Combining Homomorphic Encryption with Trusted Execution Environment: A Demonstration with Paillier Encryption and SGX

被引:6
|
作者
Drucker, Nir [1 ,2 ]
Gueron, Shay [1 ,2 ]
机构
[1] Univ Haifa, Haifa, Israel
[2] Amazon Web Serv, Seattle, WA 98109 USA
来源
PROCEEDINGS OF THE 2017 INTERNATIONAL WORKSHOP ON MANAGING INSIDER SECURITY THREATS (MIST'17) | 2017年
基金
以色列科学基金会; 欧盟地平线“2020”;
关键词
Secure Guard Extension; Homomorphic Encryption; Trusted Execution Environment; Paillier cryptosystem; Cloud database;
D O I
10.1145/3139923.3139933
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud database services offer performance and storage advantages that local client platforms do not have, and become very appealing solutions. We list three approaches that address data privacy concerns that are associated with depositing sensitive data on remote platforms. Users can protect their data privacy by locally encrypting it before uploading to remote cloud servers. This prevents the servers from carrying out operations on the data, and also increases the networking overheads. Another approach uses a Trusted Execution Environments (TEE) to protect the data. Examples include OS containers, Virtual Machines or Intel's Software Guard Extension (SGX). This approach relies on the trustworthiness of the TEE for privacy and integrity of operations. The third approach is using Homomorhpic Encryption (HE) schemes. They can allow a remote platform to carry out computations on encrypted data, but are malleable. Adding authentication tags to database entries could solve this problem only if the server is in the user's trust domain. We present here a new combined model. It uses a TEE to guarantee the integrity and correctness of the database code and data, while the data itself is encrypted with some HE scheme. In this way, the malleability protection, achieved through the TEE, is decoupled from the privacy protection that is achieved through the HE. Of course, this comes at some performance costs, but the results of our demonstration, that uses SGX as the TEE and Paillier cryptosystem as the HE, indicate that the proposed combined solution is practical.
引用
收藏
页码:85 / 88
页数:4
相关论文
共 29 条
  • [1] Malicious Code Detection for Trusted Execution Environment Based on Paillier Homomorphic Encryption
    Wang, Ziwang
    Zhuang, Yi
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2020, E103B (03) : 155 - 166
  • [2] Paillier cryptosystem enhancement for Homomorphic Encryption technique
    Saja J. Mohammed
    Dujan B. Taha
    Multimedia Tools and Applications, 2024, 83 : 22567 - 22579
  • [3] Paillier cryptosystem enhancement for Homomorphic Encryption technique
    Mohammed, Saja J.
    Taha, Dujan B.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (8) : 22567 - 22579
  • [4] VISE: Combining Intel SGX and Homomorphic Encryption for Cloud Industrial Control Systems
    Coppolino, Luigi
    D'Antonio, Salvatore
    Formicola, Valerio
    Mazzeo, Giovanni
    Romano, Luigi
    IEEE TRANSACTIONS ON COMPUTERS, 2021, 70 (05) : 711 - 724
  • [5] Integrating Homomorphic Encryption and Trusted Execution Technology for Autonomous and Confidential Model Refining in Cloud
    Liu, Pinglan
    Zhang, Wensheng
    2023 IEEE 16TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, CLOUD, 2023, : 529 - 539
  • [6] Pivacy-preserving federated learning based on multi-key fully homomorphic encryption and trusted execution environment
    Gang Liu
    Zheng He
    Le Cheng
    Yi Luo
    Senmiao Su
    Jingchen Su
    Keming Zhang
    Peer-to-Peer Networking and Applications, 2025, 18 (4)
  • [7] Porting the Paillier Algorithm for Homomorphic Encryption on Portable Devices
    Karageorgopoulou, Angeliki
    Tsoukas, Vasileios
    Spathoulas, Georgios
    Kakarountas, Athanasios
    Koziri, Maria
    2023 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS, ICCE, 2023,
  • [8] A JAVA']JAVA IMPLEMENTATION OF PAILLIER HOMOMORPHIC ENCRYPTION SCHEME
    Harerimana, Radjab
    Tan, Syh-Yuan
    Yau, Wei-Chuen
    2017 5TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICOIC7), 2017,
  • [9] A Cryptograph Domain Image Retrieval Method Based on Paillier Homomorphic Block Encryption
    Xu, Wenjia
    Xiang, Shijun
    Sachnev, Vasily
    CMC-COMPUTERS MATERIALS & CONTINUA, 2018, 55 (02): : 285 - 295
  • [10] Performance Evaluation of RSA, ElGamal, and Paillier Partial Homomorphic Encryption Algorithms
    Mohammed, Saja J.
    Taha, Dujan B.
    PROCEEDING OF THE 2ND 2022 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND SOFTWARE ENGINEERING (CSASE 2022), 2022, : 89 - 94