Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3344341.3368815acmconferencesArticle/Chapter ViewAbstractPublication PagesuccConference Proceedingsconference-collections
research-article

A General Framework for Privacy-preserving Computation on Cloud Environments

Published: 02 December 2019 Publication History

Abstract

While privacy and security concerns dominate public cloud services, Homomorphic Encryption (HE) is seen as an emerging solution that can potentially assure secure processing of sensitive data by third-party cloud vendors. It relies on the fact that computations can occur on encrypted data without the need for decryption, although there are major stumbling blocks to overcome before the technology is considered mature for production cloud environments. This paper examines a proposed technology platform, known as the Homomorphic Encryption Bus (HEB), that leverages HE with data obfuscation methods over a minimal network interaction model, allowing a uniform, flexible and general approach to cloud-based privacy-preserving system integration. The platform is uniquely designed to overcome barriers limiting the mainstream application of existing Fully Homomorphic Encryption (FHE) schemes in the cloud. A client-server interaction model involving ciphertext decryption on the client end is necessary to achieve resetting of 'noisy' ciphertexts in place of a much more inefficient (server only) recryption procedure. Data perturbation techniques are used to obfuscate intermediate data decrypted on the client-side of ciphertext interactions, in a way that is unintelligible to the client. In addition to efficient noise resetting, interactions involving data perturbations also achieve plaintext (binary to integer-based and vice versa) message space swapping, and conversion of accumulated integer-based encodings to a reduced embedded binary form. There appears to be little existing literature that examines these techniques as a means of broadening HE processing capabilities and practical application over the cloud. Interaction performance is examined in terms of timing and multiplicative circuit depth costs, through a simple equation evaluation and against standard recryption.

References

[1]
Dakshi Agrawal and Charu C Aggarwal. 2001. On the design and quantification of privacy preserving data mining algorithms. In Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems. ACM, ACM Press, 247--255. https://doi.org/10.1145/375551.375602
[2]
Michael Armbrust, Armando Fox, Rean Griffith, Anthony D Joseph, Randy Katz, Andy Konwinski, Gunho Lee, David Patterson, Ariel Rabkin, Ion Stoica, et almbox. 2010. A view of cloud computing. Commun. ACM, Vol. 53, 4 (apr 2010), 50--58. https://doi.org/10.1145/1721654.1721672
[3]
Louis JM Aslett, Pedro M Esperancc a, and Chris C Holmes. 2015. A review of homomorphic encryption and software tools for encrypted statistical machine learning. arXiv preprint arXiv:1508.06574 (2015).
[4]
Mauro Barni, Claudio Orlandi, and Alessandro Piva. 2006. A privacy-preserving protocol for neural-network-based computation. In Proceedings of the 8th workshop on Multimedia and security. ACM, ACM Press, 146--151. https://doi.org/10.1145/1161366.1161393
[5]
Jim Basilakis and Bahman Javadi. 2019. Efficient Parallel Binary Operations on Homomorphic Encrypted Real Numbers. IEEE Transactions on Emerging Topics in Computing (2019), 1--1. https://doi.org/10.1109/tetc.2019.2906047
[6]
Raphael Bost, Raluca Ada Popa, Stephen Tu, and Shafi Goldwasser. 2014. Machine Learning Classification over Encrypted Data. IACR Cryptology ePrint Archive, Vol. 2014 (2014), 331. https://doi.org/10.14722/ndss.2015.23241
[7]
Fanyu Bu, Yu Ma, Zhikui Chen, and Han Xu. 2015. Privacy preserving back-propagation based on BGV on cloud. In High Performance Computing and Communications (HPCC), 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), 2015 IEEE 12th International Conferen on Embedded Software and Systems (ICESS), 2015 IEEE 17th International Conference on . IEEE, IEEE, 1791--1795. https://doi.org/10.1109/hpcc-css-icess.2015.323
[8]
Keke Chen and Ling Liu. 2005. A random rotation perturbation approach to privacy preserving data classification. (2005).
[9]
Tingting Chen and Sheng Zhong. 2009. Privacy-preserving backpropagation neural network learning. IEEE Transactions on Neural Networks, Vol. 20, 10 (oct 2009), 1554--1564. https://doi.org/10.1109/tnn.2009.2026902
[10]
Ashish Choudhury, Jake Loftus, Emmanuela Orsini, Arpita Patra, and Nigel P Smart. 2013. Between a Rock and a Hard Place: Interpolating between MPC and FHE. In International Conference on the Theory and Application of Cryptology and Information Security . Springer, Springer Berlin Heidelberg, 221--240. https://doi.org/10.1007/978--3--642--42045-0_12
[11]
Richard Chow, Philippe Golle, Markus Jakobsson, Elaine Shi, Jessica Staddon, Ryusuke Masuoka, and Jesus Molina. 2009. Controlling data in the cloud: outsourcing computation without outsourcing control. In Proceedings of the 2009 ACM workshop on Cloud computing security. ACM, Association for Computing Machinery (ACM), 85--90. https://doi.org/10.1145/1655008.1655020
[12]
Craig Gentry, Shai Halevi, and Nigel P Smart. 2012. Fully homomorphic encryption with polylog overhead. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 465--482.
[13]
Shai Halevi and Victor Shoup. 2013. Design and implementation of a homomorphic-encryption library. IBM Research (Manuscript), Vol. 6 (2013), 12--15.
[14]
Shai Halevi and Victor Shoup. 2018. Faster homomorphic linear transformations in HElib. In Annual International Cryptology Conference. Springer, Springer International Publishing, 93--120. https://doi.org/10.1007/978--3--319--96884--1_4
[15]
Ehsan Hesamifard, Hassan Takabi, Mehdi Ghasemi, and Rebecca N Wright. 2018. Privacy-preserving Machine Learning as a Service. Proceedings on Privacy Enhancing Technologies, Vol. 2018, 3 (jun 2018), 123--142. https://doi.org/10.1515/popets-2018-0024
[16]
Zhengli Huang, Wenliang Du, and Biao Chen. 2005. Deriving private information from randomized data. In Proceedings of the 2005 ACM SIGMOD international conference on Management of data. ACM, ACM Press, 37--48. https://doi.org/10.1145/1066157.1066163
[17]
Stanislaw Jarecki. 2004. Crypto Overview, Perfect Secrecy, One-time Pad . Donald Bren School of Information and Computer Sciences, University of California, Irvine. https://www.ics.uci.edu/ stasio/fall04/lect1.pdf
[18]
Hillol Kargupta, Souptik Datta, Qi Wang, and Krishnamoorthy Sivakumar. 2003. On the Privacy Preserving Properties of Random Data Perturbation Techniques. In ICDM, Vol. 3. Citeseer, 99--106.
[19]
Yehuda Lindell and Benny Pinkas. 2009. Secure multiparty computation for privacy-preserving data mining. Journal of Privacy and Confidentiality, Vol. 1, 1 (2009), 5. https://doi.org/10.4018/9781591405573.ch189
[20]
Michael Naehrig, Kristin Lauter, and Vinod Vaikuntanathan. 2011. Can homomorphic encryption be practical?. In Proceedings of the 3rd ACM workshop on Cloud computing security workshop. ACM, Association for Computing Machinery (ACM), 113--124. https://doi.org/10.1145/2046660.2046682
[21]
Claudio Orlandi, Alessandro Piva, and Mauro Barni. 2007. Oblivious neural network computing via homomorphic encryption. EURASIP Journal on Information Security, Vol. 2007, 1 (2007), 037343. https://doi.org/10.1155/2007/37343
[22]
Siani Pearson and Azzedine Benameur. 2010. Privacy, security and trust issues arising from cloud computing. In Cloud Computing Technology and Science (CloudCom), 2010 IEEE Second International Conference on. IEEE, Institute of Electrical and Electronics Engineers (IEEE), 693--702. https://doi.org/10.1109/cloudcom.2010.66
[23]
Qingchen Zhang, Laurence T Yang, and Zhikui Chen. 2016. Privacy preserving deep computation model on cloud for big data feature learning. IEEE Trans. Comput., Vol. 65, 5 (may 2016), 1351--1362. https://doi.org/10.1109/tc.2015.2470255

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
UCC'19: Proceedings of the 12th IEEE/ACM International Conference on Utility and Cloud Computing
December 2019
307 pages
ISBN:9781450368940
DOI:10.1145/3344341
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 December 2019

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. cloud computing
  2. data perturbation
  3. homomorphic encryption
  4. privacy architecture

Qualifiers

  • Research-article

Conference

UCC '19
Sponsor:

Acceptance Rates

Overall Acceptance Rate 38 of 125 submissions, 30%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 221
    Total Downloads
  • Downloads (Last 12 months)10
  • Downloads (Last 6 weeks)0
Reflects downloads up to 12 Jan 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media