skip to main content
10.1145/1456403.1456419acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Secure aggregation in a publish-subscribe system

Authors Info & Claims
Published:27 October 2008Publication History

ABSTRACT

A publish-subscribe system is an information dissemination infrastructure that supports many-to-many communications among publishers and subscribers. In many publish-subscribe systems, in-network aggregation of input data is considered to be an important service that reduces the bandwidth requirements of the system significantly. In this paper, we present a scheme for securing the aggregation of inputs to such a publish-subscribe system. Our scheme, which focuses on the additive aggregate function, sum, preserves the confidentiality and integrity of aggregated data in the presence of untrusted routing nodes. Our scheme allows a group of publishers to publish aggregate data to authorized subscribers without revealing their individual private inputs to either the routing nodes or the subscribers. In addition, our scheme allows subscribers to verify that routing nodes perform the aggregation operation correctly. We use a message authentication code (MAC) scheme based on the discrete logarithm property to allow subscribers to verify the correctness of aggregated data without receiving the digitally-signed raw data used as input to the aggregation. In addition to describing our secure aggregation scheme, we provide formal proofs of its soundness and safety.

References

  1. Waseem Ahmad and Ashfaq Khokhar. Secure aggregation in large scale overlay networks. Proceedings of the 49th Global Telecommunications Conference, pages 1--5, November 2006.Google ScholarGoogle Scholar
  2. David E. Bakken, Carl H. Hauser, Harald Gjermundrod, and Anjan Bose. Towards more exible and robust data delivery for monitoring and control of the electric power grid. Technical Report TR-GS-009, Washington State University, May 2007.Google ScholarGoogle Scholar
  3. Antonio Carzaniga, David S. Rosenblum, and Alexander L. Wolf. Design and evaluation of a wide-area event notification service. ACM Transactions on Computer Systems, 19(3):332--383, August 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Claude Castelluccia, Einar Mykletun, and Gene Tsudik. Efficient aggregation of encrypted data in wireless sensor networks. In The Second Annual Conference on Mobile and Ubiquitous Systems: Networking and Services, pages 109--117, July 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Haowen Chan, Adrian Perrig, and Dawn Song. Secure hierarchical in-network aggregation in sensor networks. In Proceedings of the 13th ACM conference on Computer and communications security, pages 278--287, New York, NY, USA, 2006. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Francis Chin. Security problems on inference control for sum, max, and min queries. J. ACM, 33(3):451--464, 1986. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Joao Girao, Markus Schneider, and Dirk Westhoff. On concealed data aggregation in wireless sensor networks. In Proceedings of IEEE International Conference on Communication, May 2005.Google ScholarGoogle Scholar
  8. Stuart Haber, William Horne, Tomas Sander, and Danfeng Yao. Privacy-preserving verification of aggregate queries on outsourced databases. Technical Report HPL-2006--128, HP Labs, December 2006.Google ScholarGoogle Scholar
  9. Wenbo He, Lue Liu, Hoang Nguyen, Klara Nahrstedt, and Tarek Abdelzaher. Pda: Privacy-preserving data aggregation in wireless sensor networks. 26th IEEE International Conference on Computer Communications, pages 2045--2053, May 2007.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Lingxuan Hu and David Evans. Secure aggregation for wireless networks. In Proceedings of the 2003 Symposium on Applications and the Internet Workshops, page 384, Washington, DC, USA, 2003. IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Wolfgang Kastner, Georg Neugschwandtner, Stefan Soucek, and Michael H. Newmann. Communication systems for building automation and control. Proceedings of the IEEE, 93(6):1178--1203, June 2005.Google ScholarGoogle ScholarCross RefCross Ref
  12. Himanshu Khurana. Scalable security and accounting services for content-based publish/subscribe systems. In Proceedings of the 2005 ACM symposium on Applied computing, pages 801--807, New York, NY, USA, 2005. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Francesco M. Malvestuto and Mauro Mezzini. Auditing sum queries. In Proceedings of the 9th International Conference on Database Theory, pages 126--142, London, UK, 2002. Springer-Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Francesco M. Malvestuto, Mauro Mezzini, and Marina Moscarini. Auditing sum-queries to make a statistical database secure. ACM Transactions on Information System Security, 9(1):31--60, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Zoltan Miklos. Towards an access control mechanism for wide-area publish/subscribe systems. In Proceedings of the 22nd International Conference on Distributed Computing Systems, pages 516--524, Washington, DC, USA, 2002. IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Lukasz Opyrchal and Atul Prakash. Secure distribution of events in content-based publish subscribe systems. In Proceedings of the 10th conference on USENIX Security Symposium, pages 21--21, Berkeley, CA, USA, 2001. USENIX Association. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Adrian Perrig, Ran Canetti, Doug Tygar, and Dawn Song. Efficient authentication and signing of multicast streams over lossy channels. In Proceedings of the 2000 IEEE Symposium on Security and Privacy, pages 56--73, Washington, DC, USA, May 2000. IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Lauri I. W. Pesonen, David M. Eyers, and Jean Bacon. A capability-based access control architecture for multi-domain publish/subscribe systems. In Proceedings of the International Symposium on Applications on Internet, pages 222--228, Washington, DC, USA, 2006. IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Lauri I. W. Pesonen, David M. Eyers, and Jean Bacon. Encryption-enforced access control in dynamic multi-domain publish/subscribe networks. In Proceedings of the 2007 inaugural international conference on Distributed event-based systems, pages 104--115, New York, NY, USA, 2007. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Costin Raiciu and David S. Rosenblum. Enabling confidentiality in content-based publish/subscribe infrastructures. Securecomm and Workshops, pages 1--11, 2006.Google ScholarGoogle ScholarCross RefCross Ref
  21. Venugopalan Ramasubramanian, Ryan Peterson, and Emin Gun Sirer. Corona: A high performance publish-subscribe system for the world wide web. In Proceedings of the 3rd Symposium on Networked Systems Design and Implementation, May 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Jr. Robert O. Burnett, Marc M. Butts, and Patrick S. Sterlina. Power system applications for phasor measurement units. Computer Applications in Power, IEEE, 7(1):8--13, 1994.Google ScholarGoogle ScholarCross RefCross Ref
  23. Mudhakar Srivatsa and Ling Liu. Securing publish-subscribe overlay services with eventguard. In Proceedings of the 12th ACM conference on Computer and communications security, pages 289--298, New York, NY, USA, 2005. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Mudhakar Srivatsa and Ling Liu. Secure event dissemination in publish-subscribe networks. In Proceedings of the 27th International Conference on Distributed Computing Systems, page 22, Washington, DC, USA, 2007. IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Robert Strom, Guruduth Banavar, Tushar Chandra, Marc Kaplan, Kevan Miller, Bodhi Mukherjee, Daniel Sturman, and Michael Ward. Gryphon: An information ow based approach to message brokering. In International Symposium on Software Reliability Engineering (ISSRE '98), November 1998.Google ScholarGoogle Scholar
  26. Kevin Tomsovic, David E. Bakken, Vaithianathan Venkatasubramanian, and Anjan Bose. Designing the next generation of real-time control, communication, and computations for large power systems. Proceedings OF THE IEEE, 93(5):965--979, 2005.Google ScholarGoogle ScholarCross RefCross Ref
  27. David Wagner. Resilient aggregation in sensor networks. In Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, pages 78--87, New York, NY, USA, 2004. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Chenxi Wang, Antonio Carzaniga, David Evans, and Alexander L. Wolf. Security issues and requirements for Internet-scale publish-subscribe systems. In Proceedings of the 35th Annual Hawaii International Conference on System Sciences, Big Island, Hawaii, January 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Yuanyuan Zhao and Daniel C. Sturman. Dynamic access control in a content-based publish/subscribe system with delivery guarantees. In Proceedings of the 26th IEEE International Conference on Distributed Computing Systems, page 60, Washington, DC, USA, 2006. IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Secure aggregation in a publish-subscribe system

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            WPES '08: Proceedings of the 7th ACM workshop on Privacy in the electronic society
            October 2008
            128 pages
            ISBN:9781605582894
            DOI:10.1145/1456403

            Copyright © 2008 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 27 October 2008

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            Overall Acceptance Rate106of355submissions,30%

            Upcoming Conference

            CCS '24
            ACM SIGSAC Conference on Computer and Communications Security
            October 14 - 18, 2024
            Salt Lake City , UT , USA

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader