Building a privacy-preserving semantic overlay for Peer-to-Peer networks

dc.contributor.authorZeilemaker, Niels
dc.contributor.authorErkin, Zekeriya
dc.contributor.authorPalmieri, Paolo
dc.contributor.authorPouwelse, Johan A.
dc.date.accessioned2017-09-21T15:52:41Z
dc.date.available2017-09-21T15:52:41Z
dc.date.issued2013-11
dc.date.updated2017-09-20T16:00:58Z
dc.description.abstractSearching a Peer-to-Peer (P2P) network without using a central index has been widely investigated but proved to be very difficult. Various strategies have been proposed, however no practical solution to date also addresses privacy concerns. By clustering peers which have similar interests, a semantic overlay provides a method for achieving scalable search. Traditionally, in order to find similar peers, a peer is required to fully expose its preferences for items or content, therefore disclosing this private information. However, in a hostile environment, such as a P2P system, a peer cannot know the true identity or intentions of fellow peers. In this paper, we propose two protocols for building a semantic overlay in a privacy-preserving manner by modifying existing solutions to the Private Set Intersection (PSI) problem. Peers in our overlay compute their similarity to other peers in the encrypted domain, allowing them to find similar peers. Using homomorphic encryption, peers can carrying out computations on encrypted values, without needing to decrypt them first. We propose two protocols, one based on the inner product of vectors, the other on multivariate polynomial evaluation, which are able to compute a similarity value between two peers. Both protocols are implemented on top of an existing P2P platform and are designed for actual deployment. Using a supercomputer and a dataset extracted from a real world instance of a semantic overlay, we emulate our protocols in a network consisting of a thousand peers. Finally, we show the actual computational and bandwidth usage of the protocols as recorded during those experiments.en
dc.description.statusPeer revieweden
dc.description.versionAccepted Versionen
dc.format.mimetypeapplication/pdfen
dc.identifier.citationZeilemaker, N., Erkin, Z., Palmieri, P. and Pouwelse, J. (2013) 'Building a privacy-preserving semantic overlay for Peer-to-Peer networks', 2013 IEEE International Workshop on Information Forensics and Security (WIFS), 18-21 Nov., pp. 79-84. doi:10.1109/WIFS.2013.6707798en
dc.identifier.doi10.1109/WIFS.2013.6707798
dc.identifier.endpage84en
dc.identifier.journaltitle2013 IEEE International Workshop on Information Forensics and Security (WIFS)en
dc.identifier.startpage79en
dc.identifier.urihttps://hdl.handle.net/10468/4767
dc.language.isoenen
dc.publisherIEEEen
dc.relation.ispartof2013 IEEE International Workshop on Information Forensics and Security, WIFS 2013, Guangzhou, China, November 18-21, 2013
dc.relation.urihttp://ieeexplore.ieee.org/document/6707798/
dc.rights© 2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.en
dc.subjectProtocolsen
dc.subjectCryptographyen
dc.subjectPolynomialsen
dc.subjectComputer network securityen
dc.subjectCryptographic protocolsen
dc.subjectData privacyen
dc.subjectPeer-to-peer computingen
dc.subjectP2P systemen
dc.titleBuilding a privacy-preserving semantic overlay for Peer-to-Peer networksen
dc.typeConference itemen
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Zeilemaker_Erkin_Palmieri_et_al_WIFS2013.pdf
Size:
292.88 KB
Format:
Adobe Portable Document Format
Description:
Accepted version
License bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
2.71 KB
Format:
Item-specific license agreed upon to submission
Description: