Affiliation:
1. Karlsruhe Institute of Technology , KASTEL
2. CSIRO’s Data61
3. University of Luxembourg and KASTEL SRL
Abstract
Abstract
In this paper we propose Privacy-preserving User-data Bookkeeping & Analytics (PUBA), a building block destined to enable the implementation of business models (e.g., targeted advertising) and regulations (e.g., fraud detection) requiring user-data analysis in a privacy-preserving way. In PUBA, users keep an unlinkable but authenticated cryptographic logbook containing their historic data on their device. This logbook can only be updated by the operator while its content is not revealed. Users can take part in a privacy-preserving analytics computation, where it is ensured that their logbook is up-to-date and authentic while the potentially secret analytics function is verified to be privacy-friendly. Taking constrained devices into account, users may also outsource analytic computations (to a potentially malicious proxy not colluding with the operator).We model our novel building block in the Universal Composability framework and provide a practical protocol instantiation. To demonstrate the flexibility of PUBA, we sketch instantiations of privacy-preserving fraud detection and targeted advertising, although it could be used in many more scenarios, e.g. data analytics for multi-modal transportation systems. We implemented our bookkeeping protocols and an exemplary outsourced analytics computation based on logistic regression using the MP-SPDZ MPC framework. Performance evaluations using a smartphone as user device and more powerful hardware for operator and proxy suggest that PUBA for smaller logbooks can indeed be practical.
Publisher
Privacy Enhancing Technologies Symposium Advisory Board
Reference52 articles.
1. [1] M. Abe, J. Groth, K. Haralambiev, and M. Ohkubo. Optimal structure-preserving signatures in asymmetric bilinear groups. In P. Rogaway, editor, CRYPTO 2011, volume 6841 of LNCS, pages 649–666. Springer, Heidelberg, Aug. 2011. 10.1007/978-3-642-22792-9_37.10.1007/978-3-642-22792-9_37
2. [2] M. Abe, M. Kohlweiss, M. Ohkubo, and M. Tibouchi. Fully structure-preserving signatures and shrinking commitments. In E. Oswald and M. Fischlin, editors, EUROCRYPT 2015, Part II, volume 9057 of LNCS, pages 35–65. Springer, Heidelberg, Apr. 2015. 10.1007/978-3-662-46803-6_2.10.1007/978-3-662-46803-6_2
3. [3] Aimia Coalition Loyalty UK Ltd. The Nectar loyalty program. Online Resource, 2020. https://www.nectar.com/.
4. [4] E. Androulaki and S. M. Bellovin. An anonymous credit card system. In S. Fischer-Hübner, C. Lambrinoudakis, and G. Pernul, editors, TrustBus 2009, volume 5695 of LNCS, pages 42–51. Springer, Heidelberg, Sept. 2009.10.1007/978-3-642-03748-1_5
5. [5] D. F. Aranha and C. P. L. Gouvêa. RELIC is an Efficient LIbrary for Cryptography. https://github.com/relic-toolkit/relic, 2020.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献