Homomorphic encryption approach for exploration of sensitive information retrieval

被引:1
|
作者
Rauthan, J. S. [1 ]
Vaisla, K. S. [1 ]
机构
[1] Uttarakhand Tech Univ, Comp Sci & Engn Dept, Dehra Dun, Uttarakhand, India
关键词
Cloud database; homomorphic encryption; privacy; sensitive information retrieval; information security;
D O I
10.3233/JIFS-179730
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper presents the core algorithms behind DB-Query-Encryption, a proposal that supports private information retrieval (PIR) explorations. DB-Query-Encryption permits users for selectively retrieve information from a cloud database whereas keeping sensitive data terms secretive. As an example use case, a medical research institute may, as part of a sensitive data exploration, requisite to look up facts about an individual person from a cloud database deprived of reveling the person's identity. The basic idea behind DB-Query-Encryption is to uses homomorphic encryption, which allows the cloud server to fulfill this request, whereas making it infeasible for the database owner (or a hacker who might compromised) to conclude the name being explored for, either which records are retrieved. The query, which retrieved the information, still secretive even if the spectator be able to search all the data over the cloud server and all the actions as they are being executed. Within that period, the query response produced by the cloud server is considerable smaller than the whole cloud database, making it more convenient when it is not feasible or appropriate for the user to transfer the entire database.
引用
收藏
页码:6495 / 6505
页数:11
相关论文
共 50 条
  • [21] Homomorphic Encryption on GPU
    Ozcan, Ali Sah
    Ayduman, Can
    Turkoglu, Enes Recep
    Savas, Erkay
    IEEE ACCESS, 2023, 11 : 84168 - 84186
  • [22] Cyclic Homomorphic Encryption Aggregation (CHEA)-A Novel Approach to Data Aggregation in the Smart Grid
    Sousa-Dias, Daniel
    Amyot, Daniel
    Rahimi-Kian, Ashkan
    Bashari, Masoud
    Mylopoulos, John
    ENERGIES, 2024, 17 (04)
  • [23] A safe distribution scheme of sensitive data based on full homomorphic encryption model
    Fang, Tianke
    Deng, Han
    Liu, Bin
    Yang, Lan
    Xie, Xiangyi
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2022, 15 (01) : 19 - 26
  • [24] Applying Homomorphic Encryption For Securing Cloud Database
    Marwan, Mbarek
    Kartit, Ali
    Ouahmane, Hassan
    2016 4TH IEEE INTERNATIONAL COLLOQUIUM ON INFORMATION SCIENCE AND TECHNOLOGY (CIST), 2016, : 658 - 664
  • [25] A look inside of homomorphic encryption for federated learning
    Beshaj, Lubjana
    Hoefler, Michel
    DISRUPTIVE TECHNOLOGIES IN INFORMATION SCIENCES VIII, 2024, 13058
  • [26] Homomorphic Encryption for Multiple Users With Less Communications
    Park, Jeongeun
    IEEE ACCESS, 2021, 9 (09): : 135915 - 135926
  • [27] A Survey on Homomorphic Encryption Schemes: Theory and Implementation
    Acar, Abbas
    Aksu, Hidayet
    Uluagac, A. Selcuk
    Conti, Mauro
    ACM COMPUTING SURVEYS, 2018, 51 (04)
  • [28] Secure data storage in the cloud with homomorphic encryption
    Bensitel, Yasmina
    Romadi, Rahal
    2016 2ND INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES AND APPLICATIONS (CLOUDTECH), 2016, : 1 - 6
  • [29] Parallelizing Fully Homomorphic Encryption
    Hayward, Ryan
    Chiang, Chia-Chu
    2014 INTERNATIONAL SYMPOSIUM ON COMPUTER, CONSUMER AND CONTROL (IS3C 2014), 2014, : 721 - 724
  • [30] Homomorphic encryption for stochastic computing
    Koseki, Ryusuke
    Ito, Akira
    Ueno, Rei
    Tibouchi, Mehdi
    Homma, Naofumi
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2023, 13 (02) : 251 - 263