PDPHE: Personal Data Protection for Trans-Border Transmission Based on Homomorphic Encryption
-
Published:2024-05-16
Issue:10
Volume:13
Page:1959
-
ISSN:2079-9292
-
Container-title:Electronics
-
language:en
-
Short-container-title:Electronics
Author:
Liu Yan1ORCID, Yang Changshui1, Liu Qiang1, Xu Mudi1, Zhang Chi1, Cheng Lihong2, Wang Wenyong1
Affiliation:
1. Trusted Trans-Border Dataspace Group, Department of Computer Science and Engineering, Macau University of Science and Technology, Avenida Wai Long, Taipa, Macau 999078, China 2. Department of Foreign Language, Dalian Jiaotong University, 794 Huanghe Road, Shahekou District, Dalian 116028, China
Abstract
In the digital age, data transmission has become a key component of globalization and international cooperation. However, it faces several challenges in protecting the privacy and security of data, such as the risk of information disclosure on third-party platforms. Moreover, there are few solutions for personal data protection in cross-border transmission scenarios due to the difficulty of handling sensitive information between different countries and regions. In this paper, we propose an approach, personal data protection based on homomorphic encryption (PDPHE), to creatively apply the privacy computing technology homomorphic encryption (HE) to cross-border personal data protection. Specifically, PDPHE reconstructs the classical full homomorphic encryption (FHE) algorithm, DGHV, by adding support for multi-bit encryption and security level classification to ensure consistency with current data protection regulations. Then, PDPHE applies the reconstructed algorithm to the novel cross-border data protection scenario. To evaluate PDPHE in actual cross-border data transfer scenarios, we construct a prototype model based on PDPHE and manually construct a data corpus called PDPBench. Our evaluation results on PDPBench demonstrate that PDPHE cannot only effectively solve privacy protection issues in cross-border data transmission but also promote international data exchange and cooperation, bringing significant improvements for personal data protection during cross-border data sharing.
Funder
Fundo para o Desenvolvimento Tecnológico das Telecomunicações
Reference52 articles.
1. How the GDPR Will Change the World;Albrecht;Eur. Data Prot. Law Rev.,2016 2. Gentry, C. (2009). A Fully Homomorphic Encryption Scheme. [Ph.D. Thesis, Stanford University]. 3. Yao, A.C.C. (1986, January 27–29). How to generate and exchange secrets. Proceedings of the 27th Annual Symposium on Foundations of Computer Science (SFCS 1986), IEEE, Toronto, ON, Canada. 4. Cheon, J.H., Kim, A., Kim, M., and Song, Y. (2017). Advances in Cryptology—ASIACRYPT 2017, Proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, 3–7 December 2017, Springer International Publishing. 5. Mohassel, P., and Zhang, Y. (2017, January 22–26). Secureml: A system for scalable privacy-preserving machine learning. Proceedings of the 2017 IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA.
|
|