Homomorphic Encryption atWork for Private Analysis of Security Logs

被引:3
|
作者
Boudguiga, Aymen [1 ]
Stan, Oana [1 ]
Sedjelmaci, Hichem [2 ]
Carpov, Sergiu [1 ]
机构
[1] CEA LIST, F-91191 Gif Sur Yvette, France
[2] Orange Labs, F-92320 Chatillon, France
关键词
Privacy; Log Management; SIEM; Homomorphic Encryption;
D O I
10.5220/0008969205150523
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
One important component of incident handling in cyber-security is log management. In practice, different software and/or hardware components of a system such as Intrusion Detection Systems (IDS) or firewalls analyze network traffic and log suspicious events or activities. These logs are timestamped, gathered by a log collector and centralized within a log analyzer. Security Incidents and Events Management (SIEM) system is an example of a such log analysis tool. SIEM can be a dedicated network device or a Cloud service offered by a security services provider. Providing SIEM as a cloud service raises privacy issues as logs contain confidential information that must not be disclosed to third parties. In this work, we investigate the possible use of homomorphic encryption to provide a privacy preserving log management architecture. We explain how SIEM can be adapted to treat encrypted logs. In addition, we evaluate the homomorphic classification of IDS alerts from NSL-KDD set with an SVM linear model.
引用
下载
收藏
页码:515 / 523
页数:9
相关论文
共 50 条
  • [1] Private genome analysis through homomorphic encryption
    Miran Kim
    Kristin Lauter
    BMC Medical Informatics and Decision Making, 15
  • [2] Private genome analysis through homomorphic encryption
    Kim, Miran
    Lauter, Kristin
    BMC MEDICAL INFORMATICS AND DECISION MAKING, 2015, 15
  • [3] Homomorphic encryption with CCA security
    Prabhakaran, Manoj
    Rosulek, Mike
    AUTOMATA, LANGUAGES AND PROGRAMMING, PT 2, PROCEEDINGS, 2008, 5126 : 667 - 678
  • [4] Limits of Provable Security for Homomorphic Encryption
    Bogdanov, Andrej
    Lee, Chin Ho
    ADVANCES IN CRYPTOLOGY - CRYPTO 2013, PT I, 2013, 8042 : 111 - 128
  • [5] Cloud Security based on the Homomorphic Encryption
    Al-Sit, Waleed T.
    Al-Zoubi, Hani
    Al-Jubouri, Qussay
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (08) : 300 - 307
  • [6] Homomorphic Encryption for Security of Cloud Data
    Potey, Manish M.
    Dhote, C. A.
    Sharma, Deepak H.
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND VIRTUALIZATION (ICCCV) 2016, 2016, 79 : 175 - 181
  • [7] Enterprise Level Security with Homomorphic Encryption
    Foltz, Kevin
    Simpson, William R.
    ICEIS: PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS - VOL 1, 2017, : 177 - 184
  • [8] On the Security of Homomorphic Encryption on Approximate Numbers
    Li, Baiyu
    Micciancio, Daniele
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2021, PT I, 2021, 12696 : 648 - 677
  • [9] Security Encryption Analysis of Economic Big Data Based on Homomorphic Encryption and Attribute Base
    Chen, Limin
    International Journal of Network Security, 2024, 26 (02) : 299 - 304
  • [10] Performance Analysis of Private Information Retrieval Scheme based on Homomorphic Encryption
    Ichibane, Yacine
    Gahi, Youssef
    Guennoun, Mouhcine
    Guennoun, Zouhair
    2015 5TH INTERNATIONAL CONFERENCE ON INFORMATION & COMMUNICATION TECHNOLOGY AND ACCESSIBILITY (ICTA), 2015,