SECRECY: Secure collaborative analytics in untrusted clouds

被引:0
|
作者
Liagouris, John [1 ]
Kalavri, Vasiliki [1 ]
Faisal, Muhammad [1 ]
Varia, Mayank [1 ]
机构
[1] Boston Univ, Boston, MA 02215 USA
基金
美国国家科学基金会;
关键词
MULTIPARTY COMPUTATION; EQUALITY; ATTACKS; SYSTEM;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present SECRECY, a system for privacy-preserving collaborative analytics as a service. SECRECY allows multiple data holders to contribute their data towards a joint analysis in the cloud, while keeping the data siloed even from the cloud providers. At the same time, it enables cloud providers to offer their services to clients who would have otherwise refused to perform a computation altogether or insisted that it be done on private infrastructure. SECRECY ensures no information leakage and provides provable security guarantees by employing cryptographically secure Multi-Party Computation (MPC). In SECRECY we take a novel approach to optimizing MPC execution by co-designing multiple layers of the system stack and exposing the MPC costs to the query engine. To achieve practical performance, SECRECY applies physical optimizations that amortize the inherent MPC overheads along with logical optimizations that dramatically reduce the computation, communication, and space requirements during query execution. Our multi-cloud experiments demonstrate that SECRECY improves query performance by over 1000x compared to existing approaches and computes complex analytics on millions of data records with modest use of resources.
引用
收藏
页码:1031 / 1056
页数:26
相关论文
共 50 条
  • [21] Secure isolation of untrusted legacy applications
    Potter, Shaya
    Nieh, Jason
    Selsky, Matt
    USENIX ASSOCIATION PROCEEDING OF THE 21ST LARGE INSTALLATION SYSTEMS ADMINISTRATION CONFERENCE, 2007, : 117 - 130
  • [22] Secure execution of computations in untrusted hosts
    Narayanan, S. H. K.
    Kandemir, M. T.
    Brooks, R. R.
    Kolcu, I.
    RELIABLE SOFTWARE TECHNOLOGIES - ADA - EUROPE 2006, PROCEEDINGS, 2006, 4006 : 106 - 118
  • [23] Secure service publishing with untrusted registries
    Trabelsi, Slim
    Roudier, Yves
    SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 175 - 179
  • [24] Secure Online Banking on Untrusted Computers
    Peng, Yanlin
    Chen, Wenji
    Chang, J. Morris
    Guan, Youg
    PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 720 - 722
  • [25] Autonomous Aggregate Data Analytics in Untrusted Cloud
    Mani, Ganapathy
    Ulybyshev, Denis
    Bhargava, Bharat
    Kobes, Jason
    Goyal, Puneet
    2018 IEEE FIRST INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND KNOWLEDGE ENGINEERING (AIKE), 2018, : 138 - 141
  • [26] REVIEW OF CLOUDS OF SECRECY - RESPONSE
    COLE, LA
    POLITICS AND THE LIFE SCIENCES, 1989, 8 (01) : 74 - 76
  • [27] An Approach for Securing Critical Applications in Untrusted Clouds
    Coppolino, Luigi
    D'Antonio, Salvatore
    Mazzeo, Giovanni
    Papale, Gaetano
    Sgaglione, Luigi
    Campanile, Ferdinando
    2018 26TH EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED, AND NETWORK-BASED PROCESSING (PDP 2018), 2018, : 436 - 440
  • [28] Blockchain-Based Incentives for Secure and Collaborative Data Sharing in Multiple Clouds
    Shen, Meng
    Duan, Junxian
    Zhu, Liehuang
    Zhang, Jie
    Du, Xiaojiang
    Guizani, Mohsen
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2020, 38 (06) : 1229 - 1241
  • [29] Decoding Orders and Power Allocation for Untrusted NOMA: A Secrecy Perspective
    Thapar, Sapna
    Mishra, Deepak
    Saini, Ravikant
    2020 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2020,
  • [30] Ergodic Secrecy Capacity of Cooperative NOMA System with Untrusted User
    Ahmad, Saif
    Khan, Mohd Javed
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 133 (01) : 181 - 198