Real-time Private Membership Test using Homomorphic Encryption

被引:3
|
作者
Chielle, Eduardo [1 ]
Gamil, Homer [1 ]
Maniatakos, Michail [1 ]
机构
[1] New York Univ Abu Dhabi, Ctr Cyber Secur, Abu Dhabi, U Arab Emirates
关键词
D O I
10.23919/DATE51398.2021.9473968
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the ever increasing volume of private data residing on the cloud, privacy is becoming a major concern. Often times, sensitive information is leaked during a querying process between a client and an online server hosting a database; The query may leak information about the element the client is looking up, while sensitive details about the contents of its database can leak on the server side. The ability to check if an element is included in a database while maintaining both the client's and the server's privacy is known as the Private Membership Test. In this context, we propose a method to privately query a database with computational complexity O(1) using Bloom filters and Homomorphic Encryption. The proposed methodology also enables post-encryption insertions and deletions without requiring a new setup. Experimental results show that our proposed solution has practical setup, insertion and deletion times for databases of up to a few million entries, with constant query time less than 0.3s, considering a false positive rate lower than 10(-3). We instantiate our methodology for a URL denylisting service, and demonstrate that it can provide solid security guarantees without affecting the user experience.
引用
收藏
页码:1282 / 1287
页数:6
相关论文
共 50 条
  • [1] A Fully Homomorphic Encryption Scheme for Real-Time Safe Control
    Stobbe, Pieter
    Keijzer, Twan
    Ferrari, Riccardo M. G.
    [J]. 2022 IEEE 61ST CONFERENCE ON DECISION AND CONTROL (CDC), 2022, : 2911 - 2916
  • [2] Toward a Secure Drone System: Flying With Real-Time Homomorphic Authenticated Encryption
    Cheon, Jung Hee
    Han, Kyoohyung
    Hong, Seong-Min
    Kim, Hyoun Jin
    Kim, Junsoo
    Kim, Suseong
    Seo, Hosung
    Shim, Hyungbo
    Song, Yongsoo
    [J]. IEEE ACCESS, 2018, 6 : 24325 - 24339
  • [3] Outsourced Private Set Intersection Using Homomorphic Encryption
    Kerschbaum, Florian
    [J]. 7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012), 2012,
  • [4] Private routing and ride-sharing using homomorphic encryption
    Farokhi, Farhad
    Shames, Iman
    Johansson, Karl H.
    [J]. IET CYBER-PHYSICAL SYSTEMS: THEORY & APPLICATIONS, 2020, 5 (04) : 311 - 320
  • [5] Private Compound Wildcard Queries Using Fully Homomorphic Encryption
    Kim, Myungsun
    Lee, Hyung Tae
    Ling, San
    Tan, Benjamin Hong Meng
    Wang, Huaxiong
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (05) : 743 - 756
  • [6] Secure and private control using semi-homomorphic encryption
    Farokhi, Farhad
    Shames, Iman
    Batterham, Nathan
    [J]. CONTROL ENGINEERING PRACTICE, 2017, 67 : 13 - 20
  • [7] A data aggregation and real-time electricity billing scheme based on homomorphic encryption in smart grid
    Zhao, Yingzhuo
    Yang, Qingyu
    Li, Donghe
    An, Dou
    [J]. PROCEEDINGS OF THE 33RD CHINESE CONTROL AND DECISION CONFERENCE (CCDC 2021), 2021, : 2545 - 2550
  • [8] Past Private License Plate Matching Using Symmetric Homomorphic Encryption
    Vaishnav, Harshul
    Mathuria, Anish
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON ADVANCED NETWORKS AND TELECOMMUNICATIONS SYSTEMS (ANTS), 2018,
  • [9] Private genome analysis through homomorphic encryption
    Miran Kim
    Kristin Lauter
    [J]. BMC Medical Informatics and Decision Making, 15
  • [10] Multi-value Private Information Retrieval using Homomorphic Encryption
    Hsu, Hsiang-Chen
    Liu, Zi-Yuan
    Tso, Raylin
    Chen, Kung
    [J]. 2020 15TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS 2020), 2020, : 82 - 88