SECRECY: Secure collaborative analytics in untrusted clouds

被引:0
|
作者
Liagouris, John [1 ]
Kalavri, Vasiliki [1 ]
Faisal, Muhammad [1 ]
Varia, Mayank [1 ]
机构
[1] Boston Univ, Boston, MA 02215 USA
基金
美国国家科学基金会;
关键词
MULTIPARTY COMPUTATION; EQUALITY; ATTACKS; SYSTEM;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present SECRECY, a system for privacy-preserving collaborative analytics as a service. SECRECY allows multiple data holders to contribute their data towards a joint analysis in the cloud, while keeping the data siloed even from the cloud providers. At the same time, it enables cloud providers to offer their services to clients who would have otherwise refused to perform a computation altogether or insisted that it be done on private infrastructure. SECRECY ensures no information leakage and provides provable security guarantees by employing cryptographically secure Multi-Party Computation (MPC). In SECRECY we take a novel approach to optimizing MPC execution by co-designing multiple layers of the system stack and exposing the MPC costs to the query engine. To achieve practical performance, SECRECY applies physical optimizations that amortize the inherent MPC overheads along with logical optimizations that dramatically reduce the computation, communication, and space requirements during query execution. Our multi-cloud experiments demonstrate that SECRECY improves query performance by over 1000x compared to existing approaches and computes complex analytics on millions of data records with modest use of resources.
引用
收藏
页码:1031 / 1056
页数:26
相关论文
共 50 条
  • [41] Providing secure environments for untrusted network applications
    Zhong, Q
    SIXTH IEEE WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 1997, : 277 - 283
  • [42] Cryptographic support for secure logs on untrusted machines
    Schneier, B
    Kelsey, J
    PROCEEDINGS OF THE SEVENTH USENIX SECURITY SYMPOSIUM, 1998, : 53 - 62
  • [43] Providing secure environments for untrusted network applications
    Hewlett Packard Lab, Bristol, United Kingdom
    Journal of Engineering and Applied Science, 1997, : 277 - 283
  • [44] Secure Web Service Composition with Untrusted Broker
    Carminati, Barbara
    Ferrari, Elena
    Ngoc Hong Tran
    2014 IEEE 21ST INTERNATIONAL CONFERENCE ON WEB SERVICES (ICWS 2014), 2014, : 137 - 144
  • [45] A secure virtual execution environment for untrusted code
    Wen, Yan
    Wang, Huaimin
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2007, 2007, 4817 : 156 - 167
  • [46] Secure and Distributed IoT Data Storage in Clouds Based on Secret Sharing and Collaborative Blockchain
    Wang, Na
    Fu, Junsong
    Zhang, Shancheng
    Zhang, Zheng
    Qiao, Jiawen
    Liu, Jianwei
    Bhargava, Bharat K.
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2023, 31 (04) : 1550 - 1565
  • [47] Anonymous and Confidential File Sharing over Untrusted Clouds
    Contiu, Stefan
    Vaucher, Sebastien
    Pires, Rafael
    Pasin, Marcelo
    Felber, Pascal
    Reveillere, Laurent
    2019 IEEE 38TH INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS 2019), 2019, : 21 - 31
  • [48] Secrecy Analysis of Multiuser Untrusted Amplify-and-Forward Relay Networks
    Deng, Dan
    Li, Xutao
    Fan, Lisheng
    Zhou, Wen
    Hu, Rose Qingyang
    Zhou, Zhili
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2017,
  • [49] d'Artagnan: A Trusted NoSQL Database on Untrusted Clouds
    Pontes, Rogerio
    Maia, Francisco
    Vilaca, Ricardo
    Machado, Nuno
    2019 IEEE 38TH INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS 2019), 2019, : 61 - 70
  • [50] Secrecy Performance of Untrusted Relay’s Cooperation under Fading Channels
    付晓梅
    张立
    王大维
    侯永宏
    Transactions of Tianjin University, 2011, (06) : 440 - 445