Computation on Encrypted Data Using Dataflow Authentication
نویسندگان
چکیده
Encrypting data before sending it to the cloud ensures confidentiality but requires compute on encrypted data. Trusted execution environments, such as Intel SGX enclaves, promise provide a secure environment in which can be decrypted and then processed. However, vulnerabilities executed program give attackers ample opportunities execute arbitrary code inside enclave. This modify dataflow of leak secrets via side channels. Fully homomorphic encryption would an alternative without leaks. due its high computational complexity, applicability general-purpose computing remains limited. Researchers have made several proposals for transforming programs perform computations less powerful schemes. Yet current approaches do not support making control-flow decisions based We introduce concept authentication (DFAuth) enable programs. DFAuth prevents adversary from arbitrarily deviating program. Our technique hence offers protections against side-channel attacks described previously. implemented two flavors DFAuth, Java bytecode-to-bytecode compiler, enclave running small program-independent trusted base. applied neural network performing machine learning sensitive medical smart charging scheduler electric vehicles. transformation yields with weights, evaluated inputs \( 12.55 \,\mathrm{m}\mathrm{s} \) . protected is capable updating plan approximately 1.06 seconds.
منابع مشابه
Computation on Encrypted Data using Data Flow Authentication
Encrypting data before sending it to the cloud protects it against hackers and malicious insiders, but requires the cloud to compute on encrypted data. Trusted (hardware) modules, e.g., secure enclaves like Intel’s SGX, can very efficiently run entire programs in encrypted memory shielding it from the administrator’s view. However, it already has been demonstrated that software vulnerabilities ...
متن کاملTowards Robust Computation on Encrypted Data
Encryption schemes that support computation on encrypted data are useful in constructing efficient and intuitively simple cryptographic protocols. However, the approach was previously limited to stand-alone and/or honest-but-curious security. In this work, we apply recent results on “non-malleable homomorphic encryption” to construct new protocols with Universally Composable security against ac...
متن کاملPrivate Computation on Encrypted Genomic Data
A number of databases around the world currently host a wealth of genomic data that is invaluable to researchers conducting a variety of genomic studies. However, patients who volunteer their genomic data run the risk of privacy invasion. In this work, we give a cryptographic solution to this problem: to maintain patient privacy, we propose encrypting all genomic data in the database. To allow ...
متن کاملSecure Multi-party Computation Using Virtual Parties for Computation on Encrypted Data
In this paper, we propose a new Virtual Party Protocol (VPP) protocol for Secure Multi-Party Computation (SMC). There are many computations and surveys which involve confidential data from many parties or organizations. As the concerned data is property of the organization or the party, preservation and security of this data is of prime importance for such type of computations. Although the com...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ACM transactions on privacy and security
سال: 2022
ISSN: ['2471-2574', '2471-2566']
DOI: https://doi.org/10.1145/3513005