TY - GEN
T1 - Distributed privacy-preserving mean estimation
AU - Schonfeld, Mirco
AU - Werner, Martin
N1 - Publisher Copyright:
© 2014 IEEE.
PY - 2014/12/1
Y1 - 2014/12/1
N2 - Due to the rise of mobile computing and smartphones, a lot of information about groups has become accessible. This information shall often be kept secret. Hence distributed algorithms for privacy-preserving distribution estimation are needed. Most research currently focuses on privacy in a database, where a single entity has collected the secret information and privacy is ensured between query results and the database. In fully distributed systems such as sensor networks it is often infeasible to move the data towards a central entity for processing. Instead, distributed algorithms are needed. With this paper we propose a fully distributed, privacy-friendly, consensus-based approach. In our approach all nodes cooperate to generate a sufficiently random obfuscation of their secret values until the estimated and obfuscated values of the individual nodes can be safely published. Then the calculations can be done on this replacement containing only non-secret values but recovering some aspects (mean, standard deviation) of the original distribution.
AB - Due to the rise of mobile computing and smartphones, a lot of information about groups has become accessible. This information shall often be kept secret. Hence distributed algorithms for privacy-preserving distribution estimation are needed. Most research currently focuses on privacy in a database, where a single entity has collected the secret information and privacy is ensured between query results and the database. In fully distributed systems such as sensor networks it is often infeasible to move the data towards a central entity for processing. Instead, distributed algorithms are needed. With this paper we propose a fully distributed, privacy-friendly, consensus-based approach. In our approach all nodes cooperate to generate a sufficiently random obfuscation of their secret values until the estimated and obfuscated values of the individual nodes can be safely published. Then the calculations can be done on this replacement containing only non-secret values but recovering some aspects (mean, standard deviation) of the original distribution.
UR - http://www.scopus.com/inward/record.url?scp=84936818050&partnerID=8YFLogxK
U2 - 10.1109/PRISMS.2014.6970597
DO - 10.1109/PRISMS.2014.6970597
M3 - Conference contribution
AN - SCOPUS:84936818050
T3 - 2014 International Conference on Privacy and Security in Mobile Systems, PRISMS 2014 - Co-located with Global Wireless Summit
BT - 2014 International Conference on Privacy and Security in Mobile Systems, PRISMS 2014 - Co-located with Global Wireless Summit
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2014 International Conference on Privacy and Security in Mobile Systems, PRISMS 2014
Y2 - 11 May 2014 through 14 May 2014
ER -