Secure outsourcing of manufacturing compliance checks
-
Published:2023-09-25
Issue:1
Volume:23
Page:609-627
-
ISSN:1615-5262
-
Container-title:International Journal of Information Security
-
language:en
-
Short-container-title:Int. J. Inf. Secur.
Author:
Triakosia Aikaterini,Rizomiliotis Panagiotis,Tonelli Cecilia,Federici Fabio,Senni Valerio
Abstract
AbstractCompliance data consists of manufacturing quality measures collected in the production process. Quality checks are most of the times computationally expensive to perform, mainly due to the amount of collected data. Having trusted solutions for outsourcing analyses to the Cloud is an opportunity for reducing costs of operation. However, the adoption of the Cloud computation paradigm is delayed for the many security risks associated with it. In the use case we consider in this paper, compliance data is very sensitive, because it may contain IP-critical information, or it may be related to safety-critical operations or products. While the technological solutions that protect data in-transit or at rest have reached a satisfying level of maturity, there is a huge demand for securing data in-use. Homomorphic Encryption (HE) is one of the main technological enablers for secure computation outsourcing. In the last decade, HE has reached maturity with remarkable pace. However, using HE is still far from being an automated process and each use case introduces different challenges. In this paper, we investigate application of HE to the described scenario. In particular, we redesign the compliance check algorithm to a HE-friendly equivalent. We propose efficient data input encoding that takes advantage of SIMD type of computations supported by the CKKS HE scheme. Moreover, we introduce security/performance trade-offs by proposing limited but acceptable information leakage. We have implemented our solution using SEAL HE library and evaluated our results in terms of time complexity and accuracy. Finally, we analyze the benefits and limitations of integration of a Trusted Execution Environment for secure execution of some computations that are overly expensive for the chosen HE scheme.
Funder
Harokopio University
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Information Systems,Software
Reference40 articles.
1. Rivest, R.L., Adleman, L., Dertouzos, M.L., et al.: On data banks and privacy homomorphisms. Found. Secur. Comput. 4(11), 169–180 (1978) 2. Dathathri, R., Saarikivi, O., Chen, H., Laine, K., Lauter, K., Maleki, S., Musuvathi, M., Mytkowicz, T.: CHET: An optimizing compiler for fully-homomorphic neural-network inferencing. In: Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation, pp. 142–156 (2019) 3. Dathathri, R., Kostova, B., Saarikivi, O., Dai, W., Laine, K., Musuvathi, M.: EVA: An encrypted vector arithmetic language and compiler for efficient homomorphic computation. In: Proceedings of the 41st ACM SIGPLAN Conference on Programming Language Design and Implementation, pp. 546–561 (2020) 4. Viand, A., Jattke, P., Hithnawi, A.: SOK: fully homomorphic encryption compilers. In: 42nd IEEE Symposium on Security and Privacy, SP 2021, San Francisco, CA, USA, 24–27 May 2021, pp. 1092–1108. IEEE (2021) 5. Triakosia, A., Rizomiliotis, P., Tserpes, K., Tonelli, C., Senni, V., Federici, F.: Homomorphic encryption in manufacturing compliance checks. In: Katsikas, S.K., Furnell, S. (eds.) Trust, Privacy and Security in Digital Business—19th International Conference, TrustBus 2022, Vienna, Austria, August 24, 2022, Proceedings, volume 13582 of Lecture Notes in Computer Science, pp. 81–95. Springer (2022)
|
|