Skip to main content
Article
Verifiable and private top-k monitoring
ASIA CCS'13: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, May 8-10, 2013, Hangzhou, China
  • Xuhua DING, Singapore Management University
  • Hwee Hwa PANG, Singapore Management University
Publication Type
Conference Proceeding Article
Version
acceptedVersion
Publication Date
1-2013
Abstract

In a data streaming model, records or documents are pushed from a data owner, via untrusted third-party servers, to a large number of users with matching interests. The match in interest is calculated from the correlation between each pair of document and user query. For scalability and availability reasons, this calculation is delegated to the servers, which gives rise to the need to protect the privacy of the documents and user queries. In addition, the users need to guard against the eventuality of a server distorting the correlation score of the documents to manipulate which documents are highlighted to certain users. In this paper, we address the aforementioned privacy and verifiability challenges. We introduce the first cryptographic scheme which concurrently safeguards the privacy of the documents and user queries in such a data streaming model, while enabling users to verify the correlation scores obtained. We provide techniques to bound the computation demand in decrypting the correlation scores, and we demonstrate the overall practicality of the scheme through experiments with real data.

Keywords
  • Vector product,
  • correlation computation,
  • verifiability,
  • privacy
ISBN
9781450317672
Identifier
10.1145/2484313.2484388
Publisher
ACM
City or Country
Hangzhou, China
Creative Commons License
Creative Commons Attribution-NonCommercial-No Derivative Works 4.0 International
Additional URL
http://dx.doi.org/10.1145/2484313.2484388
Citation Information
Xuhua DING and Hwee Hwa PANG. "Verifiable and private top-k monitoring" ASIA CCS'13: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, May 8-10, 2013, Hangzhou, China (2013) p. 553 - 558
Available at: http://works.bepress.com/hweehwa-pang/82/