Secure server-aided top-k monitoring

In a data streaming model, a data owner releases records or documents to a set of users with matching interests, in such a way that the match in interest can be calculated from the correlation between each pair of document and user query. For scalability and availability reasons, this calculation is...

Full description

Saved in:
Bibliographic Details
Main Authors: WANG, Yujue, PANG, Hwee Hwa, YANG, Yanjiang, DING, Xuhua
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2017
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/3789
https://ink.library.smu.edu.sg/context/sis_research/article/4791/viewcontent/1_s20_S0020025516318643_main.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-4791
record_format dspace
spelling sg-smu-ink.sis_research-47912020-04-08T03:54:45Z Secure server-aided top-k monitoring WANG, Yujue PANG, Hwee Hwa YANG, Yanjiang DING, Xuhua In a data streaming model, a data owner releases records or documents to a set of users with matching interests, in such a way that the match in interest can be calculated from the correlation between each pair of document and user query. For scalability and availability reasons, this calculation is delegated to third-party servers, which gives rise to the need to protect the integrity and privacy of the documents and user queries. In this paper, we propose a server-aided data stream monitoring scheme (DSM) to address the aforementioned integrity and privacy challenges, so that the users are able to verify the correlation scores obtained from the server. The scheme provides strong security protection, even in the event of collusion between the server and other users. We also offer techniques to bound the computation demand in decoding the correlation scores, and we demonstrate the practicality of the scheme through experiments with real data. 2017-12-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/3789 info:doi/10.1016/j.ins.2017.08.068 https://ink.library.smu.edu.sg/context/sis_research/article/4791/viewcontent/1_s20_S0020025516318643_main.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Privacy Verifiability Collusion-resistance Correlation computation Vector product Databases and Information Systems Information Security Software Engineering
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Privacy
Verifiability
Collusion-resistance
Correlation computation
Vector product
Databases and Information Systems
Information Security
Software Engineering
spellingShingle Privacy
Verifiability
Collusion-resistance
Correlation computation
Vector product
Databases and Information Systems
Information Security
Software Engineering
WANG, Yujue
PANG, Hwee Hwa
YANG, Yanjiang
DING, Xuhua
Secure server-aided top-k monitoring
description In a data streaming model, a data owner releases records or documents to a set of users with matching interests, in such a way that the match in interest can be calculated from the correlation between each pair of document and user query. For scalability and availability reasons, this calculation is delegated to third-party servers, which gives rise to the need to protect the integrity and privacy of the documents and user queries. In this paper, we propose a server-aided data stream monitoring scheme (DSM) to address the aforementioned integrity and privacy challenges, so that the users are able to verify the correlation scores obtained from the server. The scheme provides strong security protection, even in the event of collusion between the server and other users. We also offer techniques to bound the computation demand in decoding the correlation scores, and we demonstrate the practicality of the scheme through experiments with real data.
format text
author WANG, Yujue
PANG, Hwee Hwa
YANG, Yanjiang
DING, Xuhua
author_facet WANG, Yujue
PANG, Hwee Hwa
YANG, Yanjiang
DING, Xuhua
author_sort WANG, Yujue
title Secure server-aided top-k monitoring
title_short Secure server-aided top-k monitoring
title_full Secure server-aided top-k monitoring
title_fullStr Secure server-aided top-k monitoring
title_full_unstemmed Secure server-aided top-k monitoring
title_sort secure server-aided top-k monitoring
publisher Institutional Knowledge at Singapore Management University
publishDate 2017
url https://ink.library.smu.edu.sg/sis_research/3789
https://ink.library.smu.edu.sg/context/sis_research/article/4791/viewcontent/1_s20_S0020025516318643_main.pdf
_version_ 1770573733919981568