Data privacy has become increasingly important in recent years, with the rise of cyber threats and the unauthorized sharing of sen- sitive information. Our work within the E-Corridor project has focused on developing a secure framework for sharing informa- tion in multimodal transport systems, while ensuring data privacy is maintained. Our implementation of a two-party computation schema using Yao's garbled circuits in an Android mobile setting has enabled us to create an application that allows users to find points of interest, e.g., restaurants or hotels, near specific areas with- out sharing any personal information. The application matches user requests using the secure two-party without disclosing any of the user's preferences with external actors. We design a threat model based on LINDDUN to show the reliability of our project. It high- lights also the potential of using secure computing techniques to enable information sharing while maintaining privacy. Our work demonstrates the importance of prioritizing data privacy in our increasingly interconnected world and the potential of secure two- party computing techniques in achieving this goal. Besides, this framework is flexible and can be extended to various domains where data privacy is of utmost importance.

Application of Secure Two-Party Computation in a Privacy-Preserving Android App.

M De Vincenzi;I Matteucci;F Martinelli;
2023

Abstract

Data privacy has become increasingly important in recent years, with the rise of cyber threats and the unauthorized sharing of sen- sitive information. Our work within the E-Corridor project has focused on developing a secure framework for sharing informa- tion in multimodal transport systems, while ensuring data privacy is maintained. Our implementation of a two-party computation schema using Yao's garbled circuits in an Android mobile setting has enabled us to create an application that allows users to find points of interest, e.g., restaurants or hotels, near specific areas with- out sharing any personal information. The application matches user requests using the secure two-party without disclosing any of the user's preferences with external actors. We design a threat model based on LINDDUN to show the reliability of our project. It high- lights also the potential of using secure computing techniques to enable information sharing while maintaining privacy. Our work demonstrates the importance of prioritizing data privacy in our increasingly interconnected world and the potential of secure two- party computing techniques in achieving this goal. Besides, this framework is flexible and can be extended to various domains where data privacy is of utmost importance.
2023
Istituto di informatica e telematica - IIT
979-8-4007-0772-8
Privacy
secure two-party
mobile app
An
Yao
File in questo prodotto:
File Dimensione Formato  
prod_490495-doc_204381.pdf

accesso aperto

Descrizione: Application of Secure Two-Party Computation in a Privacy-Preserving Android App
Tipologia: Versione Editoriale (PDF)
Licenza: Creative commons
Dimensione 1.39 MB
Formato Adobe PDF
1.39 MB Adobe PDF Visualizza/Apri

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/452765
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact