Homomorphic Encryption atWork for Private Analysis of Security Logs

被引:3
|
作者
Boudguiga, Aymen [1 ]
Stan, Oana [1 ]
Sedjelmaci, Hichem [2 ]
Carpov, Sergiu [1 ]
机构
[1] CEA LIST, F-91191 Gif Sur Yvette, France
[2] Orange Labs, F-92320 Chatillon, France
关键词
Privacy; Log Management; SIEM; Homomorphic Encryption;
D O I
10.5220/0008969205150523
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
One important component of incident handling in cyber-security is log management. In practice, different software and/or hardware components of a system such as Intrusion Detection Systems (IDS) or firewalls analyze network traffic and log suspicious events or activities. These logs are timestamped, gathered by a log collector and centralized within a log analyzer. Security Incidents and Events Management (SIEM) system is an example of a such log analysis tool. SIEM can be a dedicated network device or a Cloud service offered by a security services provider. Providing SIEM as a cloud service raises privacy issues as logs contain confidential information that must not be disclosed to third parties. In this work, we investigate the possible use of homomorphic encryption to provide a privacy preserving log management architecture. We explain how SIEM can be adapted to treat encrypted logs. In addition, we evaluate the homomorphic classification of IDS alerts from NSL-KDD set with an SVM linear model.
引用
下载
收藏
页码:515 / 523
页数:9
相关论文
共 50 条
  • [21] Outsourced Private Set Intersection Using Homomorphic Encryption
    Kerschbaum, Florian
    7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012), 2012,
  • [22] PrivFT: Private and Fast Text Classification With Homomorphic Encryption
    Al Badawi, Ahmad
    Hoang, Louie
    Mun, Chan Fook
    Laine, Kim
    Aung, Khin Mi Mi
    IEEE ACCESS, 2020, 8 : 226544 - 226556
  • [23] Local differentially private federated learning with homomorphic encryption
    Jianzhe Zhao
    Chenxi Huang
    Wenji Wang
    Rulin Xie
    Rongrong Dong
    Stan Matwin
    The Journal of Supercomputing, 2023, 79 : 19365 - 19395
  • [24] Symmetric quantum fully homomorphic encryption with perfect security
    Liang, Min
    QUANTUM INFORMATION PROCESSING, 2013, 12 (12) : 3675 - 3687
  • [25] Fully Homomorphic Encryption with AES in Cloud Computing Security
    Alkady, Yasmin
    Farouk, Fifi
    Rizk, Rawya
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ADVANCED INTELLIGENT SYSTEMS AND INFORMATICS 2018, 2019, 845 : 370 - 382
  • [26] Blockchain and Homomorphic Encryption for Data Security and Statistical Privacy
    Raj, Rahul
    Peker, Yesem Kurt
    Mutlu, Zeynep Delal
    ELECTRONICS, 2024, 13 (15)
  • [27] Efficient Homomorphic Encryption with Key Rotation and Security Update
    Aono, Yoshinori
    Hayashi, Takuya
    Le Trieu Phong
    Wang, Lihua
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, E101A (01) : 39 - 50
  • [28] Survey on homomorphic encryption and its applications to cloud security
    Li, Shundong
    Dou, Jiawei
    Wang, Daoshun
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2015, 52 (06): : 1378 - 1388
  • [29] On the Security of Homomorphic Encryption Schemes with Restricted Decryption Oracles
    MA Guangsheng
    LI Hongbo
    Journal of Systems Science & Complexity, 2024, 37 (05) : 2240 - 2261
  • [30] Data Security in Recommendation System Using Homomorphic Encryption
    Soni, Kajol
    Panchal, Gaurang
    INFORMATION AND COMMUNICATION TECHNOLOGY FOR INTELLIGENT SYSTEMS (ICTIS 2017) - VOL 1, 2018, 83 : 308 - 313