PRIVACY-PRESERVING COLLABORATIVE WEB SERVICES QOS PREDICTION VIA YAO'S GARBLED CIRCUITS AND HOMOMORPHIC ENCRYPTION

Authors

  • LU LI School of Information Engineering, Yancheng Teachers University, China
  • AN LIU School of Computer Science and Technology, Soochow University, China
  • QING LI Department of Computer Science, City University of Hong Kong, China
  • GUANFENG LIU School of Computer Science and Technology, Soochow University, China
  • GUANFENG LIU School of Computer Science and Technology, Soochow University, China
  • ZHIXU LI School of Computer Science and Technology, Soochow University, China

Keywords:

collaborative QoS prediction, privacy-preserving, Yao's garbled circuits, ho- momorphic encryption, recommendation system

Abstract

Collaborative Web services QoS prediction has become an important tool for the genera- tion of accurate personalized QoS which is a cornerstone of most QoS-based approaches for Web services selection and composition. While a number of achievements have been attained on the study of improving the accuracy of collaborative QoS prediction, little work has been done for protecting user privacy in this process. In this paper, we pro- pose a privacy-preserving collaborative QoS prediction framework which can protect the private data of users while retaining the ability of generating accurate QoS prediction. We combine Yao's garbled circuit and additively homomorphic encryption via additively secret sharing to address non-linear computations required in the process of QoS pre- diction. We implement the proposed framework based on FasterGC, an open source implementation of Yao's garbled circuit, and conduct extensive simulations to study its performance. Simulation results, together with theoretical security and complexity analysis, show that privacy-preserving QoS prediction can be eciently achieved in our framework.

 

Downloads

Download data is not yet available.

References

M. Alrifai, D. Skoutas, and T. Risse, "Selecting Skyline Services for QoS-Based Web Service

Composition," Proc. Int'l Conf. World Wide Web (WWW'10), pp. 11-20, 2010.

M. Alrifai and T. Risse, "Combining global optimization with local selection for ecient QoS-

aware service composition," Proc. Int'l Conf. World Wide Web (WWW'09), pp. 881-890, 2009.

D. Ardagna and B. Pernici, "Adaptive Service Composition in Flexible Processes," IEEE Trans.

Software Engineering, vol. 33, no. 6, pp. 369-384, June 2007.

D. Beaver, Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty

minority. Journal of Cryptology, no 4, pp. 75-122. 1991.

M. Bellare, V. Hoang, P. Rogaway, "Foundations of garbled circuits," Proc. ACM conference on

Computer and communications security (CCS'12), pp. 784-796, 2012

A. Ben-David, N. Nisan, B. Pinkas, "Fariplaymp: a system for secure multi-party computation,"

Proc. ACM conference on Computer and communications security (CCS'08), pp. 257-266, 2008

X. Chen, Z. Zheng, X. Liu, Z. Huang, and H. Sun, "Personalized QoS-Aware Web Service Recom-

mendation and Visualization," IEEE Trans. Services Computing, vol. 6, no. 1, pp. 35-47, January-

March 2013.

T. Cormen, C. Leiserson, R. Rivest and C.Stein, "Introduction to algorithms," the MIT press

J. W. Crenshaw, "Integer square roots," Embedded Systems Programming, Feb. 1998

I. Damgard, M. Geisler, and M. Krgaard, "Ecient and secure comparison for on-line auctions,"

Proc. Australasian Conf. Information Security and Privacy (ACSIP'07), pp. 416-430, 2007

C. Dwork, "Di erential privacy," Proc. Automata, Languages and Programming (ICALP'06), 2006

C. Dwork and J. Lei, "Di erential privacy and robust statistics," Proc. ACM STOC Symposium

on Theory of Computing (STOC'09), 2009

Z. Erkin, T. Veugen, T. Toft, and R.L. Lagendijk, "Generating Private Recommendations E-

ciently Using Homomorphic Encryption and Data Packing," IEEE Trans. Information Forensics

and Security, vol. 7, no. 3, pp. 1053-1066, June 2012

S. Even, O. Goldreich, and A. Lempel, "A randomized protocol for signing contracts," Commun.

ACM, vol. 28, no.6, 1985

S. Garg, S. Versteeg, R. Buyya, "A framework for ranking of cloud computing services," Future

Generation Comp. Syst. (FGCS) vol. 29, no. 4, pp 1012-1023, 2013

O. Goldrich, Foundations of Cryptography: Volume 2, Basic Applications, Cambridge university

press, 2004

D. Guinard, V. Trifa, S. Karnouskos, P. Spiess, D. Savio, "Interacting with the SOA-Based Internet

of Things: Discovery, Query, Selection, and On-Demand Provisioning of Web Services," IEEE T.

Services Computing (TSC) vol. 3, no. 3, pp. 223-235, 2010

W. Henecka, A. Sadeghi, T. Schneider et al, "Tasty: tool for automating secure two-party computa-

tions," Proc. ACM conference on Computer and communications security (CCS'10), pp. 451-462,

Y. Huang, D. Evans, J. Katz et al, "Faster secure two-party computation using garbled circuits,"

Proc. USENIX Security Symposium, 2011

Y. Ishai, J. Kilian, K. Nissim, and E. Petrank, "Extending oblivious transfers eciently," Proc.

CRYPTO'03, 2003

Y. Jiang, J. Liu, M. Tang, and X. F. Liu. An e ective web service recommendation method

based on personalized collaborative ltering. Proc. IEEE Int'l Conf. Web Services (ICWS'11), pp.

-218, 2011

D. Knuth, The Art of Computer Programming, Vol. 2, Semuninumerical Algorithms, 3rd ed.

Addison-Wesley, 1997

V. Kolesnikov and T. Schneider, "Improved garbled circuit: Free XOR gates and applications,"

Proc. Automata, Languages and Programming (ICALP'08). Springer, 2008

V. Kolesnikov, A.-R. Sadeghi, and T. Schneider, "Improved garbled circuit building blocks

and applications to auctions and computing minima," Proc. Cryptology and Network Security

(CANS'09), Springer, 2009

B. Kreuter, A. Shelat, C. Shen, "Billion-gate secure computation with malicious adversaries,"

Proc. USENIX conference on Security symposium, 2012

Y. Lindell, B. Pinkas, N. Smart, "Implementing two-party computation eciently with security

agains malicious adversaries." Proc. International conference on Security and Cryptography for

Networks (SCN'08), pp. 2-20, 2008

Y. Lindell and B. Pinkas, "A proof of Yao's protocol for two-party computation," J. Cryptology,

D. Malkhi, N. Nisan and B. Pinkas, "Fairplay-secure two-party computation systems," Proc.

USENIX conference on Security symposium, pp. 287-302. 2004

F. McSherry and I. Mironov, "Di erentially private recommender systems: Building privacy into

the Net

ix prize contenders," Proc. ACM SIGKDD international conference on Knowledge dis-

covery in data mining (KDD'09), 2009

V. Nikolaenko, U. Weinsberg, S. Ioannidis, M. Joye, D. Boneh, and N. Taft. "Privacy-preserving

ridge regression on hundreds of millions of records," Proc. IEEE Symposium on Security and

Privacy (S&P'13), 2013

V. Nikolaenko, U. Weinsberg, S. Ioannidis, M. Joye, D. Boneh, and N. Taft. "Privacy-

Preserving matrix factorization," Proc. ACM conference on Computer and communications secu-

rity (CCS'13), 2013

P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," Proc. Ad-

vances in Cryptology (EUROCRYPT' 99), pp. 223-238, 1999

B. Pinkas, T. Schneider, N. Smart, "Secure two-party computation is practical," Proc. Interna-

tional Conference on the Theory and Application of Cryptology and Information Security (ASI-

ACRYPT'09), pp. 250-267, 2009

M. Rabin, "How to exchange secrets by oblivious trarnsfer," Technical Report TR-81, Aiken

Computation Laboratory, Harvard University, 1981

L. Shao, J. Zhang, Y. Wei, J. Zhao, B. Xie, and H. Mei, "Personalized qos prediction forweb

services via collaborative ltering," Proc. IEEE Int'l Conf. Web Services (ICWS'07), pp. 439-446,

Y. Shen, J. Zhu, X. Wang, L. Cai, X. Yang, B. Zhou, "Geographic Location-Based Network-Aware

QoS Prediction for Service Composition," Proc. IEEE Int'l Conf. Web Services (ICWS'13), pp.

-74, 2013

R. Shokri, P. Pedarsani, G. Theodorakopoulos, and J. Hubaux, "Preserving privacy in collab-

orative ltering through distributed aggregation of oine pro les," Proc. ACM conference on

Recommender systems (RecSys'09), pp. 157-164, 2009

M. Tang, Y. Jiang, J. Liu, and X.Liu, "Location-Aware Collaborative Filtering for QoS-Based

Service Recommendation", Proc. IEEE Int'l Conf. Web Services (ICWS'12), pp. 202-209, 2012

A.C.-C. Yao. How to generate and exchange secrets. Proc. IEEE Symposium on Foundations of

Computer Scirence (FOCS'86), pp. 162-167, 1986

L. Yao, Q.Z. Sheng, A. Segev, J. Yu, "Recommending Web Services via Combining Collaborative

Filtering with Content-Based Features," Proc. IEEE Int'l Conf. Web Services (ICWS'13), pp.

-49, 2013

Q. Yu, Z. Zheng, and H. Wang, "Trace Norm Regularized Matrix Factorization for Service Rec-

ommendation," Proc. IEEE Int'l Conf. Web Services (ICWS'13), pp. 34-41, 2013

T. Yu, Y. Zhang, and K.-J. Lin, "Ecient algorithms for Web Services Selection with End-to-End

QoS Constraints," ACM Trans. Web, vol. 1, no. 1, pp. 1-26, 2007

L. Zeng, B. Benatallah, A. H. H. Ngu, M. Dumas, J. Kalaggnanam, and H. Chang, "QoS-Aware

Middleware for Web Services Composition," IEEE Transactions on Software Engineering, vol. 30,

no. 5, pp. 311-327, 2004

Q. Zhang, C. Ding, and C.-H. Chi. Collaborative ltering based service ranking using invocation

histories. Proc. IEEE Int'l Conf. Web Services (ICWS'11), pp. 195-202, 2011

Y. Zhang, Z. Zheng, and M.R. Lyu, "Exploring Latent Features for Memory-Based QoS Prediction

in Cloud Computing," Proc. IEEE Symposium on Reliable Distributed Systems (SRDS 2011),

Madrid, Spain, Oct.4-7, 2011

Z. Zheng, H. Ma, M.R. Lyu, I. King, "WSRec: A Collaborative Filtering Based Web Service

Recommender System," Proc. IEEE Int'l Conf. Web Services (ICWS'09), pp. 437-444, 2009

Z. Zheng, X.Wu, Y. Zhang, M.R. Lyu, and J.Wang, 'QoS Ranking Prediction for Cloud Services,"

IEEE Trans. Parallel and Distributed Systems, vol. 24, no. 6, pp. 1213-1222, June 2013

Z. Zheng, H. Ma, M.R. Lyu, and I. King, "Collaborative Web Service QoS Prediction via Neigh-

borhood Integrated Matrix Factorization," IEEE Trans. Services Computing, vol. 6, no. 3, pp.

-299, July-September 2013

Downloads

Published

2016-03-31

Issue

Section

Articles