Privacy-Preserving Computation with Trusted Computing via Scramble-then-Compute
We consider privacy-preserving computation of big data using trusted computing primitives with limited private memory. Simply ensuring that the data remains encrypted outside the trusted computing environment is insufficient to preserve data privacy, for data movement observed during computation cou...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Sciendo
2017-07-01
|
Series: | Proceedings on Privacy Enhancing Technologies |
Online Access: | https://doi.org/10.1515/popets-2017-0026 |
id |
doaj-bb416b3ec44a490c83ce577d06c8ff54 |
---|---|
record_format |
Article |
spelling |
doaj-bb416b3ec44a490c83ce577d06c8ff542021-09-05T13:59:52ZengSciendoProceedings on Privacy Enhancing Technologies2299-09842017-07-0120173213810.1515/popets-2017-0026popets-2017-0026Privacy-Preserving Computation with Trusted Computing via Scramble-then-ComputeDang Hung0Dinh Tien Tuan Anh1Chang Ee-Chien2Ooi Beng Chin3National University of SingaporeNational University of SingaporeNational University of SingaporeNational University of SingaporeWe consider privacy-preserving computation of big data using trusted computing primitives with limited private memory. Simply ensuring that the data remains encrypted outside the trusted computing environment is insufficient to preserve data privacy, for data movement observed during computation could leak information. While it is possible to thwart such leakage using generic solution such as ORAM [42], designing efficient privacy-preserving algorithms is challenging. Besides computation efficiency, it is critical to keep trusted code bases lean, for large ones are unwieldy to vet and verify. In this paper, we advocate a simple approach wherein many basic algorithms (e.g., sorting) can be made privacy-preserving by adding a step that securely scrambles the data before feeding it to the original algorithms. We call this approach Scramble-then-Compute (StC), and give a sufficient condition whereby existing external memory algorithms can be made privacy-preserving via StC. This approach facilitates code-reuse, and its simplicity contributes to a smaller trusted code base. It is also general, allowing algorithm designers to leverage an extensive body of known efficient algorithms for better performance. Our experiments show that StC could offer up to 4.1× speedups over known, application-specific alternatives.https://doi.org/10.1515/popets-2017-0026 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Dang Hung Dinh Tien Tuan Anh Chang Ee-Chien Ooi Beng Chin |
spellingShingle |
Dang Hung Dinh Tien Tuan Anh Chang Ee-Chien Ooi Beng Chin Privacy-Preserving Computation with Trusted Computing via Scramble-then-Compute Proceedings on Privacy Enhancing Technologies |
author_facet |
Dang Hung Dinh Tien Tuan Anh Chang Ee-Chien Ooi Beng Chin |
author_sort |
Dang Hung |
title |
Privacy-Preserving Computation with Trusted Computing via Scramble-then-Compute |
title_short |
Privacy-Preserving Computation with Trusted Computing via Scramble-then-Compute |
title_full |
Privacy-Preserving Computation with Trusted Computing via Scramble-then-Compute |
title_fullStr |
Privacy-Preserving Computation with Trusted Computing via Scramble-then-Compute |
title_full_unstemmed |
Privacy-Preserving Computation with Trusted Computing via Scramble-then-Compute |
title_sort |
privacy-preserving computation with trusted computing via scramble-then-compute |
publisher |
Sciendo |
series |
Proceedings on Privacy Enhancing Technologies |
issn |
2299-0984 |
publishDate |
2017-07-01 |
description |
We consider privacy-preserving computation of big data using trusted computing primitives with limited private memory. Simply ensuring that the data remains encrypted outside the trusted computing environment is insufficient to preserve data privacy, for data movement observed during computation could leak information. While it is possible to thwart such leakage using generic solution such as ORAM [42], designing efficient privacy-preserving algorithms is challenging. Besides computation efficiency, it is critical to keep trusted code bases lean, for large ones are unwieldy to vet and verify. In this paper, we advocate a simple approach wherein many basic algorithms (e.g., sorting) can be made privacy-preserving by adding a step that securely scrambles the data before feeding it to the original algorithms. We call this approach Scramble-then-Compute (StC), and give a sufficient condition whereby existing external memory algorithms can be made privacy-preserving via StC. This approach facilitates code-reuse, and its simplicity contributes to a smaller trusted code base. It is also general, allowing algorithm designers to leverage an extensive body of known efficient algorithms for better performance. Our experiments show that StC could offer up to 4.1× speedups over known, application-specific alternatives. |
url |
https://doi.org/10.1515/popets-2017-0026 |
work_keys_str_mv |
AT danghung privacypreservingcomputationwithtrustedcomputingviascramblethencompute AT dinhtientuananh privacypreservingcomputationwithtrustedcomputingviascramblethencompute AT changeechien privacypreservingcomputationwithtrustedcomputingviascramblethencompute AT ooibengchin privacypreservingcomputationwithtrustedcomputingviascramblethencompute |
_version_ |
1717812848984326144 |