loading
Papers

Research.Publish.Connect.

Paper

Authors: Georgia Tsaloli and Aikaterini Mitrokotsa

Affiliation: Department of Computer Science and Engineering, Chalmers University of Technology, Gothenburg and Sweden

ISBN: 978-989-758-378-0

Keyword(s): Verifiable Computation, Differential Privacy, Privacy-preservation.

Related Ontology Subjects/Areas/Topics: Applied Cryptography ; Cryptographic Techniques and Key Management ; Data and Application Security and Privacy ; Data Engineering ; Data Integrity ; Databases and Data Security ; Information and Systems Security ; Privacy ; Security and Privacy in the Cloud

Abstract: Often service providers need to outsource computations on sensitive datasets and subsequently publish statistical results over a population of users. In this setting, service providers want guarantees about the correctness of the computations, while individuals want guarantees that their sensitive information will remain private. Encryption mechanisms are not sufficient to avoid any leakage of information, since querying a database about individuals or requesting summary statistics can lead to leakage of information. Differential privacy addresses the paradox of learning nothing about an individual, while learning useful information about a population. Verifiable computation addresses the challenge of proving the correctness of computations. Although verifiable computation and differential privacy are important tools in this context, their interconnection has received limited attention. In this paper, we address the following question: How can we design a protocol that provides both d ifferential privacy and verifiable computation guarantees for outsourced computations? We formally define the notion of verifiable differentially private computation (VDPC) and what are the minimal requirements needed to achieve VDPC. Furthermore, we propose a protocol that provides verifiable differentially private computation guarantees and discuss its security and privacy properties. (More)

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 100.26.176.182

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Tsaloli, G. and Mitrokotsa, A. (2019). Differential Privacy meets Verifiable Computation: Achieving Strong Privacy and Integrity Guarantees.In Proceedings of the 16th International Joint Conference on e-Business and Telecommunications - Volume 2: SECRYPT, ISBN 978-989-758-378-0, pages 425-430. DOI: 10.5220/0007919404250430

@conference{secrypt19,
author={Georgia Tsaloli. and Aikaterini Mitrokotsa.},
title={Differential Privacy meets Verifiable Computation: Achieving Strong Privacy and Integrity Guarantees},
booktitle={Proceedings of the 16th International Joint Conference on e-Business and Telecommunications - Volume 2: SECRYPT,},
year={2019},
pages={425-430},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0007919404250430},
isbn={978-989-758-378-0},
}

TY - CONF

JO - Proceedings of the 16th International Joint Conference on e-Business and Telecommunications - Volume 2: SECRYPT,
TI - Differential Privacy meets Verifiable Computation: Achieving Strong Privacy and Integrity Guarantees
SN - 978-989-758-378-0
AU - Tsaloli, G.
AU - Mitrokotsa, A.
PY - 2019
SP - 425
EP - 430
DO - 10.5220/0007919404250430

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.