Secure and Private Online Collaboration

نویسندگان

  • Keith Frikken
  • Keith B. Frikken
  • Michael Goodrich
  • Roberto Tamma
  • Marina Blanton
  • Sunil Prabhakar
  • Rei Safavi-Naini
  • Vinayak Deshpande
چکیده

Frikken, Keith B. Ph.D., Purdue University, August, 2005. Secure and Private Online Collaboration. Major Professor: Mikhail J. Atallah. In this thesis, we investigate confidentialityand privacy-preserving protocols. Confidentialityand privacy-preserving protocols (also called secure protocols) allow two or more parties to compute some function of their private inputs without revealing to any group of the parties information other than the cooperatively computed output and what can be deduced from this output and the group’s individual inputs (which is unavoidable, as it is inherently part of any such protocol). It has been shown previously that any function can be computed in such a manner; the study of computing any function securely is called Secure Multiparty Computation (SMC) or Secure Function Evaluation (SFE). However, before applying these techniques to a specific domain, one first has to identify problems where secure protocols are useful. When there is a situation where a secure protocol is needed, there will always be a secure protocol for computing the function by the general results described in the SMC literature. However, the general solutions are complex and in many cases there are more efficient domain-specific solutions. In this thesis we look at several application domains including: trust negotiation, credit checking, services for location-aware devices, contract negotiation, and secure biometric authentication. In these domains we identify situations where secure protocols are useful and then develop simple and efficient protocols for these situations.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Preserved Collaborative Secure Multiparty Data Mining

Problem statement: In the current modern business environment, its success is defined by collaboration, team efforts and partnership, rather than lonely spectacular individual efforts in isolation. So the collaboration becomes especially important because of the mutual benefit it brings. Sometimes, such collaboration even occurs among competitors, or among companies that have conflict of intere...

متن کامل

Secure Coprocessor-based Private Information Retrieval without Periodical Preprocessing

Early works on Private Information Retrieval (PIR) focused on minimizing the necessary communication overhead. They seemed to achieve this goal but at the expense of query response time. To mitigate this weakness, protocols with secure coprocessors were introduced. They achieve optimal communication complexity and better online processing complexity. Unfortunately, all secure coprocessor-based ...

متن کامل

Efficient Private Matching and Set Intersection

We consider the problem of computing the intersection of private datasets of two parties, where the datasets contain lists of elements taken from a large domain. This problem has many applications for online collaboration. We present protocols, based on the use of homomorphic encryption and balanced hashing, for both semi-honest and malicious environments. For lists of length k, we obtain O(k) ...

متن کامل

A Secure Multiparty Product Protocol for Preserving the Privacy in Collaborative Data Mining

In the modern business world, collaborative data mining becomes especially important because of the mutual benefit it brings to the collaborators. During the collaboration, each party of the collaboration needs to share its data with other parties. If the parties don't care about their data privacy, the collaboration can be easily achieved. Privacy concerns parties, each having a private data s...

متن کامل

TRIUMF: A Trusted Middleware for Fault-tolerant Secure Collaborative Computing

A collaboration is an activity conducted by two or more parties to achieve a common goal. Business collaborations are becoming an essential part of emerging business models. Organizations, however, are unable to reap true benefits of collaborations because of their security and privacy concerns. TRIUMF, the Trusted Middleware for Fault-tolerant secure collaborative computing, is aimed at enabli...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005