Asynchronous privacy-preserving iterative computation on peer-to-peer networks

J. A.M. Naranjo, L. G. Casado, Márk Jelasity

Research output: Contribution to journalArticle

4 Citations (Scopus)


Privacy preserving algorithms allow several participants to compute a global function collaboratively without revealing local information to each other. Examples of applications include trust management, collaborative filtering, and ranking algorithms such as PageRank. Most solutions that can be proven to be privacy preserving theoretically are not appropriate for highly unreliable, large scale, distributed environments such as peer-to-peer (P2P) networks because they either require centralized components, or a high degree of synchronism among the participants. At the same time, in P2P networks privacy preservation is becoming a key requirement. Here, we propose an asynchronous privacy preserving communication layer for an important class of iterative computations in P2P networks, where each peer periodically computes a linear combination of data stored at its neighbors. Our algorithm tolerates realistic rates of message drop and delay, and node churn, and has a low communication overhead. We perform simulation experiments to compare our algorithm to related work. The problem we use as an example is power iteration (a method used to calculate the dominant eigenvector of a matrix), since eigenvector computation is at the core of several practical applications. We demonstrate that our novel algorithm also converges in the presence of realistic node churn, message drop rates and message delay, even when previous synchronized solutions are able to make almost no progress.

Original languageEnglish
Pages (from-to)763-782
Number of pages20
Issue number8-10
Publication statusPublished - Sep 1 2012


  • Asynchrony
  • Churn
  • P2P
  • Power iteration
  • Privacy preservation

ASJC Scopus subject areas

  • Software
  • Theoretical Computer Science
  • Numerical Analysis
  • Computer Science Applications
  • Computational Theory and Mathematics
  • Computational Mathematics

Fingerprint Dive into the research topics of 'Asynchronous privacy-preserving iterative computation on peer-to-peer networks'. Together they form a unique fingerprint.

  • Cite this