Enabling privacy-preserving non-interactive computation for Hamming distance

被引:2
|
作者
Gao, Wenjing [1 ]
Liang, Wei [2 ]
Hao, Rong [1 ]
Yu, Jia [1 ]
机构
[1] Qingdao Univ, Coll Comp Sci & Technol, Qingdao 266071, Peoples R China
[2] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan 411201, Peoples R China
基金
中国国家自然科学基金;
关键词
Data privacy; Hamming distance; Cloud computing; Secure outsourcing; Homomorphic encryption; REGRESSION; RETRIEVAL; SCHEMES;
D O I
10.1016/j.ins.2024.120592
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Hamming distance is a measure of the similarity between two strings of the same length. Privacy -preserving Hamming distance computation allows data users to obtain the Hamming distance between their data without disclosing their respective private data. The existing privacypreserving protocols for Hamming distance computation require multiple rounds of online interactive computation between two data users. To address this issue, we propose a new Privacy -preserving non -interactive Hamming Distance Computation (PHDC) protocol. Different from previous works, we adopt the strategy of secure outsourcing to avoid the online interactive computation between data users. We move the Hamming distance computation from the user side to the cloud side. The cloud server is responsible for the Hamming distance computation under privacy protection. To preserve data privacy, we propose a novel blinding technique for user data. Data users initially blind their data using homomorphic encryption and randomization techniques. The edge server is responsible for data aggregation and further data blindness. In this way, data users only need to outsource their encrypted data to the edge server, and there is no online interactive computation between data users. With the assistance of the edge server and the cloud server, the privacy -preserving Hamming distance computation is achieved. The security analysis demonstrates that the protocol guarantees the data privacy under the semi -honest adversarial model. The theoretical analysis and experimental results illustrate the efficiency of the proposed protocol.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] Non-interactive verifiable privacy-preserving federated learning
    Xu, Yi
    Peng, Changgen
    Tan, Weijie
    Tian, Youliang
    Ma, Minyao
    Niu, Kun
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 128 : 365 - 380
  • [2] Non-interactive privacy-preserving neural network prediction
    Ma, Xu
    Chen, Xiaofeng
    Zhang, Xiaoyu
    INFORMATION SCIENCES, 2019, 481 : 507 - 519
  • [3] Non-interactive set intersection for privacy-preserving contact tracing
    Wu, Axin
    Yang, Yuer
    Wen, Jinghang
    Zhang, Yu
    Zhao, Qiuxia
    JOURNAL OF SYSTEMS ARCHITECTURE, 2025, 158
  • [4] Non-interactive Privacy-preserving k-NN Classifier
    Pereira, Hilder V. L.
    Aranha, Diego F.
    ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 362 - 371
  • [5] Efficient and Privacy-Preserving Non-Interactive Truth Discovery for Mobile Crowdsensing
    Zhang, Chuan
    Zhu, Liehuang
    Xu, Chang
    Ni, Jianbing
    Huang, Cheng
    Shen, Xuemin
    2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2020,
  • [6] Traceable and Privacy-Preserving Non-Interactive Data Sharing in Mobile Crowdsensing
    Song, Fuyuan
    Qin, Zheng
    Liang, Jinwen
    Xiong, Pulei
    Lin, Xiaodong
    2021 18TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2021,
  • [7] Non-Interactive Privacy-Preserving Truth Discovery in Crowd Sensing Applications
    Tang, Xiaoting
    Wang, Cong
    Yuan, Xingliang
    Wang, Qian
    IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2018), 2018, : 1997 - 2005
  • [8] Non-interactive, Secure Verifiable Aggregation for Decentralized, Privacy-Preserving Learning
    Brunetta, Carlo
    Tsaloli, Georgia
    Liang, Bei
    Banegas, Gustavo
    Mitrokotsa, Aikaterini
    INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 510 - 528
  • [9] Non-interactive and privacy-preserving neural network learning using functional encryption
    Deng, Guoqiang
    Duan, Xuefeng
    Tang, Min
    Zhang, Yuhao
    Huang, Ying
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2023, 145 : 454 - 465
  • [10] PANDA: Lightweight non-interactive privacy-preserving data aggregation for constrained devices
    Wang, Mei
    He, Kun
    Chen, Jing
    Du, Ruiying
    Zhang, Bingsheng
    Li, Zengpeng
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 131 : 28 - 42