Data privacy has become increasingly important in recent years, with the rise of cyber threats and the unauthorized sharing of sen- sitive information. Our work within the E-Corridor project has focused on developing a secure framework for sharing informa- tion in multimodal transport systems, while ensuring data privacy is maintained. Our implementation of a two-party computation schema using Yao's garbled circuits in an Android mobile setting has enabled us to create an application that allows users to find points of interest, e.g., restaurants or hotels, near specific areas with- out sharing any personal information. The application matches user requests using the secure two-party without disclosing any of the user's preferences with external actors. We design a threat model based on LINDDUN to show the reliability of our project. It high- lights also the potential of using secure computing techniques to enable information sharing while maintaining privacy. Our work demonstrates the importance of prioritizing data privacy in our increasingly interconnected world and the potential of secure two- party computing techniques in achieving this goal. Besides, this framework is flexible and can be extended to various domains where data privacy is of utmost importance.

Application of Secure Two-Party Computation in a Privacy-Preserving Android App.

M De Vincenzi;I Matteucci;F Martinelli;
2023

Abstract

Data privacy has become increasingly important in recent years, with the rise of cyber threats and the unauthorized sharing of sen- sitive information. Our work within the E-Corridor project has focused on developing a secure framework for sharing informa- tion in multimodal transport systems, while ensuring data privacy is maintained. Our implementation of a two-party computation schema using Yao's garbled circuits in an Android mobile setting has enabled us to create an application that allows users to find points of interest, e.g., restaurants or hotels, near specific areas with- out sharing any personal information. The application matches user requests using the secure two-party without disclosing any of the user's preferences with external actors. We design a threat model based on LINDDUN to show the reliability of our project. It high- lights also the potential of using secure computing techniques to enable information sharing while maintaining privacy. Our work demonstrates the importance of prioritizing data privacy in our increasingly interconnected world and the potential of secure two- party computing techniques in achieving this goal. Besides, this framework is flexible and can be extended to various domains where data privacy is of utmost importance.
2023
Istituto di informatica e telematica - IIT
Privacy
secure two-party
mobile app
An
Yao
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/452765
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact