trademark
2c2kIhh
2c2kIhh
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
7.0 Cryptographic Technologies for Big Data (cont.)<br />
7.2 Secure outsourcing of computation using fully<br />
homomorphic encryption<br />
7.2.1 Why?<br />
To enable outsourcing of computation while addressing security and privacy concerns.<br />
Consider a user who wants to send all sensitive data to a cloud: photos, medical<br />
records, financial records and so on. The user could send everything encrypted, but this<br />
wouldn’t be much use if they wanted the cloud to perform various computations on<br />
them, such as how much money was spent on movies in the past month.<br />
7.2.2 How?<br />
In a breakthrough result [Gen09] in 2009, Gentry constructed the first fully<br />
homomorphic encryption scheme. Such a scheme allows users to compute the<br />
encryption of arbitrary functions of the underlying plaintext. Earlier results [BGN05]<br />
constructed partially homomorphic encryption schemes. Gentry’s original construction<br />
of a fully homomorphic encryption (FHE) scheme used ideal lattices over a polynomial<br />
ring. Although lattice constructions are not terribly inefficient, the computational<br />
overhead for FHE is still far from practical. Research is ongoing to find simpler<br />
constructions [vDGHV10, CMNT11], efficiency improvements [GHS12b, GHS12a] and<br />
partially homomorphic schemes [NLV11].<br />
7.3 Limit features of homomorphic encryption for<br />
practical implementation<br />
7.3.1 Why?<br />
To balance computational cost and versatility when handling encrypted data. Although<br />
fully homomorphic encryption is an ideal solution in terms of versatility, the computation<br />
cost is still too high to be practical.<br />
7.3.2 How?<br />
By limiting features of homomorphic encryption (e.g., limiting only to additive<br />
homomorphic operations or to certain types of fundamental statistical computations,<br />
such as inner product) the practicality of homomorphic encryption schemes<br />
dramatically improve while retaining real-world applicability.<br />
CLOUD SECURITY ALLIANCE Big Data Working Group Guidance<br />
© Copyright 2016, Cloud Security Alliance. All rights reserved.<br />
38