Featured Research

from universities, journals, and other organizations

Collecting digital user data without invading privacy

Date:
March 6, 2014
Source:
University Saarland
Summary:
The statistical evaluation of digital user data is of vital importance for analyzing trends. But it can also undermine the privacy. Computer scientists have now developed a novel cryptographic method that makes it possible to collect data and protect the privacy of the user at the same time.

Saarbrücken computer scientists enable computing aggregate statistics about digital user data without undermining the privacy of users.
Credit: Oliver Dietze

The statistical evaluation of digital user data is of vital importance for analyzing trends. But it can also undermine the privacy. Computer scientists from Saarbrücken have now developed a novel cryptographic method that makes it possible to collect data and protect the privacy of the user at the same time. They present their approach for the first time at the computer expo Cebit in Hannover at the Saarland University research booth.

Related Articles


"Many website providers are able to collect data, but only a few manage to do so without invading users' privacy," explains Aniket Kate, who leads the research group "Cryptographic Systems" at the Cluster of Excellence "Multimodal Computing and Interaction" (MMCI) in Saarbrücken. Two aspects threaten privacy during data aggregation: On the one hand, where and how is the data aggregated? For example, website owners are interested in the age and gender of their visitors. Therefore, they store data files (cookies) on their computers that observe which other websites they visit. "But this wealth of sensitive information allows them also to reconstruct detailed profiles of each individual," says Kate. On the other hand, it is important to publish aggregated data in a privacy-preserving way. "Researchers have already demonstrated that precise information about the habits of citizens can be reconstructed from the electricity consumption information collected by so-called smart meters," explains Kate.

In cooperation with his colleagues Fabienne Eigner and Matteo Maffei from the Center for IT-Security, Privacy and Accountability (CISPA) and Francesca Pampaloni from the Italian IMT Institute for Advanced Studies Lucca, Kate developed a software system called "Privada." It is not only able to resolve the dilemma between the desire for information and the protection of data, but it can also be easily applied in different domains. "For example, with Privada website owners are still able to observe that their websites are mainly visited by middle-aged women, but nothing more," Kate explains.

To achieve this, users split up the requested information and send parts of it to previously defined servers performing multi-party computation: Each server evaluates its data without being aware of the data of other parties. So together they compute a secret, but are not able to decode it on their own. Moreover, each party adds on a value corresponding to a probability distribution to make the data a little bit imprecise. The perturbated partial results are assembled into the actual analysis. The perturbation ensures that the identity of the individual person is protected, while trends are still significant in the aggregated statistic about user data.

The privacy is even guaranteed if all but one of the servers collaborate. Hence, according to the researchers, it is even conceivable that companies could provide such servers. If only servers, and not users, perturb the data with a certain amount of noise, that has two advantages: Firstly, not much computational power is necessary on the user's side. Hence, even a mobile phone could send the partial result to a particular server. Also, in total, there is only a minimal amount of noise attached to the aggregated data. Hence, the resulting statistic about user data is as accurate as possible.

The computer scientists from Saarbrücken have already implemented their concept. "The computation is fast; the servers just need a few seconds," says Fabienne Eigner, part of the research group "Secure and Privacy-preserving Systems" at Saarland University. She also worked on the software system. The architecture is constructed in such a way that it would not make any difference if someone were to analyze the data of a thousand or a million people," explains Eigner.


Story Source:

The above story is based on materials provided by University Saarland. Note: Materials may be edited for content and length.


Cite This Page:

University Saarland. "Collecting digital user data without invading privacy." ScienceDaily. ScienceDaily, 6 March 2014. <www.sciencedaily.com/releases/2014/03/140306095252.htm>.
University Saarland. (2014, March 6). Collecting digital user data without invading privacy. ScienceDaily. Retrieved January 25, 2015 from www.sciencedaily.com/releases/2014/03/140306095252.htm
University Saarland. "Collecting digital user data without invading privacy." ScienceDaily. www.sciencedaily.com/releases/2014/03/140306095252.htm (accessed January 25, 2015).

Share This


More From ScienceDaily



More Computers & Math News

Sunday, January 25, 2015

Featured Research

from universities, journals, and other organizations


Featured Videos

from AP, Reuters, AFP, and other news services

How Technology Is Ruining Snow Days For Students

How Technology Is Ruining Snow Days For Students

Newsy (Jan. 25, 2015) — More schools are using online classes to keep from losing time to snow days, but it only works if students have Internet access at home. Video provided by Newsy
Powered by NewsLook.com
Sundance Films Tap Into Virtual Reality

Sundance Films Tap Into Virtual Reality

Newsy (Jan. 25, 2015) — Virtual reality headsets offer more experiences for viewers and filmmakers at the Sundance Film Festival. Video provided by Newsy
Powered by NewsLook.com
No, A Google Exec Did Not Predict An Internet Apocalypse

No, A Google Exec Did Not Predict An Internet Apocalypse

Newsy (Jan. 24, 2015) — Earlier this week, a Google exec made headlines for saying "the Internet will disappear," but that doesn&apos;t quite mean what it sounds like. Video provided by Newsy
Powered by NewsLook.com
Tim Cook Made 8 Times Less Than Another Apple Exec In 2014

Tim Cook Made 8 Times Less Than Another Apple Exec In 2014

Newsy (Jan. 23, 2015) — Tim Cook&apos;s total compensation more than doubled in 2014 to $9.2 million, but his pay was still less than four other Apple executives. Video provided by Newsy
Powered by NewsLook.com

Search ScienceDaily

Number of stories in archives: 140,361

Find with keyword(s):
 
Enter a keyword or phrase to search ScienceDaily for related topics and research stories.

Save/Print:
Share:  

Breaking News:

Strange & Offbeat Stories

 

Space & Time

Matter & Energy

Computers & Math

In Other News

... from NewsDaily.com

Science News

Health News

Environment News

Technology News



Save/Print:
Share:  

Free Subscriptions


Get the latest science news with ScienceDaily's free email newsletters, updated daily and weekly. Or view hourly updated newsfeeds in your RSS reader:

Get Social & Mobile


Keep up to date with the latest news from ScienceDaily via social networks and mobile apps:

Have Feedback?


Tell us what you think of ScienceDaily -- we welcome both positive and negative comments. Have any problems using the site? Questions?
Mobile iPhone Android Web
Follow Facebook Twitter Google+
Subscribe RSS Feeds Email Newsletters
Latest Headlines Health & Medicine Mind & Brain Space & Time Matter & Energy Computers & Math Plants & Animals Earth & Climate Fossils & Ruins