Secure data retrieval on the cloud homomorphic encryption meets coresets

被引:0
|
作者
Akavia A. [1 ]
Feldman D. [1 ]
Shaul H. [1 ]
机构
[1] University of Haifa, Israel
关键词
Coresets; Fully Homomorphic Encryption; Group Testing; Secure Computation; Secure Outsourc-ing of Computation; Secure Search; Sketches;
D O I
10.13154/tches.v2019.i2.80-106
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Secure report is the problem of a client that retrieves all records matching specified attributes from a database table at the server (e.g. cloud), as in SQL SELECT queries, but where the query and the database are encrypted. Here, only the client has the secret key, but still the server is expected to compute and return the encrypted result. Secure report is theoretically possible with Fully Homomorphic Encryption (FHE). However, the current state-of-the-art solutions are realized by a polynomial of degree that is at least linear in the number m of records, which is too slow in practice even for very small databases. We present the first solution that is realized by a polynomial that attains degree independent of the number of records m, as well as the first implementation of an FHE solution to Secure report. This is by suggesting a novel paradigm that forges a link between cryptography and modern data summarization techniques known as coresets (core-sets), and sketches in particular. The key idea is to compute only a coreset of the desired report. Since the coreset is small, the client can quickly decode the desired report that the server computes after decrypting the coreset. We implemented our main reporting system in an open source library. This is the first implemented system that can answer such database queries when processing only FHE encrypted data and queries. As our analysis promises, the experimental results show that we can run Secure report queries on billions records in minutes on an Amazon EC2 server, compared to less than a hundred-thousands in previous FHE based solutions. © 2019, Ruhr-University of Bochum. All rights reserved.
引用
收藏
页码:80 / 106
页数:26
相关论文
共 50 条
  • [21] Secure Data in Cloud Computing Using Fully Homomorphic Encryption and Public Key Infrastructure
    Zibouh, Ouadia
    Dalli, Anouar
    Drissi, Hilal
    VISION 2025: EDUCATION EXCELLENCE AND MANAGEMENT OF INNOVATIONS THROUGH SUSTAINABLE ECONOMIC COMPETITIVE ADVANTAGE, 2019, : 5950 - 5958
  • [22] Secure Cloud Data Encryption
    Shiraishi, Momoko
    2023 2ND ASIA-PACIFIC COMPUTER TECHNOLOGIES CONFERENCE, APCT, 2023, : 34 - 37
  • [23] Practical homomorphic encryption over the integers for secure computation in the cloud
    Dyer, James
    Dyer, Martin
    Xu, Jie
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2019, 18 (05) : 549 - 579
  • [24] Secure Computation over Cloud using Fully Homomorphic Encryption
    Bilakanti, Anusha
    Anjana, N. B.
    Divya, A.
    Divya, K.
    Chakraborty, Nilotpal
    Patra, G. K.
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2016, : 633 - 636
  • [25] Secure Voting in the Cloud using Homomorphic Encryption and Mobile Agents
    Will, Mark A.
    Nicholson, Brandon
    Tiehuis, Marc
    Ko, Ryan K. L.
    2015 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING RESEARCH AND INNOVATION (ICCCRI), 2015, : 173 - 184
  • [26] Practical homomorphic encryption over the integers for secure computation in the cloud
    James Dyer
    Martin Dyer
    Jie Xu
    International Journal of Information Security, 2019, 18 : 549 - 579
  • [27] SeCPlat: A Secure Computation Platform Based on Homomorphic Encryption in Cloud
    Zhao, Fanyou
    Teng, Yiping
    Yang, Zheng
    Xie, Yuyang
    Liu, Jiayv
    Qi, Jiawei
    WEB AND BIG DATA, PT IV, APWEB-WAIM 2023, 2024, 14334 : 513 - 518
  • [28] Homomorphic Encryption for Data Security in Cloud Computing
    Chauhan, Kamal Kumar
    Sanger, Amit K. S.
    Verma, Ajai
    2015 14TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY (ICIT 2015), 2015, : 206 - 209
  • [29] Enhanced Homomorphic Encryption Scheme with PSO for Encryption of Cloud Data
    Khan, Saif Ali
    Aggarwal, R. K.
    Kulkarni, Shashidhar
    2019 5TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS (ICACCS), 2019, : 395 - 400
  • [30] Policy Based on Homomorphic Encryption and Retrieval Scheme in Cloud Computing
    Ding, Yong
    Li, Xiumin
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 568 - 571