. Zhang, X. Li, Y. Liu, and T. Jung, “ Verifiable private multi-party computation: ranging and ranking”, in INFOCOM Mini-conference, IEEE, 2013 [8] E. Shi, T. Chan, E. Rieffel, R. Chow, and D. Song, “ Privacy-preserving aggregation of time-series data”, in NDSS, vol.17, 2011.