Homomorphic Encryption atWork for Private Analysis of Security Logs

被引:3
|
作者
Boudguiga, Aymen [1 ]
Stan, Oana [1 ]
Sedjelmaci, Hichem [2 ]
Carpov, Sergiu [1 ]
机构
[1] CEA LIST, F-91191 Gif Sur Yvette, France
[2] Orange Labs, F-92320 Chatillon, France
关键词
Privacy; Log Management; SIEM; Homomorphic Encryption;
D O I
10.5220/0008969205150523
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
One important component of incident handling in cyber-security is log management. In practice, different software and/or hardware components of a system such as Intrusion Detection Systems (IDS) or firewalls analyze network traffic and log suspicious events or activities. These logs are timestamped, gathered by a log collector and centralized within a log analyzer. Security Incidents and Events Management (SIEM) system is an example of a such log analysis tool. SIEM can be a dedicated network device or a Cloud service offered by a security services provider. Providing SIEM as a cloud service raises privacy issues as logs contain confidential information that must not be disclosed to third parties. In this work, we investigate the possible use of homomorphic encryption to provide a privacy preserving log management architecture. We explain how SIEM can be adapted to treat encrypted logs. In addition, we evaluate the homomorphic classification of IDS alerts from NSL-KDD set with an SVM linear model.
引用
收藏
页码:515 / 523
页数:9
相关论文
共 50 条
  • [31] Data Security in Recommendation System Using Homomorphic Encryption
    Soni, Kajol
    Panchal, Gaurang
    INFORMATION AND COMMUNICATION TECHNOLOGY FOR INTELLIGENT SYSTEMS (ICTIS 2017) - VOL 1, 2018, 83 : 308 - 313
  • [32] Comprehensively enhancing the security of control with combined homomorphic encryption
    Sui, Tongtong
    Wang, Jizhi
    Liu, Wen
    Wang, Lizhen
    Kong, Lingrui
    Zhao, Yue
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 85
  • [33] On the Security of Homomorphic Encryption Schemes with Restricted Decryption Oracles
    Ma, Guangsheng
    Li, Hongbo
    JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2024, 37 (05) : 2240 - 2261
  • [34] Symmetric quantum fully homomorphic encryption with perfect security
    Min Liang
    Quantum Information Processing, 2013, 12 : 3675 - 3687
  • [35] Enhancement in Homomorphic Encryption Scheme for Cloud Data Security
    Kaur, Samjot
    Wasson, Vikas
    2015 9TH INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES AND TECHNOLOGIES (NGMAST 2015), 2015, : 54 - 59
  • [36] A lightweight fully homomorphic encryption scheme for cloud security
    Biksham, V.
    Vasumathi, D.
    International Journal of Information and Computer Security, 2020, 13 (3-4) : 357 - 371
  • [37] Towards practical private information retrieval from homomorphic encryption
    Zhuravlev, Dmitry
    ALGEBRA & DISCRETE MATHEMATICS, 2015, 19 (02): : 302 - 312
  • [38] Private Compound Wildcard Queries Using Fully Homomorphic Encryption
    Kim, Myungsun
    Lee, Hyung Tae
    Ling, San
    Tan, Benjamin Hong Meng
    Wang, Huaxiong
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (05) : 743 - 756
  • [39] Private routing and ride-sharing using homomorphic encryption
    Farokhi, Farhad
    Shames, Iman
    Johansson, Karl H.
    IET CYBER-PHYSICAL SYSTEMS: THEORY & APPLICATIONS, 2020, 5 (04) : 311 - 320
  • [40] Construction of Differentially Private Summaries Over Fully Homomorphic Encryption
    Ushiyama, Shojiro
    Takahashi, Tsubasa
    Kudo, Masashi
    Yamana, Hayato
    DATABASE AND EXPERT SYSTEMS APPLICATIONS, DEXA 2021, PT II, 2021, 12924 : 9 - 21