SECRECY: Secure collaborative analytics in untrusted clouds

被引:0
|
作者
Liagouris, John [1 ]
Kalavri, Vasiliki [1 ]
Faisal, Muhammad [1 ]
Varia, Mayank [1 ]
机构
[1] Boston Univ, Boston, MA 02215 USA
基金
美国国家科学基金会;
关键词
MULTIPARTY COMPUTATION; EQUALITY; ATTACKS; SYSTEM;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present SECRECY, a system for privacy-preserving collaborative analytics as a service. SECRECY allows multiple data holders to contribute their data towards a joint analysis in the cloud, while keeping the data siloed even from the cloud providers. At the same time, it enables cloud providers to offer their services to clients who would have otherwise refused to perform a computation altogether or insisted that it be done on private infrastructure. SECRECY ensures no information leakage and provides provable security guarantees by employing cryptographically secure Multi-Party Computation (MPC). In SECRECY we take a novel approach to optimizing MPC execution by co-designing multiple layers of the system stack and exposing the MPC costs to the query engine. To achieve practical performance, SECRECY applies physical optimizations that amortize the inherent MPC overheads along with logical optimizations that dramatically reduce the computation, communication, and space requirements during query execution. Our multi-cloud experiments demonstrate that SECRECY improves query performance by over 1000x compared to existing approaches and computes complex analytics on millions of data records with modest use of resources.
引用
收藏
页码:1031 / 1056
页数:26
相关论文
共 50 条
  • [31] Ergodic Secrecy Capacity of Cooperative NOMA System with Untrusted User
    Saif Ahmad
    Mohd Javed Khan
    Wireless Personal Communications, 2023, 133 : 181 - 198
  • [32] Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay
    He, Xiang
    Yener, Aylin
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2013, 59 (01) : 177 - 192
  • [33] Distributed Matching Algorithms: Maximizing Secrecy in the Presence of Untrusted Relay
    Ali, Bakhtiar
    Zamir, Nida
    Ng, Soon Xin
    Butt, Muhammad Fasih Uddin
    RADIOENGINEERING, 2017, 26 (02) : 601 - 610
  • [34] Secure Set Intersection with Untrusted Hardware Tokens
    Fischlin, Marc
    Pinkas, Benny
    Sadeghi, Ahmad-Reza
    Schneider, Thomas
    Visconti, Ivan
    TOPICS IN CRYPTOLOGY - CT-RSA 2011, 2011, 6558 : 1 - +
  • [35] Using a Network of Untrusted Computers for Secure Computing
    Maly, Michal
    PROCEEDINGS OF THE SEVENTH INTERNATIONAL CONFERENCE ON AUTONOMIC AND AUTONOMOUS SYSTEMS (ICAS 2011), 2011, : 57 - 61
  • [36] Cooperative Secure Transmission in the Presence of Untrusted Relay
    Chen, Dechuan
    Yang, Weiwei
    Hu, Jianwei
    Cai, Yueming
    Zhu, Sen
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2016,
  • [37] On secure framework for web services in untrusted environment
    Encheva, S
    Tumin, S
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2005: OTM 2005 WORKSHOPS, PROCEEDINGS, 2005, 3762 : 79 - 88
  • [38] InkTag: Secure Applications on an Untrusted Operating System
    Hofmann, Owen S.
    Kim, Sangman
    Dunn, Alan M.
    Lee, Michael Z.
    Witchel, Emmett
    ACM SIGPLAN NOTICES, 2013, 48 (04) : 265 - 278
  • [39] A secure jailing system for confining untrusted applications
    van 't Noordende, Guido
    Balogh, Adam
    Hofman, Rutger
    Brazier, Frances M. T.
    Tanenbaum, Andrew S.
    SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 414 - +
  • [40] IRS ASSISTED SECURE NOMA FOR UNTRUSTED USERS
    Khatoon, Kaneez
    Mishra, Deepak
    Saini, Ravikant
    2024 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING WORKSHOPS, ICASSPW 2024, 2024, : 356 - 360