Cargando…

Towards Secure Big Data Analysis via Fully Homomorphic Encryption Algorithms

Privacy-preserving techniques allow private information to be used without compromising privacy. Most encryption algorithms, such as the Advanced Encryption Standard (AES) algorithm, cannot perform computational operations on encrypted data without first applying the decryption process. Homomorphic...

Descripción completa

Detalles Bibliográficos
Autores principales: Hamza, Rafik, Hassan, Alzubair, Ali, Awad, Bashir, Mohammed Bakri, Alqhtani, Samar M., Tawfeeg, Tawfeeg Mohmmed, Yousif, Adil
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9024588/
https://www.ncbi.nlm.nih.gov/pubmed/35455182
http://dx.doi.org/10.3390/e24040519
_version_ 1784690635921424384
author Hamza, Rafik
Hassan, Alzubair
Ali, Awad
Bashir, Mohammed Bakri
Alqhtani, Samar M.
Tawfeeg, Tawfeeg Mohmmed
Yousif, Adil
author_facet Hamza, Rafik
Hassan, Alzubair
Ali, Awad
Bashir, Mohammed Bakri
Alqhtani, Samar M.
Tawfeeg, Tawfeeg Mohmmed
Yousif, Adil
author_sort Hamza, Rafik
collection PubMed
description Privacy-preserving techniques allow private information to be used without compromising privacy. Most encryption algorithms, such as the Advanced Encryption Standard (AES) algorithm, cannot perform computational operations on encrypted data without first applying the decryption process. Homomorphic encryption algorithms provide innovative solutions to support computations on encrypted data while preserving the content of private information. However, these algorithms have some limitations, such as computational cost as well as the need for modifications for each case study. In this paper, we present a comprehensive overview of various homomorphic encryption tools for Big Data analysis and their applications. We also discuss a security framework for Big Data analysis while preserving privacy using homomorphic encryption algorithms. We highlight the fundamental features and tradeoffs that should be considered when choosing the right approach for Big Data applications in practice. We then present a comparison of popular current homomorphic encryption tools with respect to these identified characteristics. We examine the implementation results of various homomorphic encryption toolkits and compare their performances. Finally, we highlight some important issues and research opportunities. We aim to anticipate how homomorphic encryption technology will be useful for secure Big Data processing, especially to improve the utility and performance of privacy-preserving machine learning.
format Online
Article
Text
id pubmed-9024588
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-90245882022-04-23 Towards Secure Big Data Analysis via Fully Homomorphic Encryption Algorithms Hamza, Rafik Hassan, Alzubair Ali, Awad Bashir, Mohammed Bakri Alqhtani, Samar M. Tawfeeg, Tawfeeg Mohmmed Yousif, Adil Entropy (Basel) Article Privacy-preserving techniques allow private information to be used without compromising privacy. Most encryption algorithms, such as the Advanced Encryption Standard (AES) algorithm, cannot perform computational operations on encrypted data without first applying the decryption process. Homomorphic encryption algorithms provide innovative solutions to support computations on encrypted data while preserving the content of private information. However, these algorithms have some limitations, such as computational cost as well as the need for modifications for each case study. In this paper, we present a comprehensive overview of various homomorphic encryption tools for Big Data analysis and their applications. We also discuss a security framework for Big Data analysis while preserving privacy using homomorphic encryption algorithms. We highlight the fundamental features and tradeoffs that should be considered when choosing the right approach for Big Data applications in practice. We then present a comparison of popular current homomorphic encryption tools with respect to these identified characteristics. We examine the implementation results of various homomorphic encryption toolkits and compare their performances. Finally, we highlight some important issues and research opportunities. We aim to anticipate how homomorphic encryption technology will be useful for secure Big Data processing, especially to improve the utility and performance of privacy-preserving machine learning. MDPI 2022-04-06 /pmc/articles/PMC9024588/ /pubmed/35455182 http://dx.doi.org/10.3390/e24040519 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Hamza, Rafik
Hassan, Alzubair
Ali, Awad
Bashir, Mohammed Bakri
Alqhtani, Samar M.
Tawfeeg, Tawfeeg Mohmmed
Yousif, Adil
Towards Secure Big Data Analysis via Fully Homomorphic Encryption Algorithms
title Towards Secure Big Data Analysis via Fully Homomorphic Encryption Algorithms
title_full Towards Secure Big Data Analysis via Fully Homomorphic Encryption Algorithms
title_fullStr Towards Secure Big Data Analysis via Fully Homomorphic Encryption Algorithms
title_full_unstemmed Towards Secure Big Data Analysis via Fully Homomorphic Encryption Algorithms
title_short Towards Secure Big Data Analysis via Fully Homomorphic Encryption Algorithms
title_sort towards secure big data analysis via fully homomorphic encryption algorithms
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9024588/
https://www.ncbi.nlm.nih.gov/pubmed/35455182
http://dx.doi.org/10.3390/e24040519
work_keys_str_mv AT hamzarafik towardssecurebigdataanalysisviafullyhomomorphicencryptionalgorithms
AT hassanalzubair towardssecurebigdataanalysisviafullyhomomorphicencryptionalgorithms
AT aliawad towardssecurebigdataanalysisviafullyhomomorphicencryptionalgorithms
AT bashirmohammedbakri towardssecurebigdataanalysisviafullyhomomorphicencryptionalgorithms
AT alqhtanisamarm towardssecurebigdataanalysisviafullyhomomorphicencryptionalgorithms
AT tawfeegtawfeegmohmmed towardssecurebigdataanalysisviafullyhomomorphicencryptionalgorithms
AT yousifadil towardssecurebigdataanalysisviafullyhomomorphicencryptionalgorithms