SECRECY: Secure collaborative analytics in untrusted clouds

被引:0
|
作者
Liagouris, John [1 ]
Kalavri, Vasiliki [1 ]
Faisal, Muhammad [1 ]
Varia, Mayank [1 ]
机构
[1] Boston Univ, Boston, MA 02215 USA
基金
美国国家科学基金会;
关键词
MULTIPARTY COMPUTATION; EQUALITY; ATTACKS; SYSTEM;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present SECRECY, a system for privacy-preserving collaborative analytics as a service. SECRECY allows multiple data holders to contribute their data towards a joint analysis in the cloud, while keeping the data siloed even from the cloud providers. At the same time, it enables cloud providers to offer their services to clients who would have otherwise refused to perform a computation altogether or insisted that it be done on private infrastructure. SECRECY ensures no information leakage and provides provable security guarantees by employing cryptographically secure Multi-Party Computation (MPC). In SECRECY we take a novel approach to optimizing MPC execution by co-designing multiple layers of the system stack and exposing the MPC costs to the query engine. To achieve practical performance, SECRECY applies physical optimizations that amortize the inherent MPC overheads along with logical optimizations that dramatically reduce the computation, communication, and space requirements during query execution. Our multi-cloud experiments demonstrate that SECRECY improves query performance by over 1000x compared to existing approaches and computes complex analytics on millions of data records with modest use of resources.
引用
收藏
页码:1031 / 1056
页数:26
相关论文
共 50 条
  • [11] Cooperation With an Untrusted Relay: A Secrecy Perspective
    He, Xiang
    Yener, Aylin
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2010, 57 (08) : 3807 - 3827
  • [12] Senate: A Maliciously-Secure MPC Platform for Collaborative Analytics
    Poddar, Rishabh
    Kalra, Sukrit
    Yanai, Avishay
    Deng, Ryan
    Popa, Raluca Ada
    Hellerstein, Joseph M.
    PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, 2021, : 2129 - 2146
  • [13] Secure and sustainable benchmarking in clouds: A multi-party cloud application with an untrusted service provider
    Kerschbaum F.
    Business & Information Systems Engineering, 2011, 3 (3) : 135 - 143
  • [14] Homomorphic Encryption and Collaborative Machine Learning for Secure Healthcare Analytics
    Gandhi, Bhomik M.
    Vaghadia, Shruti B.
    Kumhar, Malaram
    Gupta, Rajesh
    Jadav, Nilesh Kumar
    Bhatia, Jitendra
    Tanwar, Sudeep
    Alabdulatif, Abdulatif
    SECURITY AND PRIVACY, 2025, 8 (01):
  • [15] Collaborative and secure sharing of healthcare data in multi-clouds
    Fabian, Benjamin
    Ermakova, Tatiana
    Junghanns, Philipp
    INFORMATION SYSTEMS, 2015, 48 : 132 - 150
  • [16] Secrecy Fairness Aware NOMA for Untrusted Users
    Thapar, Sapna
    Mishra, Deepak
    Saini, Ravikant
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [17] Secure untrusted binaries - Provably!
    Winwood, S
    Chakravarty, MMT
    FORMAL ASPECTS IN SECURITY AND TRUST, 2006, 3866 : 171 - 186
  • [18] On the Achievable Secrecy Diversity of Cooperative Networks With Untrusted Relays
    Chraiti, Mohaned
    Ghrayeb, Ali
    Assi, Chadi
    Hasna, Mazen O.
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2018, 66 (01) : 39 - 53
  • [19] Secure untrusted data repository (SUNDR)
    Li, JY
    Krohn, M
    Mazières, D
    Shasha, D
    USENIX ASSOCIATION PROCEEDINGS OF THE SIXTH SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION (OSDE '04), 2004, : 121 - 136
  • [20] On the Secrecy Performance and Power Allocation in Relaying Networks With Untrusted Relay in the Partial Secrecy Regime
    Moya Osorio, Diana Pamela
    Alves, Hirley
    Benitez Olivo, Edgar Eduardo
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 2268 - 2281