Preservation of Private Information using Secure Multi-Party Computation

Background/Objectives: Secure Multi-party Computation (SMC) method is used to secure individual’s sensitive data during privacy preserving data mining and data publishing. This paper proposes a new protocol using real and ideal models of SMC to compute sum of multiple parties’ private data without revealing their data to each other. Methods/Statistical Analysis: Many approaches have been utilized for preserving privacy of sensitive data such as anonymization, data perturbation and SMC. In SMC, several protocols have been used for this purpose. Secure sum protocol is one of the important protocols, which is used to calculate the sum of private data secretly. Multiple parties perform the addition and subtraction operation based on the secure sum protocol and they transfer the intermediate sum among them through a trusted third party. Finally, trusted third party transforms sum to all the parties. Findings: The computation and communication cost is calculated in each round of computation and compared with the existing protocol. The empirical result shows that the proposed protocol out performed than the existing protocol in terms of computation and communication complexity. Applications/ Improvements: This protocol can be applied in various fields where the privacy preservation of sensitive data is needed such as insurance companies, banking system, government survey, hospitals, etc. The complexity of the protocol can be further reduced with high security in future.

[1]  Durgesh Kumar Mishra,et al.  A Modified ck-Secure Sum Protocol for Multi-Party Computation , 2010, ArXiv.

[2]  Durgesh Kumar Mishra,et al.  A Distributed k-Secure Sum Protocol for Secure Multi-Party Computations , 2010, ArXiv.

[3]  Philip S. Yu,et al.  Privacy-Preserving Data Mining - Models and Algorithms , 2008, Advances in Database Systems.

[4]  L. Arockiam,et al.  Parallel Bottom-up Generalization Approach for Data Anonymization using Map Reduce for Security of Data in Public Cloud , 2015 .

[5]  S. Veni,et al.  Social Ant based Sensitive Item Hiding with Optimal Side Effects for Data Publishing , 2016 .

[6]  Durgesh Kumar Mishra,et al.  A Secure Multi-Party Computation Protocol for Malicious Computation Prevention for preserving privacy during Data Mining , 2009, ArXiv.

[7]  Maya Mohan,et al.  Security Analysis and Modification of Classical Encryption Scheme , 2015 .

[8]  Xiang-Yang Li,et al.  Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel , 2015, IEEE Transactions on Dependable and Secure Computing.

[9]  M. L. Valarmathi,et al.  Attribute Segregation based on Feature Ranking Framework for Privacy Preserving Data Mining , 2015 .

[10]  Zhang,et al.  Collusion-Free Rational Secure Sum Protocol , 2013 .

[11]  Durgesh Kumar Mishra,et al.  Changing Neighbors k Secure Sum Protocol for Secure Multi Party Computation , 2010, ArXiv.

[12]  V. Rajalakshmi,et al.  Anonymization by Data Relocation Using Sub-clustering for Privacy Preserving Data Mining , 2014 .