Towards secure big data analytic for cloud-enabled applications with fully homomorphic encryption

被引:60
作者
Alabdulatif, Abdulatif [1 ]
Khalil, Ibrahim [2 ]
Yi, Xun [2 ]
机构
[1] Qassim Univ, Coll Comp, Comp Sci Dept, Buraydah, Saudi Arabia
[2] RMIT Univ, Sch Sci, Melbourne, Vic, Australia
关键词
Cloud computing; Big data; Distributed analytic; Fully homomorphic encryption; PRIVACY;
D O I
10.1016/j.jpdc.2019.10.008
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing empowers enterprises to efficiently manage big data and discovery of useful information which are the most fundamental challenges for big data enabled applications. The cloud offered unlimited resources that can store, manage and analyze massive and heterogeneous data to improve the quality assurance of application services. Nevertheless, cloud computing is exposed to enormous external and internal privacy breaches and leakage threats. In this paper, we introduce a privacy-preserving distributed analytics framework for big data in cloud. Fully Homomorphic Encryption (FHE) is used as an emerging and powerful cryptosystem that can carry out analysis tasks on encrypted data. The developed distributed approach has the scalability to partition both data and analysis computations into subset cloud computing nodes that can be run independently. This rapidly accelerates the performance of encrypted data processing while preserving a high level of analysis accuracy. Our experimental evaluation demonstrates the efficiency of the proposed framework, in terms of both analysis performance and accuracy, for building a secure analytics cloud-enabled application. (C) 2019 Elsevier Inc. All rights reserved.
引用
收藏
页码:192 / 204
页数:13
相关论文
共 32 条
[1]  
Agrawal R, 2000, SIGMOD REC, V29, P439, DOI 10.1145/335191.335438
[2]   Privacy-preserving anomaly detection in cloud with lightweight homomorphic encryption [J].
Alabdulatif, Abdulatif ;
Kumarage, Heshan ;
Khalil, Ibrahim ;
Yi, Xun .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2017, 90 :28-45
[3]  
[Anonymous], 2015, International Journal of Network Security
[4]  
Brakerski Zvika, 2014, ACM Transactions on Computation Theory, V6, DOI 10.1145/2633600
[5]  
Brakerski Z, 2011, LECT NOTES COMPUT SC, V6841, P505, DOI 10.1007/978-3-642-22792-9_29
[6]   A framework for real time end to end monitoring and big data oriented management of smart environments [J].
Celesti, Antonio ;
Fazio, Maria .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2019, 132 :262-273
[7]  
Cheon JH, 2013, LECT NOTES COMPUT SC, V7881, P315, DOI 10.1007/978-3-642-38348-9_20
[8]  
Doganay M., 2008, Proceedings of international workshop on Privacy and anonymity in information society, P3
[9]   Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges [J].
Domingo-Ferrer, Josep ;
Farras, Oriol ;
Ribes-Gonzalez, Jordi ;
Sanchez, David .
COMPUTER COMMUNICATIONS, 2019, 140 :38-60
[10]  
Duan Y., 2014, LARGE SCALE DATA ANA, P219