Font Size: a A A

Privacy-Preserving Data Aggregation Scheme Based On Secret Sharing And Homomorphic Encryption

Posted on:2022-12-29Degree:MasterType:Thesis
Country:ChinaCandidate:X ChenFull Text:PDF
GTID:2518306752453674Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the continuous development of information technology,data has gradually become a valuable social resource,with huge social benefits and economic value.These data are usually composed of the user's personal information or usage records,and contain a large amount of sensitive information.Improper operation may cause serious privacy leakage problems.This article first proposes a privacy-protected data aggregation scheme based on Secure Multi-party Computing technology in the smart grid scenario.Because the Shamir's secret sharing algorithm has additive homomorphism,users only need to distribute the secret shares of their own electricity reading data to the corresponding aggregators,which aggregate them locally and recover the sum jointly to complete the overall data aggregation operation,and the entire process does not require the full participation of trusted institutions.Taking into account the possibility that the aggregation operation cannot be completed normally due to the failure of the network or power equipment,this solution also has a certain fault tolerance.In the cloud computing and outsourcing computing scenarios,due to the occurrence of data transfer and authority custody,the probability of data security risks has increased significantly.In response to this problem,this paper designs and implements a secure outsourcing platform based on multiple homomorphic encryption algorithms.Complete outsourcing calculations and joint analysis without revealing the original data.The main work of this paper includes:1.Privacy-protected data aggregation In the smart grid scenario,the privacy protection data aggregation scheme based on Shamir's secret sharing realizes re-sistance to collusion attacks initiated by k users by adding random numbers to blind user data,and effectively realizing resistance to external parties by adding hash signatures in data packets Camouflage attacks and man-in-the-middle at-tacks initiated by the adversary.2.No need for trusted institutions to participate in the whole process,has a certain fault tolerance Trusted institutions only need to go online to distribute random numbers during the initialization phase,and all other phases can be of-fline;because Shamir's secret sharing is a threshold algorithm,this scheme has certain fault tolerance,and a specific formula for the probability of aggregation failure is given.The simulation experiment results show that this scheme has bet-ter computational complexity and communication overhead.3.Algorithms can be replaced,functions can be edited The secure outsourc-ing platform designed and implemented based on homomorphic encryption algo-rithms can be used in business scenarios where the government outsources user data to companies for personal credit score calculation,ensuring that the original data will not be exposed during the process.The platform provides a variety of different encryption algorithms for the administrator to choose and replace.At the same time,the administrator can visually edit the function model used in data analysis through the web page.In summary,this paper describes the huge application potential and commercial value of secure multi-party computing technology in the field of data security integration from both theory and practice.It can realize data interaction and collaborative computing with privacy protection and effectively solve the problem of ”data island”.
Keywords/Search Tags:Secure Multi-Party Computing, privacy protection, data aggregation, outsourced computing, Secret Sharing, Homomorphic Encryption
PDF Full Text Request
Related items