Towards secure big data analytic for cloud-enabled applications with fully homomorphic encryption

被引:60
作者
Alabdulatif, Abdulatif [1 ]
Khalil, Ibrahim [2 ]
Yi, Xun [2 ]
机构
[1] Qassim Univ, Coll Comp, Comp Sci Dept, Buraydah, Saudi Arabia
[2] RMIT Univ, Sch Sci, Melbourne, Vic, Australia
关键词
Cloud computing; Big data; Distributed analytic; Fully homomorphic encryption; PRIVACY;
D O I
10.1016/j.jpdc.2019.10.008
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing empowers enterprises to efficiently manage big data and discovery of useful information which are the most fundamental challenges for big data enabled applications. The cloud offered unlimited resources that can store, manage and analyze massive and heterogeneous data to improve the quality assurance of application services. Nevertheless, cloud computing is exposed to enormous external and internal privacy breaches and leakage threats. In this paper, we introduce a privacy-preserving distributed analytics framework for big data in cloud. Fully Homomorphic Encryption (FHE) is used as an emerging and powerful cryptosystem that can carry out analysis tasks on encrypted data. The developed distributed approach has the scalability to partition both data and analysis computations into subset cloud computing nodes that can be run independently. This rapidly accelerates the performance of encrypted data processing while preserving a high level of analysis accuracy. Our experimental evaluation demonstrates the efficiency of the proposed framework, in terms of both analysis performance and accuracy, for building a secure analytics cloud-enabled application. (C) 2019 Elsevier Inc. All rights reserved.
引用
收藏
页码:192 / 204
页数:13
相关论文
共 32 条
[11]   A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS [J].
ELGAMAL, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) :469-472
[12]   Privacy-preserving distributed clustering [J].
Erkin, Zekeriya ;
Veugen, Thijs ;
Toft, Tomas ;
Lagendijk, Reginald L. .
EURASIP JOURNAL ON INFORMATION SECURITY, 2013, (01)
[13]   Cloud Manufacturing: Security, Privacy and Forensic Concerns [J].
Esposito, Christian ;
Castiglione, Aniello ;
Martini, Ben ;
Choo, Kim-Kwang Raymond .
IEEE CLOUD COMPUTING, 2016, 3 (04) :16-22
[14]   Spectrometric differentiation of yeast strains using minimum volume increase and minimum direction change clustering criteria [J].
Fachada, Nuno ;
Figueiredo, Mario A. T. ;
Lopes, Vitor V. ;
Martins, Rui C. ;
Rosa, Agostinho C. .
PATTERN RECOGNITION LETTERS, 2014, 45 :55-61
[15]  
Gentry C, 2011, LECT NOTES COMPUT SC, V6632, P129, DOI 10.1007/978-3-642-20465-4_9
[16]   Fully Homomorphic Encryption Using Ideal Lattices [J].
Gentry, Craig .
STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2009, :169-178
[17]   Introduction and Preliminaries [J].
不详 .
FOUNDATIONS AND TRENDS IN THEORETICAL COMPUTER SCIENCE, 2005, 1 (01) :1-124
[18]  
Huang Z., 2005, P 2005 ACM SIGMOD IN, P37, DOI DOI 10.1145/1066157.1066163
[19]   Privacy preserving clustering on horizontally partitioned data [J].
Inan, Ali ;
Kaya, Selim V. ;
Saygin, Yuecel ;
Savas, Erkay ;
Hintoglu, Ayca A. ;
Levi, Albert .
DATA & KNOWLEDGE ENGINEERING, 2007, 63 (03) :646-666
[20]  
Kaipa KN, 2017, STUD COMPUT INTELL, V698, P157, DOI 10.1007/978-3-319-51595-3_6