Practical fault-tolerant data aggregation
From MaRDI portal
Publication:2822685
Abstract: During Financial Cryptography 2012 Chan et al. presented a novel privacy-protection fault-tolerant data aggregation protocol. Comparing to previous work, their scheme guaranteed provable privacy of individuals and could work even if some number of users refused to participate. In our paper we demonstrate that despite its merits, their method provides unacceptably low accuracy of aggregated data for a wide range of assumed parameters and cannot be used in majority of real-life systems. To show this we use both precise analytic and experimental methods. Additionally, we present a precise data aggregation protocol that provides provable level of security even facing massive failures of nodes. Moreover, the protocol requires significantly less computation (limited exploiting of heavy cryptography) than most of currently known fault tolerant aggregation protocols and offers better security guarantees that make it suitable for systems of limited resources (including sensor networks). To obtain our result we relax however the model and allow some limited communication between the nodes.
Recommendations
- Privacy-Preserving Stream Aggregation with Fault Tolerance
- Secure distributed data aggregation
- Privacy-preserving data aggregation with probabilistic range validation
- Private over-threshold aggregation protocols
- A distributed protocol for privacy preserving aggregation with non-permanent participants
Cites work
- scientific article; zbMATH DE number 4039795 (Why is no real title available?)
- Characteristic function of the positive part of a random variable and related results, with applications
- Computational Differential Privacy
- Definitions and properties of zero-knowledge proof systems
- Efficient fault-tolerant collision-free data aggregation scheduling for wireless sensor networks
- Negotiation-based protocols for disseminating information in wireless sensor networks
- Optimal lower bound for differentially private multi-party aggregation
- Practical fault-tolerant data aggregation
- Privacy-Preserving Stream Aggregation with Fault Tolerance
- Secret-Sharing Schemes: A Survey
- Theory of Cryptography
- Topics in Cryptology – CT-RSA 2004
Cited in
(6)- Secure distributed data aggregation
- Private over-threshold aggregation protocols
- Privacy-preserving data aggregation with probabilistic range validation
- Fault-tolerant aggregation: flow-updating meets mass-distribution
- Practical fault-tolerant data aggregation
- A novel fault-tolerant privacy-preserving cloud-based data aggregation scheme for lightweight health data
This page was built for publication: Practical fault-tolerant data aggregation
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2822685)