Distributed privacy preserving information sharing

Nan Zhang, Wei Zhao

Research output: Chapter in Book/Report/Conference proceedingConference contribution

42 Scopus citations

Abstract

In this paper, we address issues related to sharing information in a distributed system consisting of autonomous entities, each of which holds a private database. Semi-honest behavior has been widely adopted as the model for adversarial threats. However, it substantially underestimates the capability of adversaries in reality. In this paper, we consider a threat space containing more powerful adversaries that includes not only semi-honest but also those malicious adversaries. In particular, we classify malicious adversaries into two widely existing subclasses, called weakly malicious and strongly malicious adversaries, respectively. We define a measure of privacy leakage for information sharing systems and propose protocols that can effectively and efficiently protect privacy against different kinds of malicious adversaries.

Original languageEnglish (US)
Title of host publicationVLDB 2005 - Proceedings of 31st International Conference on Very Large Data Bases
Pages889-900
Number of pages12
StatePublished - Dec 1 2005
EventVLDB 2005 - 31st International Conference on Very Large Data Bases - Trondheim, Norway
Duration: Aug 30 2005Sep 2 2005

Publication series

NameVLDB 2005 - Proceedings of 31st International Conference on Very Large Data Bases
Volume2

Other

OtherVLDB 2005 - 31st International Conference on Very Large Data Bases
Country/TerritoryNorway
CityTrondheim
Period8/30/059/2/05

All Science Journal Classification (ASJC) codes

  • General Engineering

Fingerprint

Dive into the research topics of 'Distributed privacy preserving information sharing'. Together they form a unique fingerprint.

Cite this