26.08.2016 Views

trademark

2c2kIhh

2c2kIhh

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

7.0 Cryptographic Technologies for Big Data (cont.)<br />

7.2 Secure outsourcing of computation using fully<br />

homomorphic encryption<br />

7.2.1 Why?<br />

To enable outsourcing of computation while addressing security and privacy concerns.<br />

Consider a user who wants to send all sensitive data to a cloud: photos, medical<br />

records, financial records and so on. The user could send everything encrypted, but this<br />

wouldn’t be much use if they wanted the cloud to perform various computations on<br />

them, such as how much money was spent on movies in the past month.<br />

7.2.2 How?<br />

In a breakthrough result [Gen09] in 2009, Gentry constructed the first fully<br />

homomorphic encryption scheme. Such a scheme allows users to compute the<br />

encryption of arbitrary functions of the underlying plaintext. Earlier results [BGN05]<br />

constructed partially homomorphic encryption schemes. Gentry’s original construction<br />

of a fully homomorphic encryption (FHE) scheme used ideal lattices over a polynomial<br />

ring. Although lattice constructions are not terribly inefficient, the computational<br />

overhead for FHE is still far from practical. Research is ongoing to find simpler<br />

constructions [vDGHV10, CMNT11], efficiency improvements [GHS12b, GHS12a] and<br />

partially homomorphic schemes [NLV11].<br />

7.3 Limit features of homomorphic encryption for<br />

practical implementation<br />

7.3.1 Why?<br />

To balance computational cost and versatility when handling encrypted data. Although<br />

fully homomorphic encryption is an ideal solution in terms of versatility, the computation<br />

cost is still too high to be practical.<br />

7.3.2 How?<br />

By limiting features of homomorphic encryption (e.g., limiting only to additive<br />

homomorphic operations or to certain types of fundamental statistical computations,<br />

such as inner product) the practicality of homomorphic encryption schemes<br />

dramatically improve while retaining real-world applicability.<br />

CLOUD SECURITY ALLIANCE Big Data Working Group Guidance<br />

© Copyright 2016, Cloud Security Alliance. All rights reserved.<br />

38

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!