Privacy Computing with Right to Be Forgotten in Trusted Execution Environment

被引:0
|
作者
Liu, Hui [1 ]
Luo, Hongzhi [1 ]
Li, Shaofeng [2 ]
Dong, Tian [1 ]
Chen, Guoxing [1 ]
Meng, Yan [1 ]
Zhu, Haojin [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai, Peoples R China
[2] Peng Cheng Lab, Dept Math & Theories, Shenzhen, Peoples R China
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Data Sharing; Differential Privacy; Trusted Execution Environment; Data Access and Usage Control;
D O I
10.1109/GLOBECOM54140.2023.10437471
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Sharing private data is at risk of potential data breaches, including the violation of the "right to be forgotten" principle, undermining people's willingness to share their data. A common solution is to involve the Trusted Execution Environment (TEE), which allows the data provider to verify the computation process without trusting others. However, previous works have either encountered incomplete computations or lacked scalability. In this paper, we propose TEERASE, a secure data-sharing framework that addresses these issues. TEERASE protects every phase of the data lifecycle and enables individuals to share personal data with a predefined privacy budget. In particular, TEERASE applies comprehensive privacy budgeting mechanisms to efficiently manage privacy budgets and employs an asynchronized execution approach that decouples budget consumption from data computation. TEERASE records the predefined privacy budgets, verifies privacy consumption requests, updates the remaining budgets, and deletes data that have exhausted their budgets by preventing any attempts to access them. We implement a prototype of TEERASE and evaluate its effectiveness with a realistic case study on Genome-Wide Association Study.
引用
收藏
页码:2566 / 2571
页数:6
相关论文
共 50 条
  • [1] IceClave: A Trusted Execution Environment for In-Storage Computing
    Kang, Luyi
    Xue, Yuqi
    Jia, Weiwei
    Wang, Xiaohao
    Kim, Jongryool
    Youn, Changhwan
    Kang, Myeong Joon
    Lim, Hyung Jin
    Jacob, Bruce
    Huang, Jian
    [J]. PROCEEDINGS OF 54TH ANNUAL IEEE/ACM INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE, MICRO 2021, 2021, : 199 - 211
  • [2] Privacy-preserving genotype imputation in a trusted execution environment
    Dokmai, Natnatee
    Kockan, Can
    Zhu, Kaiyuan
    Wang, XiaoFeng
    Sahinalp, S. Cenk
    Cho, Hyunghoon
    [J]. CELL SYSTEMS, 2021, 12 (10) : 983 - +
  • [3] Task Offloading in Trusted Execution Environment empowered Edge Computing
    Li, Yuepeng
    Zeng, Deze
    Gu, Lin
    Zhu, Andong
    Chen, Quan
    [J]. 2020 IEEE 26TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2020, : 316 - 323
  • [4] Privacy and trusted computing
    Reid, J
    Nieto, JMG
    Dawson, E
    Okamoto, E
    [J]. 14TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2003, : 383 - 388
  • [5] A Privacy-Preserving Scheme for Smart Grid Using Trusted Execution Environment
    Akguen, Mete
    Soykan, Elif Ustundag
    Soykan, Gurkan
    [J]. IEEE ACCESS, 2023, 11 : 9182 - 9196
  • [6] Privacy-preserving Payment Channel Networks using Trusted Execution Environment
    Li, Peng
    Luo, Xiaofei
    Miyazaki, Toshiaki
    Guo, Song
    [J]. ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
  • [7] Awesome Trusted Execution Environment
    Coppolino, Luigi
    Mazzeo, Giovanni
    Romano, Luigi
    [J]. 2023 53RD ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS - SUPPLEMENTAL VOLUME, DSN-S, 2023, : 5 - 6
  • [8] VeriBlock: A novel blockchain framework based on verifiable computing and trusted execution environment
    Maddali, Lakshmi Padmaja
    Thakur, Meena Singh Dilip
    Vigneswaran, R.
    Rajan, M. A.
    Kanchanapalli, Srujana
    Das, Batsayan
    [J]. 2020 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS), 2020,
  • [9] A Privacy-Preserving Mobile Crowdsensing Scheme Based on Blockchain and Trusted Execution Environment
    Peng, Tao
    Guan, Kejian
    Liu, Jierong
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2022, E105D (02) : 215 - 226
  • [10] Trusted code remote execution through trusted computing and virtualization
    Zhang, Liqiang
    Chen, Lu
    Zhang, Huanguo
    Yan, Fei
    [J]. SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 1, PROCEEDINGS, 2007, : 39 - +