Collusion-Tolerable and Efficient Privacy-Preserving Time-Series Data Aggregation Protocol

Many miraculous ideas have been proposed to deal with the privacy-preserving time-series data aggregation problem in pervasive computing applications, such as mobile cloud computing. The main challenge consists in computing the global statistics of individual inputs that are protected by some confid...

Full description

Bibliographic Details
Main Authors: Yongkai Li, Shubo Liu, Jun Wang, Mengjun Liu
Format: Article
Language:English
Published: Hindawi - SAGE Publishing 2016-07-01
Series:International Journal of Distributed Sensor Networks
Online Access:https://doi.org/10.1177/155014771341606
_version_ 1797712075698470912
author Yongkai Li
Shubo Liu
Jun Wang
Mengjun Liu
author_facet Yongkai Li
Shubo Liu
Jun Wang
Mengjun Liu
author_sort Yongkai Li
collection DOAJ
description Many miraculous ideas have been proposed to deal with the privacy-preserving time-series data aggregation problem in pervasive computing applications, such as mobile cloud computing. The main challenge consists in computing the global statistics of individual inputs that are protected by some confidentiality mechanism. However, those works either suffer from collusive attack or require time-consuming initialization at every aggregation request. In this paper, we proposed an efficient aggregation protocol which tolerates up to k passive adversaries that do not try to tamper the computation. The proposed protocol does not require a trusted key dealer and needs only one initialization during the whole time-series data aggregation. We formally analyzed the security of our protocol and results showed that the protocol is secure if the Computational Diffie-Hellman (CDH) problem is intractable. Furthermore, the implementation showed that the proposed protocol can be efficient for the time-series data aggregation.
first_indexed 2024-03-12T07:16:26Z
format Article
id doaj.art-ac1385712d684c8ebd89b432d9b85e0e
institution Directory Open Access Journal
issn 1550-1477
language English
last_indexed 2024-03-12T07:16:26Z
publishDate 2016-07-01
publisher Hindawi - SAGE Publishing
record_format Article
series International Journal of Distributed Sensor Networks
spelling doaj.art-ac1385712d684c8ebd89b432d9b85e0e2023-09-02T22:46:57ZengHindawi - SAGE PublishingInternational Journal of Distributed Sensor Networks1550-14772016-07-011210.1177/155014771341606Collusion-Tolerable and Efficient Privacy-Preserving Time-Series Data Aggregation ProtocolYongkai Li0Shubo Liu1Jun Wang2Mengjun Liu3School of Computer, Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education and State Key Lab of Software Engineering, Wuhan University, Wuhan 430072, ChinaSchool of Computer, Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education and State Key Lab of Software Engineering, Wuhan University, Wuhan 430072, ChinaSchool of Computer, Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education and State Key Lab of Software Engineering, Wuhan University, Wuhan 430072, ChinaSchool of Computer, Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education and State Key Lab of Software Engineering, Wuhan University, Wuhan 430072, ChinaMany miraculous ideas have been proposed to deal with the privacy-preserving time-series data aggregation problem in pervasive computing applications, such as mobile cloud computing. The main challenge consists in computing the global statistics of individual inputs that are protected by some confidentiality mechanism. However, those works either suffer from collusive attack or require time-consuming initialization at every aggregation request. In this paper, we proposed an efficient aggregation protocol which tolerates up to k passive adversaries that do not try to tamper the computation. The proposed protocol does not require a trusted key dealer and needs only one initialization during the whole time-series data aggregation. We formally analyzed the security of our protocol and results showed that the protocol is secure if the Computational Diffie-Hellman (CDH) problem is intractable. Furthermore, the implementation showed that the proposed protocol can be efficient for the time-series data aggregation.https://doi.org/10.1177/155014771341606
spellingShingle Yongkai Li
Shubo Liu
Jun Wang
Mengjun Liu
Collusion-Tolerable and Efficient Privacy-Preserving Time-Series Data Aggregation Protocol
International Journal of Distributed Sensor Networks
title Collusion-Tolerable and Efficient Privacy-Preserving Time-Series Data Aggregation Protocol
title_full Collusion-Tolerable and Efficient Privacy-Preserving Time-Series Data Aggregation Protocol
title_fullStr Collusion-Tolerable and Efficient Privacy-Preserving Time-Series Data Aggregation Protocol
title_full_unstemmed Collusion-Tolerable and Efficient Privacy-Preserving Time-Series Data Aggregation Protocol
title_short Collusion-Tolerable and Efficient Privacy-Preserving Time-Series Data Aggregation Protocol
title_sort collusion tolerable and efficient privacy preserving time series data aggregation protocol
url https://doi.org/10.1177/155014771341606
work_keys_str_mv AT yongkaili collusiontolerableandefficientprivacypreservingtimeseriesdataaggregationprotocol
AT shuboliu collusiontolerableandefficientprivacypreservingtimeseriesdataaggregationprotocol
AT junwang collusiontolerableandefficientprivacypreservingtimeseriesdataaggregationprotocol
AT mengjunliu collusiontolerableandefficientprivacypreservingtimeseriesdataaggregationprotocol