Homomorphic encryption approach for exploration of sensitive information retrieval

被引:1
|
作者
Rauthan, J. S. [1 ]
Vaisla, K. S. [1 ]
机构
[1] Uttarakhand Tech Univ, Comp Sci & Engn Dept, Dehra Dun, Uttarakhand, India
关键词
Cloud database; homomorphic encryption; privacy; sensitive information retrieval; information security;
D O I
10.3233/JIFS-179730
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper presents the core algorithms behind DB-Query-Encryption, a proposal that supports private information retrieval (PIR) explorations. DB-Query-Encryption permits users for selectively retrieve information from a cloud database whereas keeping sensitive data terms secretive. As an example use case, a medical research institute may, as part of a sensitive data exploration, requisite to look up facts about an individual person from a cloud database deprived of reveling the person's identity. The basic idea behind DB-Query-Encryption is to uses homomorphic encryption, which allows the cloud server to fulfill this request, whereas making it infeasible for the database owner (or a hacker who might compromised) to conclude the name being explored for, either which records are retrieved. The query, which retrieved the information, still secretive even if the spectator be able to search all the data over the cloud server and all the actions as they are being executed. Within that period, the query response produced by the cloud server is considerable smaller than the whole cloud database, making it more convenient when it is not feasible or appropriate for the user to transfer the entire database.
引用
收藏
页码:6495 / 6505
页数:11
相关论文
共 50 条
  • [41] Homomorphic Encryption Over Integers
    Jain, Rachna
    Madan, Sushila
    Garg, Bindu
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 774 - 778
  • [42] Homomorphic Encryption for Finite Automata
    Genise, Nicholas
    Gentry, Craig
    Halevi, Shai
    Li, Baiyu
    Micciancio, Daniele
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2019, PT II, 2019, 11922 : 473 - 502
  • [43] Homomorphic Encryption: Review and Applications
    Challa, Ratnakumari
    ADVANCES IN DATA SCIENCE AND MANAGEMENT, 2020, 37 : 273 - 281
  • [44] Homomorphic Encryption of Neural Networks
    Pandey, Purnendu Shekhar
    Kumar, Vinod
    Wario, Ruth
    MACHINE LEARNING, IMAGE PROCESSING, NETWORK SECURITY AND DATA SCIENCES, MIND 2022, PT I, 2022, 1762 : 162 - 173
  • [45] Multikey Verifiable Homomorphic Encryption
    Lu, Yi
    Hara, Keisuke
    Tanaka, Keisuke
    IEEE ACCESS, 2022, 10 : 84761 - 84775
  • [46] Verifying the Integrity of Private Transaction Information in Smart Contract using Homomorphic Encryption
    Yoon, Young
    Moon, Juno
    PROCEEDINGS OF THE 2019 IEEE EURASIA CONFERENCE ON IOT, COMMUNICATION AND ENGINEERING (ECICE), 2019, : 38 - 40
  • [47] Homomorphic encryption based on fraction
    Zhu, Ping
    DCABES 2007 PROCEEDINGS, VOLS I AND II, 2007, : 487 - 490
  • [48] Cryptanalysis of a homomorphic encryption scheme
    Sonia Bogos
    John Gaspoz
    Serge Vaudenay
    Cryptography and Communications, 2018, 10 : 27 - 39
  • [49] Protecting Personal Information using Homomorphic Encryption for Person Re-identification
    Morita, Kazunari
    Yoshimura, Hiroki
    Nishiyama, Masashi
    Iwai, Yoshio
    2018 IEEE 7TH GLOBAL CONFERENCE ON CONSUMER ELECTRONICS (GCCE 2018), 2018, : 166 - 167
  • [50] An Efficient Ciphertext Retrieval Scheme Based on Homomorphic Encryption for Multiple Data Owners in Hybrid Cloud
    He, Heng
    Chen, Renju
    Liu, Chengyu
    Feng, Ke
    Zhou, Xiaohu
    IEEE ACCESS, 2021, 9 : 168547 - 168557