Homomorphic Encryption atWork for Private Analysis of Security Logs

被引:3
|
作者
Boudguiga, Aymen [1 ]
Stan, Oana [1 ]
Sedjelmaci, Hichem [2 ]
Carpov, Sergiu [1 ]
机构
[1] CEA LIST, F-91191 Gif Sur Yvette, France
[2] Orange Labs, F-92320 Chatillon, France
关键词
Privacy; Log Management; SIEM; Homomorphic Encryption;
D O I
10.5220/0008969205150523
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
One important component of incident handling in cyber-security is log management. In practice, different software and/or hardware components of a system such as Intrusion Detection Systems (IDS) or firewalls analyze network traffic and log suspicious events or activities. These logs are timestamped, gathered by a log collector and centralized within a log analyzer. Security Incidents and Events Management (SIEM) system is an example of a such log analysis tool. SIEM can be a dedicated network device or a Cloud service offered by a security services provider. Providing SIEM as a cloud service raises privacy issues as logs contain confidential information that must not be disclosed to third parties. In this work, we investigate the possible use of homomorphic encryption to provide a privacy preserving log management architecture. We explain how SIEM can be adapted to treat encrypted logs. In addition, we evaluate the homomorphic classification of IDS alerts from NSL-KDD set with an SVM linear model.
引用
收藏
页码:515 / 523
页数:9
相关论文
共 50 条
  • [41] Outsourced Private Set Intersection Cardinality with Fully Homomorphic Encryption
    Tajima, Arisa
    Sato, Hiroki
    Yamana, Hayato
    PROCEEDINGS OF 2018 6TH INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2018, : 292 - 299
  • [42] Private detection of relatives in forensic genomics using homomorphic encryption
    de Souza, Fillipe D. M.
    de Lassus, Hubert
    Cammarota, Ro
    BMC MEDICAL GENOMICS, 2024, 17 (01)
  • [43] Private Machine Learning Classification Based on Fully Homomorphic Encryption
    Sun, Xiaoqiang
    Zhang, Peng
    Liu, Joseph K.
    Yu, Jianping
    Xie, Weixin
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2020, 8 (02) : 352 - 364
  • [44] Practical private-key fully homomorphic encryption in rings
    Gribov, Alexey
    Kahrobaei, Delaram
    Shpilrain, Vladimir
    GROUPS COMPLEXITY CRYPTOLOGY, 2018, 10 (01) : 17 - 27
  • [45] Private pathological assessment via machine learning and homomorphic encryption
    Al Badawi, Ahmad
    Bin Yusof, Mohd Faizal
    BIODATA MINING, 2024, 17 (01):
  • [46] Secure and private control using semi-homomorphic encryption
    Farokhi, Farhad
    Shames, Iman
    Batterham, Nathan
    CONTROL ENGINEERING PRACTICE, 2017, 67 : 13 - 20
  • [47] Security Analysis of Homomorphic Encryption Scheme for Cloud Computing: Known-Plaintext Attack
    Babenko, Mikhail
    Chervyakov, Nikolay
    Radchenko, Gleb
    Tchernykh, Andrei
    Navaux, Philippe O. A.
    Kucherov, Nikolay
    Deryabin, Maxim
    Svyatkin, Viktor
    PROCEEDINGS OF THE 2018 IEEE CONFERENCE OF RUSSIAN YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING (EICONRUS), 2018, : 270 - 274
  • [48] On Unconditional ε-Security of Private Key Encryption
    Jiang, Shaoquan
    COMPUTER JOURNAL, 2014, 57 (10): : 1570 - 1579
  • [49] On the security of fully homomorphic encryption for data privacy in Internet of Things
    Peng, Zhiniang
    Zhou, Wei
    Zhu, Xiaogang
    Wu, Youke
    Wen, Sheng
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (19):
  • [50] Improving the Security Strength of Iseki's Fully Homomorphic Encryption
    Nakadai, Naho
    Iseki, Takumi
    Hayashi, Masahiro
    35TH INTERNATIONAL TECHNICAL CONFERENCE ON CIRCUITS/SYSTEMS, COMPUTERS AND COMMUNICATIONS (ITC-CSCC 2020), 2020, : 299 - 304