Homomorphic encryption approach for exploration of sensitive information retrieval

被引:1
|
作者
Rauthan, J. S. [1 ]
Vaisla, K. S. [1 ]
机构
[1] Uttarakhand Tech Univ, Comp Sci & Engn Dept, Dehra Dun, Uttarakhand, India
关键词
Cloud database; homomorphic encryption; privacy; sensitive information retrieval; information security;
D O I
10.3233/JIFS-179730
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper presents the core algorithms behind DB-Query-Encryption, a proposal that supports private information retrieval (PIR) explorations. DB-Query-Encryption permits users for selectively retrieve information from a cloud database whereas keeping sensitive data terms secretive. As an example use case, a medical research institute may, as part of a sensitive data exploration, requisite to look up facts about an individual person from a cloud database deprived of reveling the person's identity. The basic idea behind DB-Query-Encryption is to uses homomorphic encryption, which allows the cloud server to fulfill this request, whereas making it infeasible for the database owner (or a hacker who might compromised) to conclude the name being explored for, either which records are retrieved. The query, which retrieved the information, still secretive even if the spectator be able to search all the data over the cloud server and all the actions as they are being executed. Within that period, the query response produced by the cloud server is considerable smaller than the whole cloud database, making it more convenient when it is not feasible or appropriate for the user to transfer the entire database.
引用
收藏
页码:6495 / 6505
页数:11
相关论文
共 50 条
  • [41] Parallel Homomorphic Encryption
    Kamara, Seny
    Raykova, Mariana
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY: FC 2013 WORKSHOPS, 2013, 7862 : 213 - 225
  • [42] Design Space Exploration for a Co-Designed Accelerator Supporting Homomorphic Encryption
    Abozaid, Ghada
    El-Mahdy, Ahmed
    2015 20TH INTERNATIONAL CONFERENCE ON CONTROL SYSTEMS AND COMPUTER SCIENCE, 2015, : 431 - 438
  • [43] A Method of Homomorphic Encryption
    XIANG Guang-li~ 1
    2. School of Computer
    3. School of Information
    Wuhan University Journal of Natural Sciences, 2006, (01) : 181 - 184
  • [44] Homomorphic image encryption
    Elashry, Ibrahim F.
    Allah, Osama S. Farag
    Abbas, Alaa M.
    El-Rabaie, S.
    Abd El-Samie, Fathi E.
    JOURNAL OF ELECTRONIC IMAGING, 2009, 18 (03)
  • [45] Homomorphic Encryption on GPU
    Ozcan, Ali Sah
    Ayduman, Can
    Turkoglu, Enes Recep
    Savas, Erkay
    IEEE ACCESS, 2023, 11 : 84168 - 84186
  • [46] Combinatorially Homomorphic Encryption
    Ishai, Yuval
    Kushnir, Eyal
    Rothblum, Ron D.
    THEORY OF CRYPTOGRAPHY, TCC 2023, PT II, 2023, 14370 : 251 - 278
  • [47] General Bootstrapping Approach for RLWE-Based Homomorphic Encryption
    Kim, Andrey
    Deryabin, Maxim
    Eom, Jieun
    Choi, Rakyong
    Lee, Yongwoo
    Ghang, Whan
    Yoo, Donghoon
    IEEE TRANSACTIONS ON COMPUTERS, 2024, 73 (01) : 86 - 96
  • [48] Noiseless homomorphic encryption for complex numbers and fully homomorphic encryption with modular arithmetic
    Chun, Jonghee
    Han, Hee
    Kang, Stefano V.
    Wang, Hyo Keun
    JOURNAL OF ALGEBRA AND ITS APPLICATIONS, 2024,
  • [49] A safe distribution scheme of sensitive data based on full homomorphic encryption model
    Fang, Tianke
    Deng, Han
    Liu, Bin
    Yang, Lan
    Xie, Xiangyi
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2022, 15 (01) : 19 - 26
  • [50] Secure speech retrieval method using deep hashing and CKKS fully homomorphic encryption
    Zhang, Qiu-yu
    Wen, Yong-wang
    Huang, Yi-bo
    Li, Fang-peng
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (26) : 67469 - 67500