Homomorphic encryption approach for exploration of sensitive information retrieval

被引:1
|
作者
Rauthan, J. S. [1 ]
Vaisla, K. S. [1 ]
机构
[1] Uttarakhand Tech Univ, Comp Sci & Engn Dept, Dehra Dun, Uttarakhand, India
关键词
Cloud database; homomorphic encryption; privacy; sensitive information retrieval; information security;
D O I
10.3233/JIFS-179730
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper presents the core algorithms behind DB-Query-Encryption, a proposal that supports private information retrieval (PIR) explorations. DB-Query-Encryption permits users for selectively retrieve information from a cloud database whereas keeping sensitive data terms secretive. As an example use case, a medical research institute may, as part of a sensitive data exploration, requisite to look up facts about an individual person from a cloud database deprived of reveling the person's identity. The basic idea behind DB-Query-Encryption is to uses homomorphic encryption, which allows the cloud server to fulfill this request, whereas making it infeasible for the database owner (or a hacker who might compromised) to conclude the name being explored for, either which records are retrieved. The query, which retrieved the information, still secretive even if the spectator be able to search all the data over the cloud server and all the actions as they are being executed. Within that period, the query response produced by the cloud server is considerable smaller than the whole cloud database, making it more convenient when it is not feasible or appropriate for the user to transfer the entire database.
引用
收藏
页码:6495 / 6505
页数:11
相关论文
共 50 条
  • [31] Simulation of a Homomorphic Encryption System
    Bozduman, Hanife Cagil
    Afacan, Erkan
    APPLIED MATHEMATICS AND NONLINEAR SCIENCES, 2020, 5 (01) : 479 - 484
  • [32] Research of the Principles of Homomorphic Encryption
    Laktyushin, Sergei
    Kiamov, Amir A.
    PROCEEDINGS OF THE 2021 IEEE CONFERENCE OF RUSSIAN YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING (ELCONRUS), 2021, : 499 - 501
  • [33] Combining Homomorphic Encryption with Trusted Execution Environment: A Demonstration with Paillier Encryption and SGX
    Drucker, Nir
    Gueron, Shay
    PROCEEDINGS OF THE 2017 INTERNATIONAL WORKSHOP ON MANAGING INSIDER SECURITY THREATS (MIST'17), 2017, : 85 - 88
  • [34] Cryptanalysis of a homomorphic encryption scheme
    Bogos, Sonia
    Gaspoz, John
    Vaudenay, Serge
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2018, 10 (01): : 27 - 39
  • [35] Homomorphic encryption scheme of the rational
    Zhu, Ping
    He, Yanxiang
    Xiang, Guangli
    2006 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-4, 2006, : 1230 - 1233
  • [36] Kernel homomorphic encryption protocol
    Ullah, Shamsher
    Li, Xiang Yang
    Hussain, Muhammad Tanveer
    Lan, Zhang
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 48
  • [37] Homomorphic Encryption for Cluster in Cloud
    Vamshinath, N.
    Ramya, K. Ruth
    Krishna, Sai
    Bhaskar, P. Gopi
    Mwaseba, Geofrey L.
    Kim, Tai-hoon
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (05): : 319 - 324
  • [38] Homomorphic encryption for stochastic computing
    Ryusuke Koseki
    Akira Ito
    Rei Ueno
    Mehdi Tibouchi
    Naofumi Homma
    Journal of Cryptographic Engineering, 2023, 13 : 251 - 263
  • [39] Building Applications with Homomorphic Encryption
    Hallman, Roger A.
    Laine, Kim
    Dai, Wei
    Gama, Nicolas
    Malozemoff, Alex J.
    Polyakov, Yuriy
    Carpov, Sergiu
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2160 - 2162
  • [40] Bootstrapping for Approximate Homomorphic Encryption
    Cheon, Jung Hee
    Han, Kyoohyung
    Kim, Andrey
    Kim, Miran
    Song, Yongsoo
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT I, 2018, 10820 : 360 - 384