TEE-Graph: efficient privacy and ownership protection for cloud-based graph spectral analysis

被引:0
|
作者
Alam, A. K. M. Mubashwir [1 ]
Chen, Keke [1 ]
机构
[1] Marquette Univ, TAIC Lab, Comp Sci, Milwaukee, WI 53233 USA
来源
FRONTIERS IN BIG DATA | 2023年 / 6卷
基金
美国国家科学基金会;
关键词
TEE; SGX; big graph; graph analytics; access pattern; ownership protection; FULLY HOMOMORPHIC ENCRYPTION;
D O I
10.3389/fdata.2023.1296469
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
IntroductionBig graphs like social network user interactions and customer rating matrices require significant computing resources to maintain. Data owners are now using public cloud resources for storage and computing elasticity. However, existing solutions do not fully address the privacy and ownership protection needs of the key involved parties: data contributors and the data owner who collects data from contributors.MethodsWe propose a Trusted Execution Environment (TEE) based solution: TEE-Graph for graph spectral analysis of outsourced graphs in the cloud. TEEs are new CPU features that can enable much more efficient confidential computing solutions than traditional software-based cryptographic ones. Our approach has several unique contributions compared to existing confidential graph analysis approaches. (1) It utilizes the unique TEE properties to ensure contributors' new privacy needs, e.g., the right of revocation for shared data. (2) It implements efficient access-pattern protection with a differentially private data encoding method. And (3) it implements TEE-based special analysis algorithms: the Lanczos method and the Nystrom method for efficiently handling big graphs and protecting confidentiality from compromised cloud providers.ResultsThe TEE-Graph approach is much more efficient than software crypto approaches and also immune to access-pattern-based attacks. Compared with the best-known software crypto approach for graph spectral analysis, PrivateGraph, we have seen that TEE-Graph has 103-105 times lower computation, storage, and communication costs. Furthermore, the proposed access-pattern protection method incurs only about 10%-25% of the overall computation cost.DiscussionOur experimentation showed that TEE-Graph performs significantly better and has lower costs than typical software approaches. It also addresses the unique ownership and access-pattern issues that other TEE-related graph analytics approaches have not sufficiently studied. The proposed approach can be extended to other graph analytics problems with strong ownership and access-pattern protection.
引用
收藏
页数:17
相关论文
共 50 条
  • [1] A Cloud-based Mobile Privacy Protection System with Efficient Cache Mechanism
    Dai W.
    Chen L.
    Journal of Computing and Information Technology, 2022, 29 (04) : 219 - 234
  • [2] Transaction Management for Cloud-Based Graph Databases
    Koloniari, Georgia
    Pitoura, Evaggelia
    ALGORITHMIC ASPECTS OF CLOUD COMPUTING, ALGOCLOUD 2015, 2016, 9511 : 99 - 113
  • [3] Research on Cloud-Based LBS and Location Privacy Protection
    Yan, Yan
    Wang, Wan Jun
    INDUSTRIAL ENGINEERING, MACHINE DESIGN AND AUTOMATION (IEMDA 2014) & COMPUTER SCIENCE AND APPLICATION (CCSA 2014), 2015, : 9 - 15
  • [4] Graph publishing method based on differential privacy protection
    王俊丽
    Yang Li
    Wu Yuxi
    Guan Min
    High Technology Letters, 2018, 24 (02) : 134 - 141
  • [5] Cloud-Based Identity Attribute Service with Privacy Protection in Cyberspace
    Zou, Xiang
    Chen, Bing
    Jin, Bo
    2012 INTERNATIONAL WORKSHOP ON INFORMATION AND ELECTRONICS ENGINEERING, 2012, 29 : 1160 - 1164
  • [6] Privacy Protection Based Access Control Scheme in Cloud-Based Services
    Fan, Kai
    Tian, Qiong
    Wang, Junxiong
    Li, Hui
    Yang, Yintang
    CHINA COMMUNICATIONS, 2017, 14 (01) : 61 - 71
  • [7] Cloud-Based Lightweight RFID Healthcare Privacy Protection Protocol
    Fan, Kai
    Wang, Wei
    Wang, Yue
    Li, Hui
    Yang, Yintang
    2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,
  • [8] Graph- and Cloud-Based Tools for Computer Science Education
    Kasyanov, Victor N.
    Kasyanova, Elena V.
    MOBILE, SECURE, AND PROGRAMMABLE NETWORKING, MSPN 2015, 2015, 9395 : 41 - 54
  • [9] Privacy Protection based Access Control Scheme in Cloud-based Services
    Fan, Kai
    Tian, Qiong
    Huang, Nana
    Wang, Yue
    Li, Hui
    Yang, Yintang
    2016 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2016,
  • [10] Privacy Protection Based Access Control Scheme in Cloud-Based Services
    Kai Fan
    Qiong Tian
    Junxiong Wang
    Hui Li
    Yintang Yang
    中国通信, 2017, 14 (01) : 61 - 71