Title :
Analysis and Improvement of Privacy-Preserving Frequent Item Protocol for Accountable Computation Framework
Author :
Su, Chunhua ; Wang, Guilin ; Sakurai, Kouichi
Author_Institution :
Cryptography & Security Dept., Inst. for Infocomm Res., Singapore, Singapore
Abstract :
Nowadays, data collection and processing becomes ubiquitous in social and business areas, especially in Internet of Things. However, sensitive information leakage is a critical issue. To solve problem, privacy-preserving techniques are strongly needed. Jiang et al. proposed a protocol of finding frequent item in accountable computing (AC) framework which enables two parties to conduct collaborative computation on their transactional databases to find out the common frequent items without disclosing their private data to the other party. Their scheme was proposed in a secure two-party computation model against malicious adversaries. In this paper, we analyze the implementation details of AC-framework and identify some security weaknesses in their scheme. Furthermore, we clarify the security requirements for the AC-framework and present an augmented solution to enhance security.
Keywords :
Internet; cryptographic protocols; data mining; data privacy; transaction processing; AC framework; Internet of Things; accountable computation framework; accountable computing framework; business areas; collaborative computation; malicious adversaries; privacy-preserving frequent item protocol; private data; secure two-party computation model; security enhancement; security weakness identification; sensitive information leakage; social areas; transactional databases; ubiquitous data collection; ubiquitous data processing; Computational modeling; Encryption; Protocols; Public key; Vectors; Internet of Thing; accountable computation; cryptographic protocol; data collection; privacy-preserving;
Conference_Titel :
Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on
Conference_Location :
Liverpool
Print_ISBN :
978-1-4673-2172-3
DOI :
10.1109/TrustCom.2012.87