TEE-Graph: efficient privacy and ownership protection for cloud-based graph spectral analysis

被引:0
|
作者
Alam, A. K. M. Mubashwir [1 ]
Chen, Keke [1 ]
机构
[1] Marquette Univ, TAIC Lab, Comp Sci, Milwaukee, WI 53233 USA
来源
FRONTIERS IN BIG DATA | 2023年 / 6卷
基金
美国国家科学基金会;
关键词
TEE; SGX; big graph; graph analytics; access pattern; ownership protection; FULLY HOMOMORPHIC ENCRYPTION;
D O I
10.3389/fdata.2023.1296469
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
IntroductionBig graphs like social network user interactions and customer rating matrices require significant computing resources to maintain. Data owners are now using public cloud resources for storage and computing elasticity. However, existing solutions do not fully address the privacy and ownership protection needs of the key involved parties: data contributors and the data owner who collects data from contributors.MethodsWe propose a Trusted Execution Environment (TEE) based solution: TEE-Graph for graph spectral analysis of outsourced graphs in the cloud. TEEs are new CPU features that can enable much more efficient confidential computing solutions than traditional software-based cryptographic ones. Our approach has several unique contributions compared to existing confidential graph analysis approaches. (1) It utilizes the unique TEE properties to ensure contributors' new privacy needs, e.g., the right of revocation for shared data. (2) It implements efficient access-pattern protection with a differentially private data encoding method. And (3) it implements TEE-based special analysis algorithms: the Lanczos method and the Nystrom method for efficiently handling big graphs and protecting confidentiality from compromised cloud providers.ResultsThe TEE-Graph approach is much more efficient than software crypto approaches and also immune to access-pattern-based attacks. Compared with the best-known software crypto approach for graph spectral analysis, PrivateGraph, we have seen that TEE-Graph has 103-105 times lower computation, storage, and communication costs. Furthermore, the proposed access-pattern protection method incurs only about 10%-25% of the overall computation cost.DiscussionOur experimentation showed that TEE-Graph performs significantly better and has lower costs than typical software approaches. It also addresses the unique ownership and access-pattern issues that other TEE-related graph analytics approaches have not sufficiently studied. The proposed approach can be extended to other graph analytics problems with strong ownership and access-pattern protection.
引用
收藏
页数:17
相关论文
共 50 条
  • [31] A privacy-preserving cloud-based data management system with efficient revocation scheme
    Chang, Shih-Chien
    Wu, Ja-Ling
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2019, 20 (02) : 190 - 199
  • [32] An Efficient Q-KPABE Framework to Enhance Cloud-Based IoT Security and Privacy
    Singamaneni, Kranthi Kumar
    Budati, Anil Kumar
    Bikku, Thulasi
    WIRELESS PERSONAL COMMUNICATIONS, 2024,
  • [33] Efficient Classification of Depression using EEG through Spectral Graph Analysis
    Santos, Lucas de O.
    Silva, Iagson Carlos L.
    dos Santos, Matheus A.
    Medeiros, Aldisio G.
    Reboucas Filho, Pedro P.
    2024 IEEE 37TH INTERNATIONAL SYMPOSIUM ON COMPUTER-BASED MEDICAL SYSTEMS, CBMS 2024, 2024, : 537 - 542
  • [34] Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection
    Shen, Meng
    Ma, Baoli
    Zhu, Liehuang
    Mijumbi, Rashid
    Du, Xiaojiang
    Hu, Jiankun
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (04) : 940 - 953
  • [35] A simplified deniable authentication scheme in cloud-based pay-TV system with privacy protection
    Zhu, Hongfeng
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (11)
  • [36] Dynamic social privacy protection based on graph mode partition in complex social network
    Gu Qiuyang
    Ni Qilian
    Meng Xiangzhao
    Yang Zhijiao
    Personal and Ubiquitous Computing, 2019, 23 : 511 - 519
  • [37] Dynamic social privacy protection based on graph mode partition in complex social network
    Gu Qiuyang
    Ni Qilian
    Meng Xiangzhao
    Yang Zhijiao
    PERSONAL AND UBIQUITOUS COMPUTING, 2019, 23 (3-4) : 511 - 519
  • [38] Efficient Analysis of Cloud-based enterprise information application systems
    Lin, Hua Yi
    Hsieh, Meng-Yen
    Chiu, Yu-Bin
    Doong, Jiann-Gwo
    PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON ADVANCED ICT, (ICAICTE 2014), 2014, : 14 - 19
  • [39] Graph Based Root Cause Analysis in Cloud Data Center
    Dandona, Divyaansh
    Demir, Mevlut
    Prevost, John J.
    2020 IEEE 15TH INTERNATIONAL CONFERENCE OF SYSTEM OF SYSTEMS ENGINEERING (SOSE 2020), 2020, : 549 - 554
  • [40] Analysis of the Security and Privacy Requirements of Cloud-Based Electronic Health Records Systems
    Rodrigues, Joel J. P. C.
    de la Torre, Isabel
    Fernandez, Gonzalo
    Lopez-Coronado, Miguel
    JOURNAL OF MEDICAL INTERNET RESEARCH, 2013, 15 (08)