Authenticable Data Analytics Over Encrypted Data in the Cloud

被引:4
作者
Chen, Lanxiang [1 ]
Mu, Yi [2 ]
Zeng, Lingfang [3 ]
Rezaeibagha, Fatemeh [4 ]
Deng, Robert H. [5 ]
机构
[1] Fujian Normal Univ, Coll Comp & Cyber Secur, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350117, Peoples R China
[2] City Univ Macau, Fac Data Sci, Macau, Peoples R China
[3] Zhejiang Lab, Hangzhou 311121, Peoples R China
[4] Murdoch Univ, Discipline Informat Technol, Perth, WA 6150, Australia
[5] Singapore Management Univ, Sch Comp & Informat Syst, Singapore 188065, Singapore
基金
中国国家自然科学基金;
关键词
Cryptography; Statistical analysis; Calculators; Databases; Data analysis; Security; Additives; Encrypted data; authenticable encryption; data privacy; homomorphic encryption;
D O I
10.1109/TIFS.2023.3256132
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Statistical analytics on encrypted data requires a fully-homomorphic encryption (FHE) scheme. However, heavy computation overheads make FHE impractical. In this paper we propose a novel approach to achieve privacy-preserving statistical analysis on an encrypted database. The main idea of this work is to construct a privacy-preserving calculator to calculate attributes' count values for later statistical analysis. To authenticate these encrypted count values, we adopt an authenticable additive homomorphic encryption scheme to construct the calculator. We formalize the notion of an authenticable privacy-preserving calculator that has properties of broadcasting and additive homomorphism. Further, we propose a cryptosystem based on binary vectors to achieve complex logic expressions for statistical analysis on encrypted data. With the aid of the proposed cryptographic calculator, we design several protocols for statistical analysis including conjunctive, disjunctive and complex logic expressions to achieve more complicated statistical functionalities. Experimental results show that the proposed scheme is feasible and practical.
引用
收藏
页码:1800 / 1813
页数:14
相关论文
共 26 条
[1]  
Agarwal Archita, 2019, Proceedings on Privacy Enhancing Technologies, V2019, P170, DOI 10.2478/popets-2019-0042
[2]  
Arnautov S, 2016, PROCEEDINGS OF OSDI'16: 12TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, P689
[3]  
Bailleu M, 2021, PROCEEDINGS OF THE 2021 USENIX ANNUAL TECHNICAL CONFERENCE, P285
[4]  
Bajaj S., 2011, P ACM SIGMOD INT C M, P205, DOI [DOI 10.1145/1989323.1989346, 10.1145/1989323.1989346]
[5]  
Chan THH, 2010, LECT NOTES COMPUT SC, V6199, P405, DOI 10.1007/978-3-642-14162-1_34
[6]   Structured Encryption and Controlled Disclosure [J].
Chase, Melissa ;
Kamara, Seny .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010, 2010, 6477 :577-594
[7]   Secure search for encrypted personal health records from big data NoSQL databases in cloud [J].
Chen, Lanxiang ;
Zhang, Nan ;
Sun, Hung-Min ;
Chang, Chin-Chen ;
Yu, Shui ;
Choo, Kim-Kwang Raymond .
COMPUTING, 2020, 102 (06) :1521-1545
[8]   Blockchain based searchable encryption for electronic health record sharing [J].
Chen, Lanxiang ;
Lee, Wai-Kong ;
Chang, Chin-Chen ;
Choo, Kim-Kwang Raymond ;
Zhang, Nan .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 95 (420-429) :420-429
[9]   HIPAA and Protecting Health Information in the 21st Century [J].
Cohen, I. Glenn ;
Mello, Michelle M. .
JAMA-JOURNAL OF THE AMERICAN MEDICAL ASSOCIATION, 2018, 320 (03) :231-232
[10]  
Dave C., 2020, EuroSys, P1