Heterogeneous Graph Storage and Leakage Prevention for Data Cooperatives

被引:1
|
作者
Dockendorf, Mark [1 ]
Dantu, Ram [1 ]
机构
[1] Univ North Texas, 1155 Union Cir, Denton, TX 76203 USA
关键词
Data Cooperatives; Privacy; Federated Graph Storage; Applications of Homomorphic Encryption (HE); ENCRYPTION;
D O I
10.5220/0012091300003555
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Current big data providers offer little-to-no control over how your data is used once it is collected. Data cooperatives are an alternative to these companies and give control of personal data back to the data providers (whether they be people or organizations), allowing them to determine which of their data is used and how their data is used. Data cooperatives can serve as a more ethical alternative to other big data solutions, and have already seen success in the real world. However, supporting software must be developed to ensure the privacy of data providers beyond cooperative promises. In this paper, we expand upon our previous work applying homomorphic encryption (HE) to secure the personally identifiable information (PII) of data providers in data cooperatives that use graph storage. Data cooperatives are expected to store and query over data of varying security levels, including PII, low-security (where anonymization alone is sufficient), and public domain information. To facilitate graph storage, we introduce a multidimensional graph storage technique designed specifically for data cooperatives that mix cleartext, encrypted, and anonymized heterogeneous edges over a heterogeneous set of vertices. We demonstrate a HE query watchdog, which prevents incidental data leakage at query runtime and prior to decryption when proper rules are provided. This watchdog is complementary to existing work preventing data leakage prior to query runtime. This watchdog's operations are dominated by any reasonably-complex query.
引用
收藏
页码:192 / 205
页数:14
相关论文
共 50 条
  • [1] Collaborative Graph-based Mechanism for Distributed Big Data Leakage Prevention
    Lu, Yunlong
    Huang, Xiaohong
    Li, Dandan
    Zhang, Yan
    2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2018,
  • [2] Graph Algorithms over Homomorphic Encryption for Data Cooperatives
    Dockendorf, Mark
    Dantu, Ram
    Long, John
    SECRYPT : PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2022, : 205 - 214
  • [3] Prevention of Data Content Leakage
    Jadhav, Meghana N.
    Sanghavi, Jignyasa
    HELIX, 2018, 8 (05): : 3989 - 3992
  • [4] DLPFS: The Data Leakage Prevention FileSystem
    Braghin, Stefano
    Simioni, Marco
    Sinn, Mathieu
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2022, 2022, 13285 : 380 - 397
  • [5] A Distribution Model for Data Leakage Prevention
    Yin Fan
    Wang Lina
    Yu Rongwei
    Ma Xiaoyan
    PROCEEDINGS 2013 INTERNATIONAL CONFERENCE ON MECHATRONIC SCIENCES, ELECTRIC ENGINEERING AND COMPUTER (MEC), 2013, : 2617 - 2620
  • [6] A survey on data leakage prevention systems
    Alneyadi, Sultan
    Sithirasenan, Elankayer
    Muthukkumarasamy, Vallipuram
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 62 : 137 - 152
  • [7] ON DATA LEAKAGE PREVENTION AND MACHINE LEARNING
    Domnik, Jan
    Holland, Alexander
    35TH BLED ECONFERENCE DIGITAL RESTRUCTURING AND HUMAN (RE)ACTION, BLED ECONFERENCE 2022, 2022, : 695 - 703
  • [8] Hard Disk Storage: Data Leakage
    Sutherland, Iain
    Davies, Gareth
    PROCEEDINGS OF THE 9TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2010, : 284 - 287
  • [9] Detecting data semantic: A data leakage prevention approach
    Alneyadi, Sultan
    Sithirasenan, Elankayer
    Muthukkumarasamy, Vallipuram
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 910 - 917
  • [10] Text marking approach for data leakage prevention
    A. V. Kozachok
    S. A. Kopylov
    A. A. Shelupanov
    O. O. Evsutin
    Journal of Computer Virology and Hacking Techniques, 2019, 15 : 219 - 232