Efficient Confidentiality-Preserving Data Analytics over Symmetrically Encrypted Datasets

被引:14
|
作者
Savvides, Savvas [1 ]
Khandelwal, Darshika [2 ]
Eugster, Patrick [2 ]
机构
[1] Purdue Univ, W Lafayette, IN 47907 USA
[2] Univ Svizzera Italiana USI, Lugano, Switzerland
来源
PROCEEDINGS OF THE VLDB ENDOWMENT | 2020年 / 13卷 / 08期
基金
美国国家科学基金会; 欧洲研究理事会;
关键词
AGGREGATION QUERIES;
D O I
10.14778/3389133.3389144
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the past decade, cloud computing has emerged as an economical and practical alternative to in-house datacenters. But due to security concerns, many enterprises are still averse to adopting third party clouds. To mitigate these concerns, several authors have proposed to use partially homomorphic encryption (PHE) to achieve practical levels of confidentiality while enabling computations in the cloud. However, these approaches are either not performant or not versatile enough. We present two novel PHE schemes, an additive and a multiplicative homomorphic encryption scheme, which, unlike previous schemes, are symmetric. We prove the security of our schemes and show they are more efficient than state-of-the-art asymmetric PHE schemes, without compromising the expressiveness of homomorphic operations they support. The main intuition behind our schemes is to trade strict ciphertext compactness for good "relative" compactness in practice, while in turn reaping improved performance. We build a prototype system called Symmetria that uses our proposed schemes and demonstrate its performance improvements over previous work. Symmetria achieves up to 7x average speedups on standard benchmarks compared to asymmetric PHE-based systems.
引用
收藏
页码:1290 / 1303
页数:14
相关论文
共 50 条
  • [1] Secure Data Types: A Simple Abstraction for Confidentiality-Preserving Data Analytics
    Savvides, Savvas
    Stephen, Julian James
    Ardekani, Masoud Saeida
    Sundaram, Vinaitheerthan
    Eugster, Patrick
    PROCEEDINGS OF THE 2017 SYMPOSIUM ON CLOUD COMPUTING (SOCC '17), 2017, : 479 - 492
  • [2] A Confidentiality-Preserving Search Technique for Encrypted Relational Cloud Databases
    Sidorov, Vasily
    Ng, Wee Keong
    PROCEEDINGS 2016 IEEE SECOND INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING SERVICE AND APPLICATIONS (BIGDATASERVICE 2016), 2016, : 244 - 251
  • [3] An efficient confidentiality-preserving Proof of Ownership for deduplication
    Gonzalez-Manzano, Lorena
    Orfila, Agustin
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2015, 50 : 49 - 59
  • [4] Big Data Analytics over Encrypted Datasets with Seabed
    Papadimitriou, Antonis
    Bhagwan, Ranjita
    Chandran, Nishanth
    Ramjee, Ramachandran
    Haeberlen, Andreas
    Singh, Harmeet
    Modi, Abhishek
    Badrinarayanan, Saikrishna
    PROCEEDINGS OF OSDI'16: 12TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, 2016, : 587 - 602
  • [5] Efficient and Confidentiality-Preserving Content-Based Publish/Subscribe with Prefiltering
    Barazzutti, Raphael
    Felber, Pascal
    Mercier, Hugues
    Onica, Emanuel
    Riviere, Etienne
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2017, 14 (03) : 308 - 325
  • [6] Efficient Analytics on Encrypted Data
    Gershinsky, Gidon
    SYSTOR'18: PROCEEDINGS OF THE 11TH ACM INTERNATIONAL SYSTEMS AND STORAGE CONFERENCE, 2018, : 121 - 121
  • [7] Efficient Privacy Preserving Ranked Search over Encrypted Data
    Praseed, Amit
    Sudheesh, Remya K.
    Chandrasekaran, K.
    PROCEEDINGS OF THE 2015 IEEE RECENT ADVANCES IN INTELLIGENT COMPUTATIONAL SYSTEMS (RAICS), 2015, : 128 - 133
  • [8] Confidentiality-preserving based on attribute encryption using auditable access during encrypted records in cloud location
    Raja, J.
    Ramakrishnan, M.
    JOURNAL OF SUPERCOMPUTING, 2020, 76 (08): : 6026 - 6039
  • [9] Confidentiality-preserving based on attribute encryption using auditable access during encrypted records in cloud location
    J. Raja
    M. Ramakrishnan
    The Journal of Supercomputing, 2020, 76 : 6026 - 6039
  • [10] Data confidentiality-preserving schemes for random linear networkcoding-capable networks
    Brahimi, Mohamed Amine
    Merazka, Fatiha
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 66