30
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: not found

      On the Trade-Offs of Combining Multiple Secure Processing Primitives for Data Analytics

      chapter-article

      Read this article at

      ScienceOpenPublisherPMC
      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Cloud Computing services for data analytics are increasingly being sought by companies to extract value from large quantities of information. However, processing data from individuals and companies in third-party infrastructures raises several privacy concerns. To this end, different secure analytics techniques and systems have recently emerged. These initial proposals leverage specific cryptographic primitives lacking generality and thus having their application restricted to particular application scenarios. In this work, we contribute to this thriving body of knowledge by combining two complementary approaches to process sensitive data.

          We present SafeSpark, a secure data analytics framework that enables the combination of different cryptographic processing techniques with hardware-based protected environments for privacy-preserving data storage and processing. SafeSpark is modular and extensible therefore adapting to data analytics applications with different performance, security and functionality requirements.

          We have implemented a SafeSpark’s prototype based on Spark SQL and Intel SGX hardware. It has been evaluated with the TPC-DS Benchmark under three scenarios using different cryptographic primitives and secure hardware configurations. These scenarios provide a particular set of security guarantees and yield distinct performance impact, with overheads ranging from as low as 10% to an acceptable 300% when compared to an insecure vanilla deployment of Apache Spark.

          Related collections

          Most cited references8

          • Record: found
          • Abstract: not found
          • Article: not found

          MPFR

            Bookmark
            • Record: found
            • Abstract: not found
            • Conference Proceedings: not found

            Public-key cryptosystems based on composite degree residuosity classes

              Bookmark
              • Record: found
              • Abstract: not found
              • Conference Proceedings: not found

              Order-preserving symmetric encryption.

                Bookmark

                Author and article information

                Contributors
                anne.remke@uni-muenster.de
                valerio.schiavoni@unine.ch
                hugo.a.carvalho@inesctec.pt
                daniel.c.cruz@inesctec.pt
                rogerio.a.pontes@inesctec.pt
                joao.t.paulo@inesctec.pt
                rui.oliveira@inesctec.pt
                Journal
                978-3-030-50323-9
                10.1007/978-3-030-50323-9
                Distributed Applications and Interoperable Systems
                Distributed Applications and Interoperable Systems
                20th IFIP WG 6.1 International Conference, DAIS 2020, Held as Part of the 15th International Federated Conference on Distributed Computing Techniques, DisCoTec 2020, Valletta, Malta, June 15–19, 2020, Proceedings
                978-3-030-50322-2
                978-3-030-50323-9
                15 May 2020
                : 12135
                : 3-20
                Affiliations
                [8 ]GRID grid.5949.1, ISNI 0000 0001 2172 9288, University of Münster, ; Münster, Germany
                [9 ]GRID grid.10711.36, ISNI 0000 0001 2297 7718, University of Neuchâtel, ; Neuchâtel, Switzerland
                GRID grid.10328.38, ISNI 0000 0001 2159 175X, INESC TEC and Universidade do Minho, ; Braga, Portugal
                Article
                1
                10.1007/978-3-030-50323-9_1
                7276258
                f9f6a59b-bbbd-4a01-a6b8-20a2ebd6054b
                © IFIP International Federation for Information Processing 2020

                This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic.

                History
                Categories
                Article
                Custom metadata
                © IFIP International Federation for Information Processing 2020

                data analytics,privacy,trusted hardware
                data analytics, privacy, trusted hardware

                Comments

                Comment on this article