Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1109/ICDCS.2014.27guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

e-PPI: Locator Service in Information Networks with Personalized Privacy Preservation

Published: 30 June 2014 Publication History

Abstract

In emerging information networks, having a privacy pre-serving index (or PPI) is critically important for locating information of interest for data sharing across autonomous providers while preserving privacy. An understudied problem for PPI techniques is how to provide controllable privacy preservation, given the innate difference of privacy concerns regarding different data owners. In this paper we present a personalized privacy preserving index, coined ∊-PPI, which guarantees quantitative privacy preservation differentiated by personal identities. We devise a new common-identity attack that breaks existing PPI's and propose an identity-mixing protocol against the attack in ∊-PPI. The proposed ∊-PPIconstruction protocol is the first without any trusted third party and/or trust relationships between providers. We have implemented our ∊-PPI construction protocol by using generic MPC techniques (secure multi-party computation) and optimized the performance to a practical level by minimizing the expensive MPC part.

Cited By

View all
  • (2017)Exploiting Contextual Information in Attacking Set-Generalized TransactionsACM Transactions on Internet Technology10.1145/310616517:4(1-20)Online publication date: 18-Sep-2017

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
ICDCS '14: Proceedings of the 2014 IEEE 34th International Conference on Distributed Computing Systems
June 2014
683 pages
ISBN:9781479951697

Publisher

IEEE Computer Society

United States

Publication History

Published: 30 June 2014

Author Tag

  1. record locator service, health informatics, information sharing, privacy preservation, database, secure computation, mpc, secret sharing

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2017)Exploiting Contextual Information in Attacking Set-Generalized TransactionsACM Transactions on Internet Technology10.1145/310616517:4(1-20)Online publication date: 18-Sep-2017

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media