Homomorphic encryption approach for exploration of sensitive information retrieval

被引:1
|
作者
Rauthan, J. S. [1 ]
Vaisla, K. S. [1 ]
机构
[1] Uttarakhand Tech Univ, Comp Sci & Engn Dept, Dehra Dun, Uttarakhand, India
关键词
Cloud database; homomorphic encryption; privacy; sensitive information retrieval; information security;
D O I
10.3233/JIFS-179730
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper presents the core algorithms behind DB-Query-Encryption, a proposal that supports private information retrieval (PIR) explorations. DB-Query-Encryption permits users for selectively retrieve information from a cloud database whereas keeping sensitive data terms secretive. As an example use case, a medical research institute may, as part of a sensitive data exploration, requisite to look up facts about an individual person from a cloud database deprived of reveling the person's identity. The basic idea behind DB-Query-Encryption is to uses homomorphic encryption, which allows the cloud server to fulfill this request, whereas making it infeasible for the database owner (or a hacker who might compromised) to conclude the name being explored for, either which records are retrieved. The query, which retrieved the information, still secretive even if the spectator be able to search all the data over the cloud server and all the actions as they are being executed. Within that period, the query response produced by the cloud server is considerable smaller than the whole cloud database, making it more convenient when it is not feasible or appropriate for the user to transfer the entire database.
引用
收藏
页码:6495 / 6505
页数:11
相关论文
共 50 条
  • [1] Homomorphic Encryption for Secure Information Retrieval from the Cloud
    Anand, V.
    Satapathy, Suresh Chandra
    FIRST INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ENGINEERING, TECHNOLOGY AND SCIENCE - ICETETS 2016, 2016,
  • [2] Towards practical private information retrieval from homomorphic encryption
    Zhuravlev, Dmitry
    ALGEBRA & DISCRETE MATHEMATICS, 2015, 19 (02): : 302 - 312
  • [3] Performance Analysis of Private Information Retrieval Scheme based on Homomorphic Encryption
    Ichibane, Yacine
    Gahi, Youssef
    Guennoun, Mouhcine
    Guennoun, Zouhair
    2015 5TH INTERNATIONAL CONFERENCE ON INFORMATION & COMMUNICATION TECHNOLOGY AND ACCESSIBILITY (ICTA), 2015,
  • [4] Multi-value Private Information Retrieval using Homomorphic Encryption
    Hsu, Hsiang-Chen
    Liu, Zi-Yuan
    Tso, Raylin
    Chen, Kung
    2020 15TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS 2020), 2020, : 82 - 88
  • [5] Secure and Efficient Similarity Retrieval in Cloud Computing Based on Homomorphic Encryption
    Wang, Na
    Zhou, Wen
    Wang, Jingjing
    Guo, Yifan
    Fu, Junsong
    Liu, Jianwei
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 2454 - 2469
  • [6] Research on Database Ciphertext Retrieval Based on Homomorphic Encryption
    Gong, Zhibin
    Xiao, Youan
    Long, Yihong
    Yang, Yanli
    PROCEEDINGS OF 2017 IEEE 7TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION (ICEIEC), 2017, : 149 - 152
  • [7] Automated exploration of homomorphic encryption scheme input parameters
    Feron, Cyrielle
    Lagadec, Loic
    Lapotre, Vianney
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 55
  • [8] A survey on implementations of homomorphic encryption schemes
    Thi Van Thao Doan
    Mohamed-Lamine Messai
    Gérald Gavin
    Jérôme Darmont
    The Journal of Supercomputing, 2023, 79 : 15098 - 15139
  • [9] A survey on implementations of homomorphic encryption schemes
    Doan, Thi Van Thao
    Messai, Mohamed-Lamine
    Gavin, Gerald
    Darmont, Jerome
    JOURNAL OF SUPERCOMPUTING, 2023, 79 (13) : 15098 - 15139
  • [10] SHECS-PIR: Somewhat Homomorphic Encryption-Based Compact and Scalable Private Information Retrieval
    Park, Jeongeun
    Tibouchi, Mehdi
    COMPUTER SECURITY - ESORICS 2020, PT II, 2020, 12309 : 86 - 106