HEDA

Author:

Ren Xuanle1,Su Le1,Gu Zhen1,Wang Sheng1,Li Feifei1,Xie Yuan1,Bian Song2,Li Chao3,Zhang Fan3

Affiliation:

1. Alibaba Group

2. Kyoto University, Alibaba Group

3. Zhejiang University

Abstract

Recent years have witnessed the rapid development of the encrypted database, due to the increasing number of data privacy breaches and the corresponding laws and regulations that caused millions of dollars in loss. These encrypted databases may rely on different techniques, such as cryptographic primitives and trusted execution environments. In this work, we investigate the feasibility of utilizing fully homomorphic encryption (FHE) to support unbounded database aggregation queries, which typically involve comparisons as filtering predicates and a final aggregation. These operators are theoretically supported by FHE, but need careful algorithm design to maximize the efficiency and have not been explored before. We creatively use two types of FHE schemes, i.e. , one for numerical and one for binary value, to enjoy their advantages respectively. To bridge the encrypted values between these two schemes for seamless query processing without client-server interaction, we propose a novel ciphertext transformation mechanism, which is of independent research interest, to close this gap. We further implement our system and test it over three TPC-H queries and a query over a real social media e-commerce database. Evaluation results show that, to process an aggregation query over 8 k encrypted rows takes about 430 seconds. Although it is slower than plaintext processing in magnitudes and still has much room for improvement, as the very first work in this domain, our system demonstrates the feasibility of using FHE to process OLAP queries.

Publisher

Association for Computing Machinery (ACM)

Subject

General Earth and Planetary Sciences,Water Science and Technology,Geography, Planning and Development

Reference64 articles.

1. Azure SQL Database Always Encrypted

2. Arvind Arasu , Ken Eguro , Manas Joglekar , Raghav Kaushik , Donald Kossmann , and Ravi Ramamurthy . 2015 . Transaction processing on confidential data using cipherbase . In 2015 IEEE 31st International Conference on Data Engineering. IEEE. Arvind Arasu, Ken Eguro, Manas Joglekar, Raghav Kaushik, Donald Kossmann, and Ravi Ramamurthy. 2015. Transaction processing on confidential data using cipherbase. In 2015 IEEE 31st International Conference on Data Engineering. IEEE.

3. AWS. 2022. Amazon Aurora. https://aws.amazon.com/rds/aurora/?c=db&sec=srv. Accessed: 2022-12-05. AWS. 2022. Amazon Aurora. https://aws.amazon.com/rds/aurora/?c=db&sec=srv. Accessed: 2022-12-05.

4. Sumeet Bajaj and Radu Sion . 2013. TrustedDB: A trusted hardware-based database with privacy and data confidentiality . IEEE Transactions on Knowledge and Data Engineering ( 2013 ). Sumeet Bajaj and Radu Sion. 2013. TrustedDB: A trusted hardware-based database with privacy and data confidentiality. IEEE Transactions on Knowledge and Data Engineering (2013).

5. Johes Bater , Gregory Elliott , Craig Eggen , Satyender Goel , Abel Kho , and Jennie Rogers . 2016 . SMCQL: Secure querying for federated databases. arXiv preprint arXiv:1606.06808 (2016). Johes Bater, Gregory Elliott, Craig Eggen, Satyender Goel, Abel Kho, and Jennie Rogers. 2016. SMCQL: Secure querying for federated databases. arXiv preprint arXiv:1606.06808 (2016).

Cited by 9 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. FreqyWM: Frequency Watermarking for the New Data Economy;2024 IEEE 40th International Conference on Data Engineering (ICDE);2024-05-13

2. An Efficient and Scalable FHE-Based PDQ Scheme: Utilizing FFT to Design a Low Multiplication Depth Large-Integer Comparison Algorithm;IEEE Transactions on Information Forensics and Security;2024

3. IPEQ: Querying Multi-attribute Records with Inner Product Encryption;IFIP Advances in Information and Communication Technology;2024

4. Veil: A Storage and Communication Efficient Volume-Hiding Algorithm;Proceedings of the ACM on Management of Data;2023-12-08

5. TEE-based General-purpose Computational Backend for Secure Delegated Data Processing;Proceedings of the ACM on Management of Data;2023-12-08

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3