Secure Computation over Encrypted Databases

08/05/2023
by   Tikaram Sanyashi, et al.
0

Sensitive applications running on the cloud often require data to be stored in an encrypted domain. To run data mining algorithms on such data, partially homomorphic encryption schemes (allowing certain operations in the ciphertext domain) have been devised. One such line of work yields schemes for secure k-nearest neighbors computation that is designed to provide both Data Privacy and Query Privacy. Enhancements in this area further ensure that the data owner approves each query issued by a query user before the cloud server processes it. In this work, we describe an attack that invalidates the key confidentiality claim, which further invalidates the Data Privacy claim for these schemes. We show that a query user can specially tailor a query to extract information about the secret key used to encrypt the data points. Furthermore, the recovered secret information can be used to derive all the plaintext data points breaking data privacy. We then suggest enhanced encryption schemes that make such attacks on data privacy impossible while incurring meager additional costs in performance.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/15/2018

Secure k-NN as a Service Over Encrypted Data in Multi-User Setting

To securely leverage the advantages of Cloud Computing, recently a lot o...
research
08/22/2017

S4: A New Secure Scheme for Enforcing Privacy in Cloud Data Warehouses

Outsourcing data into the cloud becomes popular thanks to the pay-as-you...
research
02/18/2020

An Efficient Secure Dynamic Skyline Query Model

It is now cost-effective to outsource large dataset and perform query ov...
research
02/18/2020

SCALE: An Efficient Framework for Secure Dynamic Skyline Query Processing in the Cloud

It is now cost-effective to outsource large dataset and perform query ov...
research
01/22/2018

Scalable Secure Computation of Statistical Functions with Applications to k-Nearest Neighbors

Given a set S of n d-dimensional points, the k-nearest neighbors (KNN) i...
research
02/12/2020

Efficient Cloud-based Secret Shuffling via Homomorphic Encryption

When working with joint collections of confidential data from multiple s...
research
12/29/2017

Secret Sharing for Cloud Data Security

Cloud computing helps reduce costs, increase business agility and deploy...

Please sign up or login with your details

Forgot password? Click here to reset