Homomorphic Encryption atWork for Private Analysis of Security Logs

被引:3
|
作者
Boudguiga, Aymen [1 ]
Stan, Oana [1 ]
Sedjelmaci, Hichem [2 ]
Carpov, Sergiu [1 ]
机构
[1] CEA LIST, F-91191 Gif Sur Yvette, France
[2] Orange Labs, F-92320 Chatillon, France
关键词
Privacy; Log Management; SIEM; Homomorphic Encryption;
D O I
10.5220/0008969205150523
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
One important component of incident handling in cyber-security is log management. In practice, different software and/or hardware components of a system such as Intrusion Detection Systems (IDS) or firewalls analyze network traffic and log suspicious events or activities. These logs are timestamped, gathered by a log collector and centralized within a log analyzer. Security Incidents and Events Management (SIEM) system is an example of a such log analysis tool. SIEM can be a dedicated network device or a Cloud service offered by a security services provider. Providing SIEM as a cloud service raises privacy issues as logs contain confidential information that must not be disclosed to third parties. In this work, we investigate the possible use of homomorphic encryption to provide a privacy preserving log management architecture. We explain how SIEM can be adapted to treat encrypted logs. In addition, we evaluate the homomorphic classification of IDS alerts from NSL-KDD set with an SVM linear model.
引用
下载
收藏
页码:515 / 523
页数:9
相关论文
共 50 条
  • [31] Comprehensively enhancing the security of control with combined homomorphic encryption
    Sui, Tongtong
    Wang, Jizhi
    Liu, Wen
    Wang, Lizhen
    Kong, Lingrui
    Zhao, Yue
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 85
  • [32] Symmetric quantum fully homomorphic encryption with perfect security
    Min Liang
    Quantum Information Processing, 2013, 12 : 3675 - 3687
  • [33] On the Security of Homomorphic Encryption Schemes with Restricted Decryption Oracles
    Ma, Guangsheng
    Li, Hongbo
    JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2024, 37 (05) : 2240 - 2261
  • [34] Enhancement in Homomorphic Encryption Scheme for Cloud Data Security
    Kaur, Samjot
    Wasson, Vikas
    2015 9TH INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES AND TECHNOLOGIES (NGMAST 2015), 2015, : 54 - 59
  • [35] A lightweight fully homomorphic encryption scheme for cloud security
    Biksham, V.
    Vasumathi, D.
    International Journal of Information and Computer Security, 2020, 13 (3-4) : 357 - 371
  • [36] Private Compound Wildcard Queries Using Fully Homomorphic Encryption
    Kim, Myungsun
    Lee, Hyung Tae
    Ling, San
    Tan, Benjamin Hong Meng
    Wang, Huaxiong
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (05) : 743 - 756
  • [37] Private routing and ride-sharing using homomorphic encryption
    Farokhi, Farhad
    Shames, Iman
    Johansson, Karl H.
    IET CYBER-PHYSICAL SYSTEMS: THEORY & APPLICATIONS, 2020, 5 (04) : 311 - 320
  • [38] Towards practical private information retrieval from homomorphic encryption
    Zhuravlev, Dmitry
    ALGEBRA & DISCRETE MATHEMATICS, 2015, 19 (02): : 302 - 312
  • [39] Construction of Differentially Private Summaries Over Fully Homomorphic Encryption
    Ushiyama, Shojiro
    Takahashi, Tsubasa
    Kudo, Masashi
    Yamana, Hayato
    DATABASE AND EXPERT SYSTEMS APPLICATIONS, DEXA 2021, PT II, 2021, 12924 : 9 - 21
  • [40] Outsourced Private Set Intersection Cardinality with Fully Homomorphic Encryption
    Tajima, Arisa
    Sato, Hiroki
    Yamana, Hayato
    PROCEEDINGS OF 2018 6TH INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2018, : 292 - 299