Enabling privacy-preserving non-interactive computation for Hamming distance

被引:2
|
作者
Gao, Wenjing [1 ]
Liang, Wei [2 ]
Hao, Rong [1 ]
Yu, Jia [1 ]
机构
[1] Qingdao Univ, Coll Comp Sci & Technol, Qingdao 266071, Peoples R China
[2] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan 411201, Peoples R China
基金
中国国家自然科学基金;
关键词
Data privacy; Hamming distance; Cloud computing; Secure outsourcing; Homomorphic encryption; REGRESSION; RETRIEVAL; SCHEMES;
D O I
10.1016/j.ins.2024.120592
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Hamming distance is a measure of the similarity between two strings of the same length. Privacy -preserving Hamming distance computation allows data users to obtain the Hamming distance between their data without disclosing their respective private data. The existing privacypreserving protocols for Hamming distance computation require multiple rounds of online interactive computation between two data users. To address this issue, we propose a new Privacy -preserving non -interactive Hamming Distance Computation (PHDC) protocol. Different from previous works, we adopt the strategy of secure outsourcing to avoid the online interactive computation between data users. We move the Hamming distance computation from the user side to the cloud side. The cloud server is responsible for the Hamming distance computation under privacy protection. To preserve data privacy, we propose a novel blinding technique for user data. Data users initially blind their data using homomorphic encryption and randomization techniques. The edge server is responsible for data aggregation and further data blindness. In this way, data users only need to outsource their encrypted data to the edge server, and there is no online interactive computation between data users. With the assistance of the edge server and the cloud server, the privacy -preserving Hamming distance computation is achieved. The security analysis demonstrates that the protocol guarantees the data privacy under the semi -honest adversarial model. The theoretical analysis and experimental results illustrate the efficiency of the proposed protocol.
引用
收藏
页数:14
相关论文
共 50 条
  • [21] Privacy-Preserving Computation: Doomed to Succeed
    Campbell, Mark
    COMPUTER, 2022, 55 (08) : 95 - 99
  • [22] HEaaN-NB: Non-Interactive Privacy-Preserving Naive Bayes Using CKKS for Secure Outsourced Cloud Computing
    Han, Boyoung
    Shin, Hojune
    Kim, Yeonghyeon
    Choi, Jina
    Lee, Younho
    IEEE ACCESS, 2024, 12 : 110762 - 110780
  • [23] Privacy-Preserving Shortest Path Computation
    Wu, David J.
    Zimmerman, Joe
    Planul, Jeremy
    Mitchell, John C.
    23RD ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2016), 2016,
  • [24] Privacy-Preserving HMM Forward Computation
    Ziegeldorf, Jan Henrik
    Metzke, Jan
    Rueth, Jan
    Henze, Martin
    Wehrle, Klaus
    PROCEEDINGS OF THE SEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'17), 2017, : 83 - 94
  • [25] Non-interactive Privacy Preserving Recurrent Neural Network Prediction with Homomorphic Encryption
    Podschwadt, Robert
    Takabi, Daniel
    2021 IEEE 14TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2021), 2021, : 65 - 70
  • [26] DIMY: Enabling privacy-preserving contact tracing
    Ahmed, Nadeem
    Michelin, Regio A.
    Xue, Wanli
    Putra, Guntur Dharma
    Ruj, Sushmita
    Kanhere, Salil S.
    Jha, Sanjay
    Journal of Network and Computer Applications, 2022, 202
  • [27] Enabling Privacy-preserving Auctions in Big Data
    Jung, Taeho
    Li, Xiang-Yang
    2015 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2015, : 173 - 178
  • [28] Non-Interactive Secure Multiparty Computation
    Beimel, Amos
    Gabizon, Ariel
    Ishai, Yuval
    Kushilevitz, Eyal
    Meldgaard, Sigurd
    Paskin-Cherniaysky, Anat
    ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT II, 2014, 8617 : 387 - 404
  • [29] DIMY: Enabling privacy-preserving contact tracing
    Ahmed, Nadeem
    Michelin, Regio A.
    Xue, Wanli
    Putra, Guntur Dharma
    Ruj, Sushmita
    Kanhere, Salil S.
    Jha, Sanjay
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2022, 202
  • [30] Reusable Non-Interactive Secure Computation
    Chase, Melissa
    Dodis, Yevgeniy
    Ishai, Yuval
    Kraschewski, Daniel
    Liu, Tianren
    Ostrovsky, Rafail
    Vaikuntanathan, Vinod
    ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT III, 2019, 11694 : 462 - 488