Cargando…
Towards Secure Big Data Analysis via Fully Homomorphic Encryption Algorithms
Privacy-preserving techniques allow private information to be used without compromising privacy. Most encryption algorithms, such as the Advanced Encryption Standard (AES) algorithm, cannot perform computational operations on encrypted data without first applying the decryption process. Homomorphic...
Autores principales: | , , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9024588/ https://www.ncbi.nlm.nih.gov/pubmed/35455182 http://dx.doi.org/10.3390/e24040519 |
_version_ | 1784690635921424384 |
---|---|
author | Hamza, Rafik Hassan, Alzubair Ali, Awad Bashir, Mohammed Bakri Alqhtani, Samar M. Tawfeeg, Tawfeeg Mohmmed Yousif, Adil |
author_facet | Hamza, Rafik Hassan, Alzubair Ali, Awad Bashir, Mohammed Bakri Alqhtani, Samar M. Tawfeeg, Tawfeeg Mohmmed Yousif, Adil |
author_sort | Hamza, Rafik |
collection | PubMed |
description | Privacy-preserving techniques allow private information to be used without compromising privacy. Most encryption algorithms, such as the Advanced Encryption Standard (AES) algorithm, cannot perform computational operations on encrypted data without first applying the decryption process. Homomorphic encryption algorithms provide innovative solutions to support computations on encrypted data while preserving the content of private information. However, these algorithms have some limitations, such as computational cost as well as the need for modifications for each case study. In this paper, we present a comprehensive overview of various homomorphic encryption tools for Big Data analysis and their applications. We also discuss a security framework for Big Data analysis while preserving privacy using homomorphic encryption algorithms. We highlight the fundamental features and tradeoffs that should be considered when choosing the right approach for Big Data applications in practice. We then present a comparison of popular current homomorphic encryption tools with respect to these identified characteristics. We examine the implementation results of various homomorphic encryption toolkits and compare their performances. Finally, we highlight some important issues and research opportunities. We aim to anticipate how homomorphic encryption technology will be useful for secure Big Data processing, especially to improve the utility and performance of privacy-preserving machine learning. |
format | Online Article Text |
id | pubmed-9024588 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-90245882022-04-23 Towards Secure Big Data Analysis via Fully Homomorphic Encryption Algorithms Hamza, Rafik Hassan, Alzubair Ali, Awad Bashir, Mohammed Bakri Alqhtani, Samar M. Tawfeeg, Tawfeeg Mohmmed Yousif, Adil Entropy (Basel) Article Privacy-preserving techniques allow private information to be used without compromising privacy. Most encryption algorithms, such as the Advanced Encryption Standard (AES) algorithm, cannot perform computational operations on encrypted data without first applying the decryption process. Homomorphic encryption algorithms provide innovative solutions to support computations on encrypted data while preserving the content of private information. However, these algorithms have some limitations, such as computational cost as well as the need for modifications for each case study. In this paper, we present a comprehensive overview of various homomorphic encryption tools for Big Data analysis and their applications. We also discuss a security framework for Big Data analysis while preserving privacy using homomorphic encryption algorithms. We highlight the fundamental features and tradeoffs that should be considered when choosing the right approach for Big Data applications in practice. We then present a comparison of popular current homomorphic encryption tools with respect to these identified characteristics. We examine the implementation results of various homomorphic encryption toolkits and compare their performances. Finally, we highlight some important issues and research opportunities. We aim to anticipate how homomorphic encryption technology will be useful for secure Big Data processing, especially to improve the utility and performance of privacy-preserving machine learning. MDPI 2022-04-06 /pmc/articles/PMC9024588/ /pubmed/35455182 http://dx.doi.org/10.3390/e24040519 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Hamza, Rafik Hassan, Alzubair Ali, Awad Bashir, Mohammed Bakri Alqhtani, Samar M. Tawfeeg, Tawfeeg Mohmmed Yousif, Adil Towards Secure Big Data Analysis via Fully Homomorphic Encryption Algorithms |
title | Towards Secure Big Data Analysis via Fully Homomorphic Encryption Algorithms |
title_full | Towards Secure Big Data Analysis via Fully Homomorphic Encryption Algorithms |
title_fullStr | Towards Secure Big Data Analysis via Fully Homomorphic Encryption Algorithms |
title_full_unstemmed | Towards Secure Big Data Analysis via Fully Homomorphic Encryption Algorithms |
title_short | Towards Secure Big Data Analysis via Fully Homomorphic Encryption Algorithms |
title_sort | towards secure big data analysis via fully homomorphic encryption algorithms |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9024588/ https://www.ncbi.nlm.nih.gov/pubmed/35455182 http://dx.doi.org/10.3390/e24040519 |
work_keys_str_mv | AT hamzarafik towardssecurebigdataanalysisviafullyhomomorphicencryptionalgorithms AT hassanalzubair towardssecurebigdataanalysisviafullyhomomorphicencryptionalgorithms AT aliawad towardssecurebigdataanalysisviafullyhomomorphicencryptionalgorithms AT bashirmohammedbakri towardssecurebigdataanalysisviafullyhomomorphicencryptionalgorithms AT alqhtanisamarm towardssecurebigdataanalysisviafullyhomomorphicencryptionalgorithms AT tawfeegtawfeegmohmmed towardssecurebigdataanalysisviafullyhomomorphicencryptionalgorithms AT yousifadil towardssecurebigdataanalysisviafullyhomomorphicencryptionalgorithms |