646 Hits in 4.3 sec

Efficient Delegated Private Set Intersection on Outsourced Private Datasets

Aydin Abadi, Sotirios Terzis, Roberto Metere, Changyu Dong
2017 IEEE Transactions on Dependable and Secure Computing  
In this paper, we propose two protocols for delegated PSI computation on outsourced private datasets.  ...  Although a set of efficient PSI protocols have been designed, none support outsourcing of the datasets and the computation.  ...  O-PSI: OUR FIRST PROTOCOL In this section, we present O-PSI our first protocol for delegated private set intersection on outsourced private datasets.  ... 
doi:10.1109/tdsc.2017.2708710 fatcat:ydtpezw3r5eu7bc7z427spcou4

O-PSI: Delegated Private Set Intersection on Outsourced Datasets [chapter]

Aydin Abadi, Sotirios Terzis, Changyu Dong
2015 IFIP Advances in Information and Communication Technology  
In this paper we design O-PSI, a protocol for delegated private set intersection on outsourced datasets based on a novel point-value polynomial representation.  ...  Private set intersection (PSI) has a wide range of applications such as privacy-preserving data mining.  ...  In other words, clients are interested in delegated private set intersection on outsourced data.  ... 
doi:10.1007/978-3-319-18467-8_1 fatcat:hvgdplodr5b7rju2alic2vvgii

Improved Secure Efficient Delegated Private Set Intersection [article]

Alireza Kavousi, Javad Mohajeri, Mahmoud Salmasizadeh
2020 arXiv   pre-print
Private Set Intersection (PSI) is a vital cryptographic technique used for securely computing common data of different sets.  ...  In EO-PSI, parties need to set up secure channels beforehand; otherwise, an attacker can easily eavesdrop on communications between honest parties and find private information.  ...  In this paper, we scrutinized the security of an efficient delegated private set intersection EO-PSI [19] and pointed out that this protocol is vulnerable against passive attacks.  ... 
arXiv:2004.03976v4 fatcat:334rfezgy5guxdjsaiolh63mau

VD-PSI: Verifiable Delegated Private Set Intersection on Outsourced Private Datasets [chapter]

Aydin Abadi, Sotirios Terzis, Changyu Dong
2017 Lecture Notes in Computer Science  
In this paper, we propose two protocols for delegated PSI computation on outsourced private datasets.  ...  Although a set of efficient PSI protocols have been designed, none support outsourcing of the datasets and the computation.  ...  O-PSI: OUR FIRST PROTOCOL In this section, we present O-PSI our first protocol for delegated private set intersection on outsourced private datasets.  ... 
doi:10.1007/978-3-662-54970-4_9 fatcat:tpljxppuh5gsbk5r43dmnnicba

Verifiable Delegated Set Intersection Operations on Outsourced Encrypted Data

Qingji Zheng, Shouhuai Xu
2015 2015 IEEE International Conference on Cloud Engineering  
We therefore motivate and introduce the novel notion of Verifiable Delegated Set Intersection on outsourced encrypted data (VDSI).  ...  Index Terms-Verifiable set intersection, delegated set intersection, outsourced encrypted data, verifiable outsourced computing ! • Q. Zheng and S. Xu are with the  ...  CONCLUSION We have introduced the novel notion of VDSI, which allows two users to outsource to the cloud their encrypted data sets as well as the set intersection operation on ciphertexts.  ... 
doi:10.1109/ic2e.2015.38 dblp:conf/ic2e/ZhengX15 fatcat:enmukzfvzne6tfs4veqwwtlpeq

CloudMine: Multi-Party Privacy-Preserving Data Analytics Service [article]

Dinh Tien Tuan Anh, Quach Vinh Thanh, Anwitaman Datta
2013 arXiv   pre-print
Likewise, there is an increased emphasis on performing analytics based on multiple datasets obtained from different data sources.  ...  It allows data owners to reliably detect if their cloud delegates have been lazy when carrying out the delegated computation.  ...  For the former, particularly, we intend to investigate how existing protocols for private set intersection (which scale better than our current protocol) can be modified to work in our delegate settings  ... 
arXiv:1206.2038v2 fatcat:db26xgnjf5duznf2n6ygdsc4py

On the Security of O-PSI: A Delegated Private Set Intersection on Outsourced Datasets (Extended Version)

Mehdi Mahdavi Oliaee, Mahshid Delavar, Mohammad Hassan Ameri, Javad Mohajeri, Mohammad Reza Aref
2018 Isecure  
Many Private Set Intersection (PSI) protocols have been introduced to address this issue.  ...  A B S T R A C T In recent years, determining the common information privately and efficiently between two mutually mistrusting parties have become an important issue in social networks.  ...  They named their protocols Outsourced-PSI (O-PSI) and Efficient Outsourced-PSI (EO-PSI) and claimed that they are secure against the corruption of one of the parties.  ... 
doi:10.22042/isecure.2018.120860.410 dblp:journals/isecure/OliaeeDAMA18 fatcat:j2yc6h3vhbaerhgxwrrfisiwa4

Privacy Preservation in Dynamic Bigdata for Verification and Correctness

Guthula Anitha Rani, Prof P Suresh Varma
2017 International Journal Of Engineering And Computer Science  
And also, the requester can verify the correctness of set operation results on the dataset sourced by workers and send to the cloud.  ...  The data analysis includes set operations like intersection, union, and complementation for filtering redundant data and pre-processing raw data. theme is a necessity of data exchange between the worker  ...  Dong et al. make use of new variant of bloom filter to achieve efficient PSI. bloom filter and homomorphic encryption are used to achieved outsourced private set intersection.  ... 
doi:10.18535/ijecs/v6i4.47 fatcat:t7njfjbxpvbrjji2qdfnpb5efm

Efficient Cloud-Based Private Set Intersection Protocol with Hidden Access Attribute and Integrity Verification

Jianhong Zhang, Menglong Wu, Marimuthu Karuppiah
2021 Security and Communication Networks  
To obtain private set intersection of a blinded dataset BT of dataset X uploaded by a special data owner, the stage is divided into three parts: Token1 generation, Token2 generation, and set intersection  ...  It also possesses a dataset Y and can request the CSP to generate a token in order to compute private set intersection X ∩ Y.  ... 
doi:10.1155/2021/3963037 fatcat:25tmskhsxbcbhhmnm3emsnpygu

Secure Association Rule Mining on Vertically Partitioned Data Using Private-Set Intersection

Kenta Nomura, Yoshiaki Shiraishi, Masami Mohri, Masakatu Morii
2020 IEEE Access  
This study focuses on the private-set intersection instead of the scalar product and shows that this intersection enables organizations to execute ARM on vertically partitioned data, allowing flexible  ...  Data mining entails the discovery of unexpected but reusable knowledge from large unorganized datasets. Among the many available data-mining algorithms, association rule mining (ARM) is very common.  ...  Therefore, we concentrate on the private-set intersection instead of the scalar product.  ... 
doi:10.1109/access.2020.3014330 fatcat:46izv2bljbedzjylqdhd5da27u

A Comprehensive Survey on Secure Outsourced Computation and its Applications

Yang Yang, Xindi Huang, XiMeng Liu, Hongju Cheng, Jian Weng, Xiangyang Luo, Victor Chang
2019 IEEE Access  
Then, we focus on the theories and evolution of homomorphic encryption, as well as the applications of the basic operations and application-specific tasks.  ...  INDEX TERMS Secure outsourced computing, privacy preserving, homomorphic encryption, secure outsourced machine learning, data processing.  ...  In the delegating environments, one or more clients obtain the intersection result while their individual sets are kept private.  ... 
doi:10.1109/access.2019.2949782 fatcat:ternbyhqezgd5cvhtfqfggqdqq

New Approach to Set Representation and Practical Private Set-Intersection Protocols

Ou Ruan, Zihao Wang, Jing Mi, Mingwu Zhang
2019 IEEE Access  
INDEX TERMS Private set-intersection, set representation, private set-intersection cardinality, privacy-preserving protocols.  ...  Private set intersection (PSI) is a fundamental cryptographic protocol, which has many important applications, such as personal properties matching, data sharing, or data mining.  ...  [9] , [10] presented two delegated PSI protocols for the outsourced public cloud systems [11] based on additive homomorphic PKC and point-value set representation.  ... 
doi:10.1109/access.2019.2917057 fatcat:yg2kfunxevdflamzvon2amuk6y

Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data

Wenhai Sun, Xuefeng Liu, Wenjing Lou, Y. Thomas Hou, Hui Li
2015 2015 IEEE Conference on Computer Communications (INFOCOM)  
The proposed verification mechanism is efficient and flexible, which can be either delegated to a public trusted authority (TA) or be executed privately by data users.  ...  Experimental result shows its practical efficiency even with a large dataset.  ...  Search Efficiency The main computational cost for search process is to do the set intersection on t binary index vectors of size n with complexity O(tn).  ... 
doi:10.1109/infocom.2015.7218596 dblp:conf/infocom/SunLLH015 fatcat:tdqtn3qeljhvjpqx6oca6npw6e

Security for cyberspace: challenges and opportunities

Jiang-xing Wu, Jian-hua Li, Xin-sheng Ji
2018 Frontiers of Information Technology & Electronic Engineering  
First, the traditional static security methods based on known threat characteristics can no longer effectively defend against novel threats, such as 0-day attacks and advanced persistent threats (APT).  ...  With the development of fog computing, the need has arisen to delegate private set intersection (PSI) on outsourced datasets to the fog.  ...  Fu-cai ZHOU's group proposed a novel primitive called "faster fog-aided private set intersection with integrity preserving," where the fog conducts delegated intersection operations over encrypted data  ... 
doi:10.1631/fitee.1840000 fatcat:nrnlqwgqn5agbfwjovro3yzhgi

Integrity Authentication for SQL Query Evaluation on Outsourced Databases: A Survey [article]

Bo Zhang, Boxiang Dong, Hui Wang
2018 arXiv   pre-print
This survey focuses on categorizing and reviewing the progress on the current approaches for result integrity of SQL query evaluation in the DaaS model.  ...  The survey also includes some potential future research directions for result integrity verification of the outsourced computations.  ...  Verification Protocols for Set Operations Set Intersection Given a collection of sets S = {S 1 , . . . , S t }, I = S 1 ∩ S 2 ∩ · · · ∩ S t is the correct intersection of S if and only if: • I ⊆ S 1  ... 
arXiv:1808.08313v1 fatcat:r6wqr6g4uvhg7fbaiecs5bre4m
« Previous Showing results 1 — 15 out of 646 results