Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017, Article ID 6097253, 14 pages
https://doi.org/10.1155/2017/6097253
Research Article

PMDP: A Framework for Preserving Multiparty Data Privacy in Cloud Computing

1State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450002, China
2State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100088, China
3School of Computer Science and Information Security, Guangxi Key Laboratory of Cryptography and Information Security, Guilin University of Electronic Technology, Guilin, Guangxi 541004, China

Correspondence should be addressed to Wenfen Liu; nc.ude.teug@nefnewuil

Received 9 September 2017; Accepted 19 November 2017; Published 12 December 2017

Academic Editor: Krzysztof Szczypiorski

Copyright © 2017 Ji Li et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. M. Armbrust, A. Fox, R. Griffith et al., “A view of cloud computing,” Communications of the ACM, vol. 53, no. 4, pp. 50–58, 2010. View at Publisher · View at Google Scholar · View at Scopus
  2. Z. Fu, X. Wu, C. Guan, X. Sun, and K. Ren, “Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 12, pp. 2706–2716, 2016. View at Publisher · View at Google Scholar
  3. Z. Xia, X. Wang, X. Sun, and Q. Wang, “A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data,” IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 2, pp. 340–352, 2016. View at Publisher · View at Google Scholar · View at Scopus
  4. R. Cramer, I. DamgÅrd, and U. Maurer, “General secure multi-party computation from any linear secret-sharing scheme,” in Proceedings of the Advances in Cryptology - EUROCRYPT 2000, International Conference on the Theory and Application of Cryptographic Techniques, pp. 316–334, Bruges, Belgium, 2000. View at MathSciNet
  5. G. Asharov, A. Jain, A. López-Alt, E. Tromer, V. Vaikuntanathan, and D. Wichs, “Multiparty computation with low communication, computation and interaction via threshold FHE,” Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface, vol. 7237, pp. 483–501, 2012. View at Publisher · View at Google Scholar · View at Scopus
  6. D. Su, J. Cao, N. Li, E. Bertino, and H. Jin, “Differentially private K-Means clustering,” in Proceedings of the 6th ACM Conference on Data and Application Security and Privacy, CODASPY 2016, pp. 26–37, USA, March 2016. View at Publisher · View at Google Scholar · View at Scopus
  7. D. Wang, H. Cheng, D. He, and P. Wang, “On the Challenges in Designing Identity-Based Privacy-Preserving Authentication Schemes for Mobile Devices,” IEEE Systems Journal, pp. 1–10. View at Publisher · View at Google Scholar
  8. V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” in Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, pp. 89–98, Alexandria, Va, USA, November 2006. View at Publisher · View at Google Scholar · View at Scopus
  9. K. Yang, Z. Liu, X. Jia, and X. S. Shen, “Time-Domain Attribute-Based Access Control for Cloud-Based Video Content Sharing: A Cryptographic Approach,” IEEE Transactions on Multimedia, vol. 18, no. 5, pp. 940–950, 2016. View at Publisher · View at Google Scholar · View at Scopus
  10. J. Shen, D. Liu, J. Shen, Q. Liu, and X. Sun, “A secure cloud-assisted urban data sharing framework for ubiquitous-cities,” Pervasive and Mobile Computing, vol. 41, pp. 219–230, 2017. View at Publisher · View at Google Scholar
  11. D. Wang, D. He, P. Wang, and C.-H. Chu, “Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment,” IEEE Transactions on Dependable and Secure Computing, vol. 12, no. 4, pp. 428–442, 2015. View at Publisher · View at Google Scholar · View at Scopus
  12. D. Wang and P. Wang, “Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound,” IEEE Transactions on Dependable and Secure Computing, pp. 1–1. View at Publisher · View at Google Scholar
  13. Q. Jiang, S. Zeadally, J. Ma, and D. He, “Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks,” IEEE Access, vol. 5, pp. 3376–3392, 2017. View at Publisher · View at Google Scholar
  14. Q. Jiang, Z. Chen, B. Li, J. Shen, L. Yang, and J. Ma, “Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems,” Journal of Ambient Intelligence and Humanized Computing. View at Publisher · View at Google Scholar
  15. Q. Jiang, J. Ma, C. Yang, X. Ma, J. Shen, and S. A. Chaudhry, “Efficient end-to-end authentication protocol for wearable health monitoring systems,” Computers Electrical Engineering, 2017. View at Google Scholar
  16. J. Ni, K. Zhang, X. Lin, and X. Shen, “Balancing Security and Efficiency for Smart Metering against Misbehaving Collectors,” IEEE Transactions on Smart Grid, pp. 1–1. View at Publisher · View at Google Scholar
  17. J. Ni, K. Zhang, X. Lin, and X. Shen, “Securing fog computing for internet of things applications: Challenges and solutions,” IEEE Communications Surveys and Tutorials, vol. 99, p. 1, 2017. View at Google Scholar
  18. J. Shen, S. Chang, J. Shen, Q. Liu, and X. Sun, “A lightweight multi-layer authentication protocol for wireless body area networks,” Future Generation Computer Systems, 2016. View at Publisher · View at Google Scholar · View at Scopus
  19. C. Gentry, “Fully Homomorphic Encryption Using Ideal Lattices,” in Proceedings of the 41st Annual ACM Symposium on Theory of Computing, STOC '09, pp. 169–178, usa, June 2009. View at Publisher · View at Google Scholar · View at Scopus
  20. X. Liu, R. H. Deng, K.-K. R. Choo, and J. Weng, “An efficient privacy-preserving outsourced calculation toolkit with multiple keys,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 11, pp. 2401–2414, 2016. View at Publisher · View at Google Scholar · View at Scopus
  21. X. Liu, B. Qin, R. H. Deng, R. Lu, and J. Ma, “A Privacy-Preserving Outsourced Functional Computation Framework Across Large-Scale Multiple Encrypted Domains,” IEEE Transactions on Computers, vol. 65, no. 12, pp. 3567–3579, 2016. View at Publisher · View at Google Scholar · View at Scopus
  22. S. Yin, X. Li, H. Gao, and O. Kaynak, “Efficient and privacy-preserving outsourced calculation of rational numbers,” IEEE Transactions on Industrial Electronics, vol. PP, no. 99, p. 1, 2014. View at Publisher · View at Google Scholar
  23. A. López-Alt, E. Tromer, and V. Vaikuntanathan, “On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption,” in Proceedings of the 44th Symposium on Theory of Computing Conference, STOC 2012, pp. 1219–1234, New York, NY, USA, May 2012. View at Publisher · View at Google Scholar · View at Scopus
  24. S. Jarecki, C. Jutla, H. Krawczyk, M. Rosu, and M. Steiner, “Outsourced symmetric private information retrieval,” in Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS 2013, pp. 875–887, Berlin, Germany, November 2013. View at Publisher · View at Google Scholar · View at Scopus
  25. C. Hazay and H. Zarosim, “The feasibility of outsourced database search in the plain model,” in Proceedings of the Security and Cryptography for Networks - 10th International Conference, pp. 313–332, Amalfi, Italy, 2016. View at Scopus
  26. S. Ji, W. Li, N. Z. Gong, P. Mittal, and R. Beyah, “On your social network de-anonymizablity: Quantification and large scale evaluation with seed knowledge,” in Proceedings of 22nd Annual Network and Distributed System Security Symposium, NDSS 2015, San Diego, Calif, USA, 2015.
  27. C. Dwork, “Differential privacy: A survey of results,” in Proceedings of the Theory and Applications of Models of Computation, 5th International Conference, TAMC 2008, pp. 1–19, Xi’an, China, 2008.
  28. H. Li, J. Cui, X. Lin, and J. Ma, “Improving the utility in differential private histogram publishing: Theoretical study and practice,” in Proceedings of the 4th IEEE International Conference on Big Data, Big Data 2016, pp. 1100–1109, Washington DC, USA, 2016. View at Publisher · View at Google Scholar · View at Scopus
  29. G. Yuan, Z. Zhang, M. Winslett, X. Xiao, Y. Yang, and Z. Hao, “Low-rank mechanism: optimizing batch queries under differential privacy,” Proceedings of the VLDB Endowment (Very Large Database Endowment), vol. 5, no. 11, pp. 1352–1363, 2012. View at Publisher · View at Google Scholar
  30. W. Qardaji, W. Yang, and N. Li, “PriView: Practical differentially private release of marginal contingency tables,” in Proceedings of the 2014 ACM SIGMOD International Conference on Management of Data, SIGMOD 2014, pp. 1435–1446, Snowbird, UT, June 2014. View at Publisher · View at Google Scholar · View at Scopus
  31. L. Zhang, Y. Liu, R. Wang, X. Fu, and Q. Lin, “Efficient privacy-preserving classification construction model with differential privacy technology,” Journal of Systems Engineering and Electronics, vol. 28, no. 1, Article ID 7870511, pp. 170–178, 2017. View at Publisher · View at Google Scholar · View at Scopus
  32. C. Dwork, A. Nikolov, and K. Talwar, “Efficient Algorithms for Privately Releasing Marginals via Convex Relaxations,” Discrete & Computational Geometry, vol. 53, no. 3, pp. 650–673, 2015. View at Publisher · View at Google Scholar · View at Scopus
  33. M. Pettai and P. Laud, “Combining differential privacy and secure multiparty computation,” in Proceedings of the 31st Annual Computer Security Applications Conference, ACSAC 2015, pp. 421–430, USA, December 2015. View at Publisher · View at Google Scholar · View at Scopus
  34. P. Mohan, A. Thakurta, E. Shi, D. Song, and D. Culler, “GUPT: Privacy preserving data analysis made easy,” in Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data, SIGMOD '12, pp. 349–360, Scottsdale, AZ, USA, May 2012. View at Publisher · View at Google Scholar · View at Scopus
  35. V. Bindschaedler, S. Rane, A. E. Brito, V. Rao, and E. Uzun, “Achieving differential privacy in secure multiparty data aggregation protocols on star networks,” in Seventh ACM on Conference on Data and Application Security and Privacy, CODASPY 2017, pp. 115–125, Scottsdale, AZ, USA, 2017. View at Publisher · View at Google Scholar
  36. D. Stehlé and R. Steinfeld, “Making NTRU as secure as worst-case problems over ideal lattices,” in Proceedings of the 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, vol. 6632 of Advances in Cryptology - EUROCRYPT 2011, pp. 27–47, Tallinn, Estonia, 2011. View at MathSciNet
  37. A. Smith, “Privacy-preserving statistical estimation with optimal convergence rates,” in Proceedings of STOC 2011, pp. 813–821, 2011. View at Google Scholar · View at MathSciNet
  38. J. Groth, R. Ostrovsky, and A. Sahai, “New techniques for noninteractive zero-knowledge,” Journal of the ACM, vol. 59, no. 3, pp. 1–11, 2012. View at Publisher · View at Google Scholar · View at Scopus
  39. N. Bitansky, R. Canetti, A. Chiesa, and E. Tromer, “Recursive composition and bootstrapping for SNARKs and proof-carrying data,” in Proceedings of the 45th Annual ACM Symposium on Theory of Computing, STOC 2013, pp. 111–120, usa, June 2013. View at Publisher · View at Google Scholar · View at Scopus