Homomorphic encryption approach for exploration of sensitive information retrieval

被引:1
|
作者
Rauthan, J. S. [1 ]
Vaisla, K. S. [1 ]
机构
[1] Uttarakhand Tech Univ, Comp Sci & Engn Dept, Dehra Dun, Uttarakhand, India
关键词
Cloud database; homomorphic encryption; privacy; sensitive information retrieval; information security;
D O I
10.3233/JIFS-179730
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper presents the core algorithms behind DB-Query-Encryption, a proposal that supports private information retrieval (PIR) explorations. DB-Query-Encryption permits users for selectively retrieve information from a cloud database whereas keeping sensitive data terms secretive. As an example use case, a medical research institute may, as part of a sensitive data exploration, requisite to look up facts about an individual person from a cloud database deprived of reveling the person's identity. The basic idea behind DB-Query-Encryption is to uses homomorphic encryption, which allows the cloud server to fulfill this request, whereas making it infeasible for the database owner (or a hacker who might compromised) to conclude the name being explored for, either which records are retrieved. The query, which retrieved the information, still secretive even if the spectator be able to search all the data over the cloud server and all the actions as they are being executed. Within that period, the query response produced by the cloud server is considerable smaller than the whole cloud database, making it more convenient when it is not feasible or appropriate for the user to transfer the entire database.
引用
收藏
页码:6495 / 6505
页数:11
相关论文
共 50 条
  • [31] Distributed Image Encryption Based On a Homomorphic Cryptographic Approach
    Wade, Mamadou, I
    Chouikha, Mohamed
    Gill, Tepper
    Patterson, Wayne
    Washington, Talitha M.
    Zeng, Jianchao
    2019 IEEE 10TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2019, : 686 - 696
  • [32] Secure Information Aggregation for Smart Grids Using Homomorphic Encryption
    Li, Fengjun
    Luo, Bo
    Liu, Peng
    2010 IEEE 1ST INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS (SMARTGRIDCOMM), 2010, : 327 - 332
  • [33] A Comparative Assessment of Homomorphic Encryption Algorithms Applied to Biometric Information
    Crihan, Georgiana
    Craciun, Marian
    Dumitriu, Luminita
    INVENTIONS, 2023, 8 (04)
  • [34] Limitations on information-theoretically-secure quantum homomorphic encryption
    Yu, Li
    Perez-Delgado, Carlos A.
    Fitzsimons, Joseph F.
    PHYSICAL REVIEW A, 2014, 90 (05)
  • [35] Semantics-sensitive image retrieval: An information fusion approach
    Yoon, JH
    Jayant, NK
    2003 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOL I, PROCEEDINGS, 2003, : 761 - 764
  • [36] SECURE COMPUTATION ON SENSITIVE DATA USING HOMOMORPHIC ENCRYPTION ON ETHEREUM BLOCKCHAIN
    Serban, Razvan
    Vochescu, Alexandru
    Dosaru, Daniel
    UNIVERSITY POLITEHNICA OF BUCHAREST SCIENTIFIC BULLETIN SERIES C-ELECTRICAL ENGINEERING AND COMPUTER SCIENCE, 2024, 86 (02): : 273 - 284
  • [37] A Cryptograph Domain Image Retrieval Method Based on Paillier Homomorphic Block Encryption
    Xu, Wenjia
    Xiang, Shijun
    Sachnev, Vasily
    CMC-COMPUTERS MATERIALS & CONTINUA, 2018, 55 (02): : 285 - 295
  • [38] SECURE COMPUTATION ON SENSITIVE DATA USING HOMOMORPHIC ENCRYPTION ON ETHEREUM BLOCKCHAIN
    Şerban, Răzvan
    Vochescu, Alexandru
    Dosaru, Daniel
    UPB Scientific Bulletin, Series C: Electrical Engineering and Computer Science, 2024, 86 (02): : 273 - 284
  • [39] Homomorphic Encryption in the Cloud
    Hrestak, Darko
    Picek, Stjepan
    2014 37TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2014, : 1400 - 1404
  • [40] Subring Homomorphic Encryption
    Arita, Seiko
    Handa, Sari
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2017, 2018, 10779 : 112 - 136