4.6 Article

Towards Secure Big Data Analysis via Fully Homomorphic Encryption Algorithms

Journal

ENTROPY
Volume 24, Issue 4, Pages -

Publisher

MDPI
DOI: 10.3390/e24040519

Keywords

big data; encryption algorithms; homomorphic encryption; privacy preserving; machine learning

Funding

  1. Ministry of Education in Saudi Arabia under the institutional funding committee at Najran University, Kingdom of Saudi Arabia [NU/IFC/ENT/01/013]

Ask authors/readers for more resources

Privacy-preserving techniques enable the use of private information without compromising privacy. Homomorphic encryption algorithms provide solutions for performing computations on encrypted data while preserving privacy. This paper provides a comprehensive overview of homomorphic encryption tools for Big Data analysis, discussing their applications and a security framework. The paper also highlights the limitations and tradeoffs of these algorithms, and compares popular homomorphic encryption tools.
Privacy-preserving techniques allow private information to be used without compromising privacy. Most encryption algorithms, such as the Advanced Encryption Standard (AES) algorithm, cannot perform computational operations on encrypted data without first applying the decryption process. Homomorphic encryption algorithms provide innovative solutions to support computations on encrypted data while preserving the content of private information. However, these algorithms have some limitations, such as computational cost as well as the need for modifications for each case study. In this paper, we present a comprehensive overview of various homomorphic encryption tools for Big Data analysis and their applications. We also discuss a security framework for Big Data analysis while preserving privacy using homomorphic encryption algorithms. We highlight the fundamental features and tradeoffs that should be considered when choosing the right approach for Big Data applications in practice. We then present a comparison of popular current homomorphic encryption tools with respect to these identified characteristics. We examine the implementation results of various homomorphic encryption toolkits and compare their performances. Finally, we highlight some important issues and research opportunities. We aim to anticipate how homomorphic encryption technology will be useful for secure Big Data processing, especially to improve the utility and performance of privacy-preserving machine learning.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available