kth.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Sharing without Showing: Secure Cloud Analytics with Trusted Execution Environments
KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Theoretical Computer Science, TCS.ORCID iD: 0009-0006-5139-8110
KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Theoretical Computer Science, TCS.ORCID iD: 0000-0002-3656-1614
KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Theoretical Computer Science, TCS.ORCID iD: 0000-0001-6005-5992
2024 (English)In: Proceedings - 2024 IEEE Secure Development Conference, SecDev 2024, Institute of Electrical and Electronics Engineers (IEEE) , 2024, p. 105-116Conference paper, Published paper (Refereed)
Abstract [en]

Many applications benefit from computations over the data of multiple users while preserving confidentiality. We present a solution where multiple mutually distrusting users' data can be aggregated with an acceptable overhead, while allowing users to be added to the system at any time without re-encrypting data. Our solution to this problem is to use a Trusted Execution Environment (Intel SGX) for the computation, while the confidential data is encrypted with the data owner's key and can be stored anywhere, without trust in the service provider. We do not require the user to be online during the computation phase and do not require a trusted party to store data in plain text. Still, the computation can only be carried out if the data owner explicitly has given permission.Experiments using common functions such as the sum, least square fit, histogram, and SVM classification, exhibit an average overhead of 1.6×. In addition to these performance experiments, we present a use case for computing the distributions of taxis in a city without revealing the position of any other taxi to the other parties.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE) , 2024. p. 105-116
Keywords [en]
Confidential computation, Multi-party computation, SGX, Trusted execution platform
National Category
Computer Sciences Other Computer and Information Science Computer Engineering
Identifiers
URN: urn:nbn:se:kth:diva-357693DOI: 10.1109/SecDev61143.2024.00016ISI: 001348939600011Scopus ID: 2-s2.0-85210578964OAI: oai:DiVA.org:kth-357693DiVA, id: diva2:1920800
Conference
2024 IEEE Secure Development Conference, SecDev 2024, Pittsburgh, United States of America, Oct 7 2024 - Oct 9 2024
Note

Part of ISBN 979-8-3503-9193-0

QC 20241217

Available from: 2024-12-12 Created: 2024-12-12 Last updated: 2024-12-17Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Birgersson, MarcusArtho, CyrilleBalliu, Musard

Search in DiVA

By author/editor
Birgersson, MarcusArtho, CyrilleBalliu, Musard
By organisation
Theoretical Computer Science, TCS
Computer SciencesOther Computer and Information ScienceComputer Engineering

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 11 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf