Privacy-Preserving Computation with Trusted Computing via Scramble-then-Compute

We consider privacy-preserving computation of big data using trusted computing primitives with limited private memory. Simply ensuring that the data remains encrypted outside the trusted computing environment is insufficient to preserve data privacy, for data movement observed during computation cou...

Full description

Bibliographic Details
Main Authors: Dang Hung, Dinh Tien Tuan Anh, Chang Ee-Chien, Ooi Beng Chin
Format: Article
Language:English
Published: Sciendo 2017-07-01
Series:Proceedings on Privacy Enhancing Technologies
Online Access:https://doi.org/10.1515/popets-2017-0026
id doaj-bb416b3ec44a490c83ce577d06c8ff54
record_format Article
spelling doaj-bb416b3ec44a490c83ce577d06c8ff542021-09-05T13:59:52ZengSciendoProceedings on Privacy Enhancing Technologies2299-09842017-07-0120173213810.1515/popets-2017-0026popets-2017-0026Privacy-Preserving Computation with Trusted Computing via Scramble-then-ComputeDang Hung0Dinh Tien Tuan Anh1Chang Ee-Chien2Ooi Beng Chin3National University of SingaporeNational University of SingaporeNational University of SingaporeNational University of SingaporeWe consider privacy-preserving computation of big data using trusted computing primitives with limited private memory. Simply ensuring that the data remains encrypted outside the trusted computing environment is insufficient to preserve data privacy, for data movement observed during computation could leak information. While it is possible to thwart such leakage using generic solution such as ORAM [42], designing efficient privacy-preserving algorithms is challenging. Besides computation efficiency, it is critical to keep trusted code bases lean, for large ones are unwieldy to vet and verify. In this paper, we advocate a simple approach wherein many basic algorithms (e.g., sorting) can be made privacy-preserving by adding a step that securely scrambles the data before feeding it to the original algorithms. We call this approach Scramble-then-Compute (StC), and give a sufficient condition whereby existing external memory algorithms can be made privacy-preserving via StC. This approach facilitates code-reuse, and its simplicity contributes to a smaller trusted code base. It is also general, allowing algorithm designers to leverage an extensive body of known efficient algorithms for better performance. Our experiments show that StC could offer up to 4.1× speedups over known, application-specific alternatives.https://doi.org/10.1515/popets-2017-0026
collection DOAJ
language English
format Article
sources DOAJ
author Dang Hung
Dinh Tien Tuan Anh
Chang Ee-Chien
Ooi Beng Chin
spellingShingle Dang Hung
Dinh Tien Tuan Anh
Chang Ee-Chien
Ooi Beng Chin
Privacy-Preserving Computation with Trusted Computing via Scramble-then-Compute
Proceedings on Privacy Enhancing Technologies
author_facet Dang Hung
Dinh Tien Tuan Anh
Chang Ee-Chien
Ooi Beng Chin
author_sort Dang Hung
title Privacy-Preserving Computation with Trusted Computing via Scramble-then-Compute
title_short Privacy-Preserving Computation with Trusted Computing via Scramble-then-Compute
title_full Privacy-Preserving Computation with Trusted Computing via Scramble-then-Compute
title_fullStr Privacy-Preserving Computation with Trusted Computing via Scramble-then-Compute
title_full_unstemmed Privacy-Preserving Computation with Trusted Computing via Scramble-then-Compute
title_sort privacy-preserving computation with trusted computing via scramble-then-compute
publisher Sciendo
series Proceedings on Privacy Enhancing Technologies
issn 2299-0984
publishDate 2017-07-01
description We consider privacy-preserving computation of big data using trusted computing primitives with limited private memory. Simply ensuring that the data remains encrypted outside the trusted computing environment is insufficient to preserve data privacy, for data movement observed during computation could leak information. While it is possible to thwart such leakage using generic solution such as ORAM [42], designing efficient privacy-preserving algorithms is challenging. Besides computation efficiency, it is critical to keep trusted code bases lean, for large ones are unwieldy to vet and verify. In this paper, we advocate a simple approach wherein many basic algorithms (e.g., sorting) can be made privacy-preserving by adding a step that securely scrambles the data before feeding it to the original algorithms. We call this approach Scramble-then-Compute (StC), and give a sufficient condition whereby existing external memory algorithms can be made privacy-preserving via StC. This approach facilitates code-reuse, and its simplicity contributes to a smaller trusted code base. It is also general, allowing algorithm designers to leverage an extensive body of known efficient algorithms for better performance. Our experiments show that StC could offer up to 4.1× speedups over known, application-specific alternatives.
url https://doi.org/10.1515/popets-2017-0026
work_keys_str_mv AT danghung privacypreservingcomputationwithtrustedcomputingviascramblethencompute
AT dinhtientuananh privacypreservingcomputationwithtrustedcomputingviascramblethencompute
AT changeechien privacypreservingcomputationwithtrustedcomputingviascramblethencompute
AT ooibengchin privacypreservingcomputationwithtrustedcomputingviascramblethencompute
_version_ 1717812848984326144