Secure and Private Online Collaboration
نویسندگان
چکیده
Frikken, Keith B. Ph.D., Purdue University, August, 2005. Secure and Private Online Collaboration. Major Professor: Mikhail J. Atallah. In this thesis, we investigate confidentialityand privacy-preserving protocols. Confidentialityand privacy-preserving protocols (also called secure protocols) allow two or more parties to compute some function of their private inputs without revealing to any group of the parties information other than the cooperatively computed output and what can be deduced from this output and the group’s individual inputs (which is unavoidable, as it is inherently part of any such protocol). It has been shown previously that any function can be computed in such a manner; the study of computing any function securely is called Secure Multiparty Computation (SMC) or Secure Function Evaluation (SFE). However, before applying these techniques to a specific domain, one first has to identify problems where secure protocols are useful. When there is a situation where a secure protocol is needed, there will always be a secure protocol for computing the function by the general results described in the SMC literature. However, the general solutions are complex and in many cases there are more efficient domain-specific solutions. In this thesis we look at several application domains including: trust negotiation, credit checking, services for location-aware devices, contract negotiation, and secure biometric authentication. In these domains we identify situations where secure protocols are useful and then develop simple and efficient protocols for these situations.
منابع مشابه
Preserved Collaborative Secure Multiparty Data Mining
Problem statement: In the current modern business environment, its success is defined by collaboration, team efforts and partnership, rather than lonely spectacular individual efforts in isolation. So the collaboration becomes especially important because of the mutual benefit it brings. Sometimes, such collaboration even occurs among competitors, or among companies that have conflict of intere...
متن کاملSecure Coprocessor-based Private Information Retrieval without Periodical Preprocessing
Early works on Private Information Retrieval (PIR) focused on minimizing the necessary communication overhead. They seemed to achieve this goal but at the expense of query response time. To mitigate this weakness, protocols with secure coprocessors were introduced. They achieve optimal communication complexity and better online processing complexity. Unfortunately, all secure coprocessor-based ...
متن کاملEfficient Private Matching and Set Intersection
We consider the problem of computing the intersection of private datasets of two parties, where the datasets contain lists of elements taken from a large domain. This problem has many applications for online collaboration. We present protocols, based on the use of homomorphic encryption and balanced hashing, for both semi-honest and malicious environments. For lists of length k, we obtain O(k) ...
متن کاملA Secure Multiparty Product Protocol for Preserving the Privacy in Collaborative Data Mining
In the modern business world, collaborative data mining becomes especially important because of the mutual benefit it brings to the collaborators. During the collaboration, each party of the collaboration needs to share its data with other parties. If the parties don't care about their data privacy, the collaboration can be easily achieved. Privacy concerns parties, each having a private data s...
متن کاملTRIUMF: A Trusted Middleware for Fault-tolerant Secure Collaborative Computing
A collaboration is an activity conducted by two or more parties to achieve a common goal. Business collaborations are becoming an essential part of emerging business models. Organizations, however, are unable to reap true benefits of collaborations because of their security and privacy concerns. TRIUMF, the Trusted Middleware for Fault-tolerant secure collaborative computing, is aimed at enabli...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005