TEE-Graph: efficient privacy and ownership protection for cloud-based graph spectral analysis

被引:0
|
作者
Alam, A. K. M. Mubashwir [1 ]
Chen, Keke [1 ]
机构
[1] Marquette Univ, TAIC Lab, Comp Sci, Milwaukee, WI 53233 USA
来源
FRONTIERS IN BIG DATA | 2023年 / 6卷
基金
美国国家科学基金会;
关键词
TEE; SGX; big graph; graph analytics; access pattern; ownership protection; FULLY HOMOMORPHIC ENCRYPTION;
D O I
10.3389/fdata.2023.1296469
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
IntroductionBig graphs like social network user interactions and customer rating matrices require significant computing resources to maintain. Data owners are now using public cloud resources for storage and computing elasticity. However, existing solutions do not fully address the privacy and ownership protection needs of the key involved parties: data contributors and the data owner who collects data from contributors.MethodsWe propose a Trusted Execution Environment (TEE) based solution: TEE-Graph for graph spectral analysis of outsourced graphs in the cloud. TEEs are new CPU features that can enable much more efficient confidential computing solutions than traditional software-based cryptographic ones. Our approach has several unique contributions compared to existing confidential graph analysis approaches. (1) It utilizes the unique TEE properties to ensure contributors' new privacy needs, e.g., the right of revocation for shared data. (2) It implements efficient access-pattern protection with a differentially private data encoding method. And (3) it implements TEE-based special analysis algorithms: the Lanczos method and the Nystrom method for efficiently handling big graphs and protecting confidentiality from compromised cloud providers.ResultsThe TEE-Graph approach is much more efficient than software crypto approaches and also immune to access-pattern-based attacks. Compared with the best-known software crypto approach for graph spectral analysis, PrivateGraph, we have seen that TEE-Graph has 103-105 times lower computation, storage, and communication costs. Furthermore, the proposed access-pattern protection method incurs only about 10%-25% of the overall computation cost.DiscussionOur experimentation showed that TEE-Graph performs significantly better and has lower costs than typical software approaches. It also addresses the unique ownership and access-pattern issues that other TEE-related graph analytics approaches have not sufficiently studied. The proposed approach can be extended to other graph analytics problems with strong ownership and access-pattern protection.
引用
收藏
页数:17
相关论文
共 50 条
  • [41] A Cloud-based Secure and Privacy-Preserving Clustering Analysis of Infectious Disease
    Liu, Jianqing
    Hu, Yaodan
    Yue, Hao
    Gong, Yanmin
    Fang, Yuguang
    2018 IEEE SYMPOSIUM ON PRIVACY-AWARE COMPUTING (PAC), 2018, : 107 - 116
  • [42] APoX: Accelerate Graph-Based Deep Point Cloud Analysis via Adaptive Graph Construction
    Dai, Lei
    Liang, Shengwen
    Wang, Ying
    Li, Huawei
    Li, Xiaowei
    29TH ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE, ASP-DAC 2024, 2024, : 231 - 237
  • [43] Data Protection and Recovery Performance Analysis of Cloud-Based Recovery Service
    Nikolovski, Saso
    Mitrevski, Pece
    2023 58TH INTERNATIONAL SCIENTIFIC CONFERENCE ON INFORMATION, COMMUNICATION AND ENERGY SYSTEMS AND TECHNOLOGIES, ICEST, 2023, : 139 - 142
  • [44] Efficient malware detection based on machine learning for enhanced cloud privacy protection
    Baawi, Salwa Shakir
    Oleiwi, Zahraa Ch.
    Al-Muqarm, Abbas M. Ali
    Al-Shammary, Dhiah
    Sufi, Fahim
    EVOLVING SYSTEMS, 2025, 16 (01)
  • [45] An Efficient Privacy-Preserving Public Auditing Protocol for Cloud-Based Medical Storage System
    Li, Xiong
    Liu, Shanpeng
    Lu, Rongxing
    Khan, Muhammad Khurram
    Gu, Ke
    Zhang, Xiaosong
    IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2022, 26 (05) : 2020 - 2031
  • [46] Vulnerability Analysis through a Graph-based Protection System
    Rafiei, Mohammad Ebrahim
    Jalili, Rasool
    Mousavi, Hamid
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (12): : 311 - 319
  • [47] A graph complexity measure based on the spectral analysis of the Laplace operator
    Mateos, Diego M.
    Morana, Federico
    Aimar, Hugo
    CHAOS SOLITONS & FRACTALS, 2022, 156
  • [48] Graph-Based Spectral Analysis for Detecting Cyber Attacks
    Jaber, Majed
    Boutry, Nicolas
    Parrend, Pierre
    19TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY, ARES 2024, 2024,
  • [49] Spectral Graph Sparsification in Nearly-Linear Time Leveraging Efficient Spectral Perturbation Analysis
    Feng, Zhuo
    2016 ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2016,
  • [50] SeCoM: An Outsourced Cloud-Based Secure Communication Model for Advanced Privacy Preserving Data Computing and Protection
    Gupta, Ishu
    Saxena, Deepika
    Singh, Ashutosh Kumar
    Lee, Chung-Nan
    IEEE SYSTEMS JOURNAL, 2023, 17 (04): : 5130 - 5141