[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3508398.3511509acmconferencesArticle/Chapter ViewAbstractPublication PagescodaspyConference Proceedingsconference-collections
research-article
Public Access

Privacy-Preserving Maximum Matching on General Graphs and its Application to Enable Privacy-Preserving Kidney Exchange

Published: 15 April 2022 Publication History

Abstract

To this day, there are still some countries where the exchange of kidneys between multiple incompatible patient-donor pairs is restricted by law. Typically, legal regulations in this context are put in place to prohibit coercion and manipulation in order to prevent a market for organ trade. Yet, in countries where kidney exchange is practiced, existing platforms to facilitate such exchanges generally lack sufficient privacy mechanisms. In this paper, we propose a privacy-preserving protocol for kidney exchange that not only addresses the privacy problem of existing platforms but also is geared to lead the way in overcoming legal issues in those countries where kidney exchange is still not practiced. In our approach, we use the concept of secret sharing to distribute the medical data of patients and donors among a set of computing peers in a privacy-preserving fashion. These computing peers then execute our new Secure Multi-Party Computation (SMPC) protocol among each other to determine an optimal set of kidney exchanges. As part of our new protocol, we devise a privacy-preserving solution to the maximum matching problem on general graphs. We have implemented the protocol in the SMPC benchmarking framework MP-SPDZ and provide a comprehensive performance evaluation. Furthermore, we analyze the practicality of our protocol when used in a dynamic setting where patients and donors arrive and depart over time) based on a data set from the United Network for Organ Sharing.

References

[1]
David J Abraham, Avrim Blum, and Tuomas Sandholm. 2007. Clearing Algorithms for Barter Exchange Markets: Enabling Nationwide Kidney Exchange. ACM Conference on Electronic Commerce .
[2]
Nikhil Agarwal, Itai Ashlagi, Eduardo Azevedo, Clayton Featherstone, and Ömer Karaduman. 2018. What Matters for the Productivity of Kidney Exchange?. In AEA Papers and Proceedings, Vol. 108.
[3]
Abdelrahaman Aly, Edouard Cuvelier, Sophie Mawet, Olivier Pereira, and Mathieu Van Vyve. 2013. Securely solving simple combinatorial graph problems. International Conference on Financial Cryptography and Data Security .
[4]
, Balamurugan Anandan and Chris Clifton. 2017. Secure minimum weighted bipartite matching. IEEE Conference on Dependable and Secure Computing .
[5]
, Tommy Andersson and Jörgen Kratz. 2020. Pairwise kidney exchange over the blood group barrier. The Review of Economic Studies, Vol. 87, 3.
[6]
Itai Ashlagi, Adam Bingaman, Maximilien Burq, Vahideh Manshadi, David Gamarnik, Cathi Murphey, Alvin E Roth, Marc L Melcher, and Michael A Rees. 2018. Effect of match-run frequencies on the number of transplants and waiting times in kidney exchange. American Journal of Transplantation, Vol. 18, 5 (2018).
[7]
, Itai Ashlagi and Alvin E Roth. 2021. Kidney Exchange: An Operations Perspective . Technical Report. National Bureau of Economic Research.
[8]
Michael Ben-Or, Shafi Goldwasser, and Avi Wigderson. 1988. Completeness theorems for non-cryptographic fault-tolerant distributed computations. In ACM Symposium on Theory of Computing. ACM.
[9]
, Claude Berge. 1957. Two Theorems in Graph Theory. Proceedings of the National Academy of Sciences of the United States of America, Vol. 43, 9 (1957).
[10]
Péter Biró, Bernadette Haase-Kromwijk, Tommy Andersson, Eyjólfur Ingi Ásgeirsson, Tatiana Baltesová, Ioannis Boletis, Catarina Bolotinha, Gregor Bond, Georg Böhmig, Lisa Burnapp, et almbox. 2019 a. Building Kidney Exchange Programmes in Europe -- An Overview of Exchange Practice and Activities. Transplantation, Vol. 103, 7 (2019).
[11]
Péter Biró, Joris van de Klundert, David Manlove, William Pettersson, Tommy Andersson, Lisa Burnapp, Pavel Chromy, Pablo Delgado, Piotr Dworczak, Bernadette Haase, et almbox. 2019 b. Modelling and optimisation in european kidney exchange programmes. In European Journal of Operational Research. Elsevier.
[12]
, Marina Blanton and Siddharth Saraph. 2015. Oblivious maximum bipartite matching size algorithm with applications to secure fingerprint identification. European Symposium on Research in Computer Security .
[13]
Marina Blanton, Aaron Steele, and Mehrdad Alisagari. 2013. Data-oblivious graph algorithms for secure computation and outsourcing. ACM SIGSAC symposium on Information, computer and communications security .
[14]
Norbert Blum. 1990. A new approach to maximum matching in general graphs. In International Colloquium on Automata, Languages, and Programming. Springer.
[15]
Dan Bogdanov, Marko J oemets, Sander Siim, and Meril Vaht. 2015. How the estonian tax and customs board evaluated a tax fraud detection system based on secure multi-party computation. In International conference on financial cryptography and data security. Springer.
[16]
Dan Bogdanov, Sven Laur, and Jan Willemson. 2008. Sharemind: A framework for fast privacy-preserving computations. In European Symposium on Research in Computer Security. Springer.
[17]
Malte Breuer, Ulrike Meyer, and Susanne Wetzel. 2022. Privacy-Preserving Maximum Matching on General Graphs and its Application to Kidney Exchange (Extended Version). arXiv preprint arXiv:2201.06446 .
[18]
Malte Breuer, Ulrike Meyer, and Susanne Wetzel. Source Code. https://gitlab.com/rwth-itsec/crossover-exchange .
[19]
Malte Breuer, Ulrike Meyer, Susanne Wetzel, and Anja Mühlfeld. 2020. A Privacy-Preserving Protocol for the Kidney Exchange Problem. In Workshop on Privacy in the Electronic Society. ACM.
[20]
Octavian Catrina and Sebastiaan De Hoogh. 2010. Improved primitives for secure multiparty integer computation. International Conference on Security and Cryptography for Networks .
[21]
Edward H Cole, Peter Nickerson, Patricia Campbell, Kathy Yetzer, Nick Lahaie, Jeffery Zaltzman, and John S Gill. 2015. The Canadian kidney paired donation program: a national program to increase living donor transplantation. Transplantation, Vol. 99, 5 (2015).
[22]
DESMOJ, DESMO-J. http://desmoj.sourceforge.net. Accessed 30-Sep-2021.
[23]
John P. Dickerson, Ariel D. Procaccia, and Tuomas Sandholm. 2019. Failure-Aware Kidney Exchange. Management Science, Vol. 65, 4 (2019).
[24]
Jack Doerner, David Evans, and Abhi Shelat. 2016. Secure stable matching at scale. ACM SIGSAC Conference on Computer and Communications Security .
[25]
, Jack Edmonds. 1965. Paths, Trees, and Flowers. Canadian Journal of mathematics, Vol. 17 (1965).
[26]
Paolo Ferrari, Willem Weimar, Rachel J Johnson, Wai H Lim, and Kathryn J Tinckam. 2015. Kidney paired donation: principles, protocols and programs. Nephrology Dialysis Transplantation, Vol. 30, 8 (2015).
[27]
, Harold N Gabow. 1976. An Efficient Implementation of Edmonds' Algorithm for Maximum Matching on Graphs. J. ACM, Vol. 23, 2 (1976).
[28]
, Harold N Gabow and Robert E Tarjan. 1991. Faster scaling algorithms for general graph matching problems. J. ACM, Vol. 38, 4 (1991).
[29]
, Oded Goldreich. 2004. Foundations of Cryptography: Volume 2 - Basic Applications .Cambridge University Press.
[30]
, Philippe Golle. 2006. A private stable matching algorithm. International Conference on Financial Cryptography and Data Security .
[31]
, Marcel Keller. 2020. MP-SPDZ: A Versatile Framework for Multi-Party Computation. In Computer and Communications Security. ACM.
[32]
, Marcel Keller and Peter Scholl. 2014. Efficient, oblivious data structures for MPC. International Conference on the Theory and Application of Cryptology and Information Security .
[33]
John Launchbury, Iavor S Diatchki, Thomas DuBuisson, and Andy Adams-Moran. 2012. Efficient lookup-table protocol in secure multiparty computation. ACM SIGPLAN international conference on Functional programming .
[34]
Silvio Micali and Vijay V Vazirani. 1980. An O($sqrtvert V vert vert E vert $) Algorithm for Finding Maximum Matching in General Graphs. In Symposium on Foundations of Computer Science . IEEE.
[35]
World Health Organization. Top 10 Causes of Death. https://www.who.int/news-room/fact-sheets/detail/the-top-10-causes-of-death . Accessed 30-Sep-2021.
[36]
U Pape and D Conradt. 1980. Maximales Matching in Graphen. Ausgew"ahlte Operations Research Software in FORTRAN (1980).
[37]
Organ Procurement and Transplantation Network. https://optn.transplant.hrsa.gov/data/view-data-reports/national-data/. Accessed 30-Sep-2021 .
[38]
M Sadegh Riazi, Ebrahim M Songhori, Ahmad-Reza Sadeghi, Thomas Schneider, and Farinaz Koushanfar. 2017. Toward Practical Secure Stable Matching. Proc. Priv. Enhancing Technol., Vol. 2017, 1.
[39]
Adi Shamir. 1979. How to Share a Secret. Commun. ACM, Vol. 22, 11 (1979).
[40]
Maciej Syslo, Narsingh Deo, and Janusz S Kowalik. 1983. Discrete Optimization Algorithms with Pascal Programs .Prentice Hall.
[41]
Stefan Wüller, Michael Vu, Ulrike Meyer, and Susanne Wetzel. 2017. Using Secure Graph Algorithms for the Privacy-Preserving Identification of Optimal Bartering Opportunities. Workshop on Privacy in the Electronic Society .

Cited By

View all
  • (2024)Prioritization and exchange chains in privacy-preserving kidney exchangeJournal of Computer Security10.3233/JCS-23001232:4(349-404)Online publication date: 26-Aug-2024
  • (2024)Efficient Integration of Exchange Chains in Privacy-Preserving Kidney Exchange2024 21st Annual International Conference on Privacy, Security and Trust (PST)10.1109/PST62714.2024.10788043(1-10)Online publication date: 28-Aug-2024
  • (2022)SPIKE: secure and private investigation of the kidney exchange problemBMC Medical Informatics and Decision Making10.1186/s12911-022-01994-422:1Online publication date: 22-Sep-2022

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
CODASPY '22: Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy
April 2022
392 pages
ISBN:9781450392204
DOI:10.1145/3508398
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 15 April 2022

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. kidney exchange
  2. matching algorithms
  3. privacy
  4. secure multi-party computation

Qualifiers

  • Research-article

Funding Sources

Conference

CODASPY '22
Sponsor:

Acceptance Rates

Overall Acceptance Rate 149 of 789 submissions, 19%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)118
  • Downloads (Last 6 weeks)9
Reflects downloads up to 14 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Prioritization and exchange chains in privacy-preserving kidney exchangeJournal of Computer Security10.3233/JCS-23001232:4(349-404)Online publication date: 26-Aug-2024
  • (2024)Efficient Integration of Exchange Chains in Privacy-Preserving Kidney Exchange2024 21st Annual International Conference on Privacy, Security and Trust (PST)10.1109/PST62714.2024.10788043(1-10)Online publication date: 28-Aug-2024
  • (2022)SPIKE: secure and private investigation of the kidney exchange problemBMC Medical Informatics and Decision Making10.1186/s12911-022-01994-422:1Online publication date: 22-Sep-2022

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media