Efficient Confidentiality-Preserving Data Analytics over Symmetrically Encrypted Datasets

被引:14
|
作者
Savvides, Savvas [1 ]
Khandelwal, Darshika [2 ]
Eugster, Patrick [2 ]
机构
[1] Purdue Univ, W Lafayette, IN 47907 USA
[2] Univ Svizzera Italiana USI, Lugano, Switzerland
来源
PROCEEDINGS OF THE VLDB ENDOWMENT | 2020年 / 13卷 / 08期
基金
美国国家科学基金会; 欧洲研究理事会;
关键词
AGGREGATION QUERIES;
D O I
10.14778/3389133.3389144
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the past decade, cloud computing has emerged as an economical and practical alternative to in-house datacenters. But due to security concerns, many enterprises are still averse to adopting third party clouds. To mitigate these concerns, several authors have proposed to use partially homomorphic encryption (PHE) to achieve practical levels of confidentiality while enabling computations in the cloud. However, these approaches are either not performant or not versatile enough. We present two novel PHE schemes, an additive and a multiplicative homomorphic encryption scheme, which, unlike previous schemes, are symmetric. We prove the security of our schemes and show they are more efficient than state-of-the-art asymmetric PHE schemes, without compromising the expressiveness of homomorphic operations they support. The main intuition behind our schemes is to trade strict ciphertext compactness for good "relative" compactness in practice, while in turn reaping improved performance. We build a prototype system called Symmetria that uses our proposed schemes and demonstrate its performance improvements over previous work. Symmetria achieves up to 7x average speedups on standard benchmarks compared to asymmetric PHE-based systems.
引用
收藏
页码:1290 / 1303
页数:14
相关论文
共 50 条
  • [31] Efficient Strong Privacy-Preserving Conjunctive Keyword Search Over Encrypted Cloud Data
    Xu, Chang
    Wang, Ruijuan
    Zhu, Liehuang
    Zhang, Chuan
    Lu, Rongxing
    Sharif, Kashif
    IEEE TRANSACTIONS ON BIG DATA, 2023, 9 (03) : 805 - 817
  • [32] PGSim: Efficient and Privacy-Preserving Graph Similarity Query Over Encrypted Data in Cloud
    Zheng, Yandong
    Zhu, Hui
    Lu, Rongxing
    Guan, Yunguo
    Zhang, Songnian
    Wang, Fengwei
    Shao, Jun
    Li, Hui
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 2030 - 2045
  • [33] An Efficient and Privacy-Preserving Ranked Fuzzy Keywords Search over Encrypted Cloud Data
    Ding, Shugeng
    Li, Yidong
    Zhang, Jianhui
    Chen, Liang
    Wang, Zhen
    Xu, Qunqun
    2016 INTERNATIONAL CONFERENCE ON BEHAVIORAL, ECONOMIC AND SOCIO-CULTURAL COMPUTING (BESC), 2016, : 151 - 156
  • [34] Efficient and Privacy-Preserving Similarity Range Query Over Encrypted Time Series Data
    Zheng, Yandong
    Lu, Rongxing
    Guan, Yunguo
    Shao, Jun
    Zhu, Hui
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (04) : 2501 - 2516
  • [35] Efficient and Privacy-Preserving Multi-Party Skyline Queries Over Encrypted Data
    Ding, Xiaofeng
    Wang, Zuan
    Zhou, Pan
    Choo, Kim-Kwang Raymond
    Jin, Hai
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 4589 - 4604
  • [36] Efficient privacy-preserving data merging and skyline computation over multi-source encrypted data
    Zheng, Yandong
    Lu, Rongxing
    Li, Beibei
    Shao, Jun
    Yang, Haomiao
    Choo, Kim-Kwang Raymond
    INFORMATION SCIENCES, 2019, 498 : 91 - 105
  • [37] Efficient wildcard search over encrypted data
    Changhui Hu
    Lidong Han
    International Journal of Information Security, 2016, 15 : 539 - 547
  • [38] Efficient Computations over Encrypted Data Blocks
    Di Crescenzo, Giovanni
    Coan, Brian
    Kirsch, Jonathan
    MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE 2015, PT II, 2015, 9235 : 274 - 286
  • [39] Efficient Similarity Search over Encrypted Data
    Kuzu, Mehmet
    Islam, Mohammad Saiful
    Kantarcioglu, Murat
    2012 IEEE 28TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE), 2012, : 1156 - 1167
  • [40] Efficient wildcard search over encrypted data
    Hu, Changhui
    Han, Lidong
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 15 (05) : 539 - 547