Combining Homomorphic Encryption with Trusted Execution Environment: A Demonstration with Paillier Encryption and SGX

被引:6
|
作者
Drucker, Nir [1 ,2 ]
Gueron, Shay [1 ,2 ]
机构
[1] Univ Haifa, Haifa, Israel
[2] Amazon Web Serv, Seattle, WA 98109 USA
来源
PROCEEDINGS OF THE 2017 INTERNATIONAL WORKSHOP ON MANAGING INSIDER SECURITY THREATS (MIST'17) | 2017年
基金
以色列科学基金会; 欧盟地平线“2020”;
关键词
Secure Guard Extension; Homomorphic Encryption; Trusted Execution Environment; Paillier cryptosystem; Cloud database;
D O I
10.1145/3139923.3139933
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud database services offer performance and storage advantages that local client platforms do not have, and become very appealing solutions. We list three approaches that address data privacy concerns that are associated with depositing sensitive data on remote platforms. Users can protect their data privacy by locally encrypting it before uploading to remote cloud servers. This prevents the servers from carrying out operations on the data, and also increases the networking overheads. Another approach uses a Trusted Execution Environments (TEE) to protect the data. Examples include OS containers, Virtual Machines or Intel's Software Guard Extension (SGX). This approach relies on the trustworthiness of the TEE for privacy and integrity of operations. The third approach is using Homomorhpic Encryption (HE) schemes. They can allow a remote platform to carry out computations on encrypted data, but are malleable. Adding authentication tags to database entries could solve this problem only if the server is in the user's trust domain. We present here a new combined model. It uses a TEE to guarantee the integrity and correctness of the database code and data, while the data itself is encrypted with some HE scheme. In this way, the malleability protection, achieved through the TEE, is decoupled from the privacy protection that is achieved through the HE. Of course, this comes at some performance costs, but the results of our demonstration, that uses SGX as the TEE and Paillier cryptosystem as the HE, indicate that the proposed combined solution is practical.
引用
收藏
页码:85 / 88
页数:4
相关论文
共 29 条
  • [21] A Trusted Data Privacy Computing Method for Vehicular Ad Hoc Networks Based on Homomorphic Encryption and DAG Blockchain
    Jiang, Wenxian
    Tao, Jun
    Guan, Zhenglei
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (06): : 6621 - 6632
  • [22] Using Homomorphic Encryption to Compute Privacy Preserving Data Mining in a Cloud Computing Environment
    Hammami, Hamza
    Brahmi, Hanen
    Brahmi, Imen
    Ben Yahia, Sadok
    INFORMATION SYSTEMS, EMCIS 2017, 2017, 299 : 397 - 413
  • [23] Reliable and privacy-preserving multi-instance iris verification using Paillier homomorphic encryption and one-digit checksum
    Mahesh Kumar Morampudi
    Nagamani Gonthina
    Sriramulu Bojjagani
    Neeraj Kumar Sharma
    Duggineni Veeraiah
    Signal, Image and Video Processing, 2024, 18 : 3723 - 3735
  • [24] Reliable and privacy-preserving multi-instance iris verification using Paillier homomorphic encryption and one-digit checksum
    Morampudi, Mahesh Kumar
    Gonthina, Nagamani
    Bojjagani, Sriramulu
    Sharma, Neeraj Kumar
    Veeraiah, Duggineni
    SIGNAL IMAGE AND VIDEO PROCESSING, 2024, 18 (04) : 3915 - 3924
  • [25] A Design of Secure Communication Protocol Using RLWE-Based Homomorphic Encryption in IoT Convergence Cloud Environment
    Byung-Wook Jin
    Jung-Oh Park
    Hyung-Jin Mun
    Wireless Personal Communications, 2019, 105 : 599 - 618
  • [26] A Design of Secure Communication Protocol Using RLWE-Based Homomorphic Encryption in IoT Convergence Cloud Environment
    Jin, Byung-Wook
    Park, Jung-Oh
    Mun, Hyung-Jin
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 105 (02) : 599 - 618
  • [27] Lattice-Based Identity-Based Homomorphic Conditional Proxy Re-Encryption for Secure Big Data Computing in Cloud Environment
    Ma, Chunguang
    Li, Juyan
    Ouyang, Weiping
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2017, 28 (06) : 645 - 660
  • [28] Optimal hybrid heat transfer search and grey wolf optimization-based homomorphic encryption model to assure security in cloud-based IoT environment
    Jeniffer, J. Thresa
    Chandrasekar, A.
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2022, 15 (01) : 703 - 723
  • [29] Optimal hybrid heat transfer search and grey wolf optimization-based homomorphic encryption model to assure security in cloud-based IoT environment
    J. Thresa Jeniffer
    A. Chandrasekar
    Peer-to-Peer Networking and Applications, 2022, 15 : 703 - 723