Analysis and improvement of privacy-preserving frequent item protocol for accountable computation framework

RIS ID

71279

Publication Details

Su, C., Wang, G. & Sakurai, K. (2012). Analysis and improvement of privacy-preserving frequent item protocol for accountable computation framework. IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (pp. 1012-1017). IEEE Xplore: IEEE.

Abstract

Nowadays, data collection and processing becomes ubiquitous in social and business areas, especially in Internet of Things. However, sensitive information leakage is a critical issue. To solve problem, privacy-preserving techniques are strongly needed. Jiang {\em et al.} proposed a protocol of finding frequent item in accountable computing (AC) framework which enables two parties to conduct collaborative computation on their transactional databases to find out the common frequent items without disclosing their private data to the other party. Their scheme was proposed in a secure two-party computation model against malicious adversaries. In this paper, we analyze the implementation details of AC-framework and identify some security weaknesses in their scheme. Furthermore, we clarify the security requirements for the AC-framework and present an augmented solution to enhance security. 2012 IEEE.

Please refer to publisher version or contact your library.

Share

COinS
 

Link to publisher version (DOI)

http://dx.doi.org/10.1109/TrustCom.2012.87