Verifiable and private top-k monitoring
In a data streaming model, records or documents are pushed from a data owner, via untrusted third-party servers, to a large number of users with matching interests. The match in interest is calculated from the correlation between each pair of document and user query. For scalability and availability...
Saved in:
Main Authors: | , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2013
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/1972 https://ink.library.smu.edu.sg/context/sis_research/article/2971/viewcontent/Verifiable_and_private_top_k_monitoring__edited_.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-2971 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-29712018-07-13T03:32:31Z Verifiable and private top-k monitoring DING, Xuhua PANG, Hwee Hwa In a data streaming model, records or documents are pushed from a data owner, via untrusted third-party servers, to a large number of users with matching interests. The match in interest is calculated from the correlation between each pair of document and user query. For scalability and availability reasons, this calculation is delegated to the servers, which gives rise to the need to protect the privacy of the documents and user queries. In addition, the users need to guard against the eventuality of a server distorting the correlation score of the documents to manipulate which documents are highlighted to certain users. In this paper, we address the aforementioned privacy and verifiability challenges. We introduce the first cryptographic scheme which concurrently safeguards the privacy of the documents and user queries in such a data streaming model, while enabling users to verify the correlation scores obtained. We provide techniques to bound the computation demand in decrypting the correlation scores, and we demonstrate the overall practicality of the scheme through experiments with real data. 2013-01-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/1972 info:doi/10.1145/2484313.2484388 https://ink.library.smu.edu.sg/context/sis_research/article/2971/viewcontent/Verifiable_and_private_top_k_monitoring__edited_.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Vector product correlation computation verifiability privacy Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Vector product correlation computation verifiability privacy Information Security |
spellingShingle |
Vector product correlation computation verifiability privacy Information Security DING, Xuhua PANG, Hwee Hwa Verifiable and private top-k monitoring |
description |
In a data streaming model, records or documents are pushed from a data owner, via untrusted third-party servers, to a large number of users with matching interests. The match in interest is calculated from the correlation between each pair of document and user query. For scalability and availability reasons, this calculation is delegated to the servers, which gives rise to the need to protect the privacy of the documents and user queries. In addition, the users need to guard against the eventuality of a server distorting the correlation score of the documents to manipulate which documents are highlighted to certain users. In this paper, we address the aforementioned privacy and verifiability challenges. We introduce the first cryptographic scheme which concurrently safeguards the privacy of the documents and user queries in such a data streaming model, while enabling users to verify the correlation scores obtained. We provide techniques to bound the computation demand in decrypting the correlation scores, and we demonstrate the overall practicality of the scheme through experiments with real data. |
format |
text |
author |
DING, Xuhua PANG, Hwee Hwa |
author_facet |
DING, Xuhua PANG, Hwee Hwa |
author_sort |
DING, Xuhua |
title |
Verifiable and private top-k monitoring |
title_short |
Verifiable and private top-k monitoring |
title_full |
Verifiable and private top-k monitoring |
title_fullStr |
Verifiable and private top-k monitoring |
title_full_unstemmed |
Verifiable and private top-k monitoring |
title_sort |
verifiable and private top-k monitoring |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2013 |
url |
https://ink.library.smu.edu.sg/sis_research/1972 https://ink.library.smu.edu.sg/context/sis_research/article/2971/viewcontent/Verifiable_and_private_top_k_monitoring__edited_.pdf |
_version_ |
1770571738881458176 |