V. Galanis, E. K. Ikonomakis, G. Meletiou, M. Vrahatis
{"title":"An e-voting-based data gathering scheme for decision support systems","authors":"V. Galanis, E. K. Ikonomakis, G. Meletiou, M. Vrahatis","doi":"10.1504/IJDSRM.2010.034670","DOIUrl":null,"url":null,"abstract":"In this contribution, a protocol for secure data gathering is introduced that utilises existing e-voting protocols to gather data records instead of votes. The protocol relies on two distinct authorities for the secure gathering of data and makes use of a token for each database record, making unencrypted data accessible only to the system participants. The protocol is suitable for decision support systems among non-mutually trusted parties as it protects the anonymity and privacy of the parties by dissociating the data from their origin and protects both the validity of the data sent by each party and the system by intruders and malicious participants.","PeriodicalId":170104,"journal":{"name":"International Journal of Decision Sciences, Risk and Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Decision Sciences, Risk and Management","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/IJDSRM.2010.034670","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
In this contribution, a protocol for secure data gathering is introduced that utilises existing e-voting protocols to gather data records instead of votes. The protocol relies on two distinct authorities for the secure gathering of data and makes use of a token for each database record, making unencrypted data accessible only to the system participants. The protocol is suitable for decision support systems among non-mutually trusted parties as it protects the anonymity and privacy of the parties by dissociating the data from their origin and protects both the validity of the data sent by each party and the system by intruders and malicious participants.