skip to main content
opinion
Public Access

User-centric distributed solutions for privacy-preserving analytics

Published:23 January 2017Publication History
Skip Abstract Section

Abstract

How can cryptography empower users with sensitive data to access large-scale computing platforms in a privacy-preserving manner?

References

  1. Archer, D.W. Maturity and performance of programmable secure computation. IACR Cryptology ePrint Archive, (1039), 2015.Google ScholarGoogle Scholar
  2. Barlow, R. Computational thinking breaks a Logjam: Hariri Institute helps address Boston's male-female pay gap. (Apr. 27, 2015); BU Today.Google ScholarGoogle Scholar
  3. Bogdanov, D. How the Estonian Tax and Customs Board Evaluated a Tax Fraud Detection System Based on Secure Multi-party Computation. Springer, Berlin, Heidelberg, 2015, 227--234. Google ScholarGoogle ScholarCross RefCross Ref
  4. Boston Women's Workforce Council Report 2016; http://bit.ly/2iR2KhWGoogle ScholarGoogle Scholar
  5. El Emam, K. A secure protocol for protecting the identity of providers when disclosing data for disease surveillance. Journal of the American Medical Informatics Association 18, 3 (May 2011), 212--217. Google ScholarGoogle ScholarCross RefCross Ref
  6. Gog, I. Musketeer: All for one, one for all in data processing systems. In Proceedings of the Tenth European Conference on Computer Systems (EuroSys), (2015), 2:1--2:16. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Hamlin, A. Cryptography for big data security. In Fei Hu, Ed., Big Data: Storage, Sharing, and Security. CRC Press, May 2016. Google ScholarGoogle ScholarCross RefCross Ref
  8. Lapets, A. Secure Multi-Party Computation for Analytics Deployed as a Lightweight Web Application. Technical Report BUCS-TR-2016-008, CS Dept., Boston University, July 2016.Google ScholarGoogle Scholar
  9. Lindell, Y. and Pinkas, B. Secure multiparty computation for privacy-preserving data mining. The Journal of Privacy and Confidentiality 1 (2009), 59--93.Google ScholarGoogle ScholarCross RefCross Ref
  10. McSherry, F. Scalability! But at what COST? In Proceedings of the 15th Workshop on Hot Topics in Operating Systems (HotOS XV), Kartause Ittingen, Switzerland (May 2015). USENIX Association.Google ScholarGoogle Scholar
  11. 100% Talent: The Boston Women's Compact; http://bit.ly/YWryu2Google ScholarGoogle Scholar
  12. Shen, E. Cryptographically secure computation. IEEE Computer 48, 4 (2015), 78--81. Google ScholarGoogle ScholarCross RefCross Ref
  13. Signers of 100% Talent: The Boston Women's Compact; http://bit.ly/2bN48QJGoogle ScholarGoogle Scholar
  14. Volgushev, N. DEMO: Integrating MPC in big data workflows. In Proceedings of CCS 2016: The 23rd ACM SIGSAC Conference on Computer and Communications Security, 2016.Google ScholarGoogle Scholar
  15. Will Data Help Close The Gender Pay Gap?; http://wbur.fm/2hdbjXaGoogle ScholarGoogle Scholar
  16. Yung, M. From mental poker to core business: Why and how to deploy secure computation protocols? In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, ACM, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. User-centric distributed solutions for privacy-preserving analytics

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image Communications of the ACM
      Communications of the ACM  Volume 60, Issue 2
      February 2017
      106 pages
      ISSN:0001-0782
      EISSN:1557-7317
      DOI:10.1145/3042068
      • Editor:
      • Moshe Y. Vardi
      Issue’s Table of Contents

      Copyright © 2017 Copyright is held by the owner/author(s)

      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 23 January 2017

      Check for updates

      Qualifiers

      • opinion
      • Popular
      • Un-reviewed

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format