Featured Research

from universities, journals, and other organizations

Collecting digital user data without invading privacy

Date:
March 6, 2014
Source:
University Saarland
Summary:
The statistical evaluation of digital user data is of vital importance for analyzing trends. But it can also undermine the privacy. Computer scientists have now developed a novel cryptographic method that makes it possible to collect data and protect the privacy of the user at the same time.

Saarbrücken computer scientists enable computing aggregate statistics about digital user data without undermining the privacy of users.
Credit: Oliver Dietze

The statistical evaluation of digital user data is of vital importance for analyzing trends. But it can also undermine the privacy. Computer scientists from Saarbrücken have now developed a novel cryptographic method that makes it possible to collect data and protect the privacy of the user at the same time. They present their approach for the first time at the computer expo Cebit in Hannover at the Saarland University research booth.

Related Articles


"Many website providers are able to collect data, but only a few manage to do so without invading users' privacy," explains Aniket Kate, who leads the research group "Cryptographic Systems" at the Cluster of Excellence "Multimodal Computing and Interaction" (MMCI) in Saarbrücken. Two aspects threaten privacy during data aggregation: On the one hand, where and how is the data aggregated? For example, website owners are interested in the age and gender of their visitors. Therefore, they store data files (cookies) on their computers that observe which other websites they visit. "But this wealth of sensitive information allows them also to reconstruct detailed profiles of each individual," says Kate. On the other hand, it is important to publish aggregated data in a privacy-preserving way. "Researchers have already demonstrated that precise information about the habits of citizens can be reconstructed from the electricity consumption information collected by so-called smart meters," explains Kate.

In cooperation with his colleagues Fabienne Eigner and Matteo Maffei from the Center for IT-Security, Privacy and Accountability (CISPA) and Francesca Pampaloni from the Italian IMT Institute for Advanced Studies Lucca, Kate developed a software system called "Privada." It is not only able to resolve the dilemma between the desire for information and the protection of data, but it can also be easily applied in different domains. "For example, with Privada website owners are still able to observe that their websites are mainly visited by middle-aged women, but nothing more," Kate explains.

To achieve this, users split up the requested information and send parts of it to previously defined servers performing multi-party computation: Each server evaluates its data without being aware of the data of other parties. So together they compute a secret, but are not able to decode it on their own. Moreover, each party adds on a value corresponding to a probability distribution to make the data a little bit imprecise. The perturbated partial results are assembled into the actual analysis. The perturbation ensures that the identity of the individual person is protected, while trends are still significant in the aggregated statistic about user data.

The privacy is even guaranteed if all but one of the servers collaborate. Hence, according to the researchers, it is even conceivable that companies could provide such servers. If only servers, and not users, perturb the data with a certain amount of noise, that has two advantages: Firstly, not much computational power is necessary on the user's side. Hence, even a mobile phone could send the partial result to a particular server. Also, in total, there is only a minimal amount of noise attached to the aggregated data. Hence, the resulting statistic about user data is as accurate as possible.

The computer scientists from Saarbrücken have already implemented their concept. "The computation is fast; the servers just need a few seconds," says Fabienne Eigner, part of the research group "Secure and Privacy-preserving Systems" at Saarland University. She also worked on the software system. The architecture is constructed in such a way that it would not make any difference if someone were to analyze the data of a thousand or a million people," explains Eigner.


Story Source:

The above story is based on materials provided by University Saarland. Note: Materials may be edited for content and length.


Cite This Page:

University Saarland. "Collecting digital user data without invading privacy." ScienceDaily. ScienceDaily, 6 March 2014. <www.sciencedaily.com/releases/2014/03/140306095252.htm>.
University Saarland. (2014, March 6). Collecting digital user data without invading privacy. ScienceDaily. Retrieved April 18, 2015 from www.sciencedaily.com/releases/2014/03/140306095252.htm
University Saarland. "Collecting digital user data without invading privacy." ScienceDaily. www.sciencedaily.com/releases/2014/03/140306095252.htm (accessed April 18, 2015).

Share This


More From ScienceDaily



More Computers & Math News

Saturday, April 18, 2015

Featured Research

from universities, journals, and other organizations


Featured Videos

from AP, Reuters, AFP, and other news services

WikiLeaks Refuses To Let Sony Hack Die, Posts Database

WikiLeaks Refuses To Let Sony Hack Die, Posts Database

Newsy (Apr. 17, 2015) — WikiLeaks&apos; Julian Assange says the hacked emails and documents "belong in the public domain." Video provided by Newsy
Powered by NewsLook.com
Scientists Create Self-Powering Camera

Scientists Create Self-Powering Camera

Reuters - Innovations Video Online (Apr. 17, 2015) — American scientists build a self-powering camera that captures images without using an external power source, allowing it to operate indefinitely in a well-lit environment. Elly Park reports. Video provided by Reuters
Powered by NewsLook.com
The State Of Virtual Reality

The State Of Virtual Reality

Newsy (Apr. 17, 2015) — Virtual Reality is still a young industry. What’s on offer and what should we expect from our immersive new future? Video provided by Newsy
Powered by NewsLook.com
Cybercrime Could Cost $400 Bln

Cybercrime Could Cost $400 Bln

Reuters - Business Video Online (Apr. 16, 2015) — Representatives from around 160 countries gather at the Hague to discuss cyber space and cyber security, including the dilemmas and challenges regarding the evolution of the internet. Ciara Lee reports. Video provided by Reuters
Powered by NewsLook.com

Search ScienceDaily

Number of stories in archives: 140,361

Find with keyword(s):
 
Enter a keyword or phrase to search ScienceDaily for related topics and research stories.

Save/Print:
Share:  

Breaking News:

Strange & Offbeat Stories

 

Space & Time

Matter & Energy

Computers & Math

In Other News

... from NewsDaily.com

Science News

Health News

Environment News

Technology News



Save/Print:
Share:  

Free Subscriptions


Get the latest science news with ScienceDaily's free email newsletters, updated daily and weekly. Or view hourly updated newsfeeds in your RSS reader:

Get Social & Mobile


Keep up to date with the latest news from ScienceDaily via social networks and mobile apps:

Have Feedback?


Tell us what you think of ScienceDaily -- we welcome both positive and negative comments. Have any problems using the site? Questions?
Mobile iPhone Android Web
Follow Facebook Twitter Google+
Subscribe RSS Feeds Email Newsletters
Latest Headlines Health & Medicine Mind & Brain Space & Time Matter & Energy Computers & Math Plants & Animals Earth & Climate Fossils & Ruins