Asynchronous privacy-preserving iterative computation on peer-to-peer networks

被引:0
|
作者
J. A. M. Naranjo
L. G. Casado
Márk Jelasity
机构
[1] University of Almería,Department of Computer Architecture and Electronics
[2] University of Szeged,undefined
[3] and Hungarian Academy of Sciences,undefined
[4] Research Group on AI,undefined
来源
Computing | 2012年 / 94卷
关键词
Asynchrony; Churn; Power iteration; Privacy preservation; P2P; 94A62; 68M14; 68M15;
D O I
暂无
中图分类号
学科分类号
摘要
Privacy preserving algorithms allow several participants to compute a global function collaboratively without revealing local information to each other. Examples of applications include trust management, collaborative filtering, and ranking algorithms such as PageRank. Most solutions that can be proven to be privacy preserving theoretically are not appropriate for highly unreliable, large scale, distributed environments such as peer-to-peer (P2P) networks because they either require centralized components, or a high degree of synchronism among the participants. At the same time, in P2P networks privacy preservation is becoming a key requirement. Here, we propose an asynchronous privacy preserving communication layer for an important class of iterative computations in P2P networks, where each peer periodically computes a linear combination of data stored at its neighbors. Our algorithm tolerates realistic rates of message drop and delay, and node churn, and has a low communication overhead. We perform simulation experiments to compare our algorithm to related work. The problem we use as an example is power iteration (a method used to calculate the dominant eigenvector of a matrix), since eigenvector computation is at the core of several practical applications. We demonstrate that our novel algorithm also converges in the presence of realistic node churn, message drop rates and message delay, even when previous synchronized solutions are able to make almost no progress.
引用
收藏
页码:763 / 782
页数:19
相关论文
共 50 条
  • [41] Framework for preserving security and privacy in peer-to-peer content distribution systems
    Qureshi, Amna
    Megias, David
    Rifa-Pous, Helena
    EXPERT SYSTEMS WITH APPLICATIONS, 2015, 42 (03) : 1391 - 1408
  • [42] Peer-to-Peer Privacy Preserving Reputation Inquiry: An Agent Assistant Approach
    Sy, Bon K.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (07): : 37 - 46
  • [43] Privacy-Preserving Peer-to-Peer Energy Trading in Blockchain-Enabled Smart Grids Using Functional Encryption
    Son, Ye-Byoul
    Im, Jong-Hyuk
    Kwon, Hee-Yong
    Jeon, Seong-Yun
    Lee, Mun-Kyu
    ENERGIES, 2020, 13 (06)
  • [44] Throughput Analysis of Peer-to-Peer UWB Asynchronous CDMA Networks
    Gu, Hongyu
    Yang, Chenyang
    2006 IEEE 64TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-6, 2006, : 1023 - 1027
  • [45] A Dual-active Spatial Cloaking Algorithm for Location Privacy Preserving in mobile Peer-to-Peer Networks
    Che, Yanzhe
    Yang, Qiang
    Hong, Xiaoyan
    2012 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2012,
  • [46] Multi-objective optimization based privacy preserving distributed data mining in Peer-to-Peer networks
    Das, Kamalika
    Bhaduri, Kanishka
    Kargupta, Hillol
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2011, 4 (02) : 192 - 209
  • [47] Multi-objective optimization based privacy preserving distributed data mining in Peer-to-Peer networks
    Kamalika Das
    Kanishka Bhaduri
    Hillol Kargupta
    Peer-to-Peer Networking and Applications, 2011, 4 : 192 - 209
  • [48] Study on Privacy Protection and Anonymous Communication in Peer-to-Peer Networks
    Chao, Gao
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 522 - 525
  • [49] Securely deploying distributed computation systems on peer-to-peer networks
    Vrancken, Kobe
    Piessens, Frank
    Strackx, Raoul
    SAC '19: PROCEEDINGS OF THE 34TH ACM/SIGAPP SYMPOSIUM ON APPLIED COMPUTING, 2019, : 328 - 337
  • [50] PEER-TO-PEER NETWORKS AND COMPUTATION: CURRENT TRENDS AND FUTURE PERSPECTIVES
    Gupta, Ankur
    Awasthi, Lalit K.
    COMPUTING AND INFORMATICS, 2011, 30 (03) : 559 - 594