Verifiable and private top-k monitoring

In a data streaming model, records or documents are pushed from a data owner, via untrusted third-party servers, to a large number of users with matching interests. The match in interest is calculated from the correlation between each pair of document and user query. For scalability and availability...

Full description

Saved in:
Bibliographic Details
Main Authors: DING, Xuhua, PANG, Hwee Hwa
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2013
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/1972
https://ink.library.smu.edu.sg/context/sis_research/article/2971/viewcontent/Verifiable_and_private_top_k_monitoring__edited_.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-2971
record_format dspace
spelling sg-smu-ink.sis_research-29712018-07-13T03:32:31Z Verifiable and private top-k monitoring DING, Xuhua PANG, Hwee Hwa In a data streaming model, records or documents are pushed from a data owner, via untrusted third-party servers, to a large number of users with matching interests. The match in interest is calculated from the correlation between each pair of document and user query. For scalability and availability reasons, this calculation is delegated to the servers, which gives rise to the need to protect the privacy of the documents and user queries. In addition, the users need to guard against the eventuality of a server distorting the correlation score of the documents to manipulate which documents are highlighted to certain users. In this paper, we address the aforementioned privacy and verifiability challenges. We introduce the first cryptographic scheme which concurrently safeguards the privacy of the documents and user queries in such a data streaming model, while enabling users to verify the correlation scores obtained. We provide techniques to bound the computation demand in decrypting the correlation scores, and we demonstrate the overall practicality of the scheme through experiments with real data. 2013-01-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/1972 info:doi/10.1145/2484313.2484388 https://ink.library.smu.edu.sg/context/sis_research/article/2971/viewcontent/Verifiable_and_private_top_k_monitoring__edited_.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Vector product correlation computation verifiability privacy Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Vector product
correlation computation
verifiability
privacy
Information Security
spellingShingle Vector product
correlation computation
verifiability
privacy
Information Security
DING, Xuhua
PANG, Hwee Hwa
Verifiable and private top-k monitoring
description In a data streaming model, records or documents are pushed from a data owner, via untrusted third-party servers, to a large number of users with matching interests. The match in interest is calculated from the correlation between each pair of document and user query. For scalability and availability reasons, this calculation is delegated to the servers, which gives rise to the need to protect the privacy of the documents and user queries. In addition, the users need to guard against the eventuality of a server distorting the correlation score of the documents to manipulate which documents are highlighted to certain users. In this paper, we address the aforementioned privacy and verifiability challenges. We introduce the first cryptographic scheme which concurrently safeguards the privacy of the documents and user queries in such a data streaming model, while enabling users to verify the correlation scores obtained. We provide techniques to bound the computation demand in decrypting the correlation scores, and we demonstrate the overall practicality of the scheme through experiments with real data.
format text
author DING, Xuhua
PANG, Hwee Hwa
author_facet DING, Xuhua
PANG, Hwee Hwa
author_sort DING, Xuhua
title Verifiable and private top-k monitoring
title_short Verifiable and private top-k monitoring
title_full Verifiable and private top-k monitoring
title_fullStr Verifiable and private top-k monitoring
title_full_unstemmed Verifiable and private top-k monitoring
title_sort verifiable and private top-k monitoring
publisher Institutional Knowledge at Singapore Management University
publishDate 2013
url https://ink.library.smu.edu.sg/sis_research/1972
https://ink.library.smu.edu.sg/context/sis_research/article/2971/viewcontent/Verifiable_and_private_top_k_monitoring__edited_.pdf
_version_ 1770571738881458176