| Literature DB >> 35455182 |
Rafik Hamza1,2, Alzubair Hassan3,4, Awad Ali5, Mohammed Bakri Bashir6,7, Samar M Alqhtani8, Tawfeeg Mohmmed Tawfeeg9, Adil Yousif5.
Abstract
Privacy-preserving techniques allow private information to be used without compromising privacy. Most encryption algorithms, such as the Advanced Encryption Standard (AES) algorithm, cannot perform computational operations on encrypted data without first applying the decryption process. Homomorphic encryption algorithms provide innovative solutions to support computations on encrypted data while preserving the content of private information. However, these algorithms have some limitations, such as computational cost as well as the need for modifications for each case study. In this paper, we present a comprehensive overview of various homomorphic encryption tools for Big Data analysis and their applications. We also discuss a security framework for Big Data analysis while preserving privacy using homomorphic encryption algorithms. We highlight the fundamental features and tradeoffs that should be considered when choosing the right approach for Big Data applications in practice. We then present a comparison of popular current homomorphic encryption tools with respect to these identified characteristics. We examine the implementation results of various homomorphic encryption toolkits and compare their performances. Finally, we highlight some important issues and research opportunities. We aim to anticipate how homomorphic encryption technology will be useful for secure Big Data processing, especially to improve the utility and performance of privacy-preserving machine learning.Entities:
Keywords: big data; encryption algorithms; homomorphic encryption; machine learning; privacy preserving
Year: 2022 PMID: 35455182 PMCID: PMC9024588 DOI: 10.3390/e24040519
Source DB: PubMed Journal: Entropy (Basel) ISSN: 1099-4300 Impact factor: 2.738
Figure 1Homomorphic encryption concept [13].
Figure 2Fully homomorphic encryption structure.
Figure 3Timeline of homomorphic encryption algorithms leading up to Gentry’s first fully homomorphic encryption.
Well-known partially homomorphic encryption algorithms’ properties.
| Scheme | Homomorphic | Operation |
|---|---|---|
|
|
| |
| RSA (Rivest et al., 1978) | 🗸 | |
| El-Gamal (ElGamal 1985) | 🗸 | |
| Paillier (Paillier 1999) | 🗸 | |
| DJ (Damgård and Jurik 2001) | 🗸 | |
| Galbraith (Galbraith 2002) | 🗸 | |
| KTX (Kawachi et al., 2007) | 🗸 |
Figure 4Fully Homomorphic Encryption Timeline.
Figure 5Private prediction and private training services.
Figure 6Use cases of homomorphic encryption for big data.
Homomorphic Encryption Toolkits.
| Library | Author & Schemes | Language | Initial Release | Last Major Update | Software License |
|---|---|---|---|---|---|
| HElib | Halevi, Shoup (IBM), BGV, CKKS | C++ | May 2013 | August 2019 | Apache v2.0 |
| HEAAN | Cheon, Kim, Kim, Song, CKKS | C++ | May 2016 | July 2021 | CC BY-NC 3.0 |
| PALISADE | NJIT, BFV, BGV, and CKKS | C++ | July 2017 | August 2021 | BSD 2-clause |
| TFHE | Chillotti et al., TFHE | C++ | April 2017 | February 2020 | Apache v2.0 |
| Microsoft SEAL | Microsoft, BFV, CKKS | C++ | December 2018 | November 2020 | MIT |
| NuFHE | NuCypher, GPU based TFHE | Python | October 2018 | July 2019 | GPL-3.0 |
| Lattigo | EPFL-LDS, BFV, CKKS | Go | December 2020 | July 2021 | Apache v2.0 |
Average of the execution time (in microseconds) for CKKS homomorphic encryption algorithms.
|
| Palisade | HELib | SEAL |
|---|---|---|---|
| 1024 | 585 | 482 | 257 |
| 1024 | 415 | 3159 | 10 |
| 2048 | 1173 | 997 | 479 |
| 2048 | 809 | 5104 | 19 |
| 4096 | 2753 | 2288 | 1926 |
| 4096 | 1432 | 14,279 | 72 |
| 8192 | 7538 | 4664 | 5688 |
| 8192 | 6038 | 48,960 | 290 |
| 16,384 | 23,183 | 12,581 | 19,344 |
| 16,384 | 13,776 | 183,254 | 1166 |
Figure 7Comparison results of the runtime of the encryption algorithm based on the dimension of the ciphertext.
Figure 8Comparison results of the runtime of the decryption algorithm based on the dimension of the ciphertext.