Abstract
Nowadays, cyber-attacks are targeting mobile devices, bank accounts, connected vehicles and cyber-physical systems. These attacks are becoming more complex and are raising safety problems when targeting physical environment. An efficient way to protect against these attacks is making several security actors collaborate in defining appropriate countermeasures. However, in practice, security actors refrain from collaborating to avoid sharing their proprietary security processes. These processes represent a critical knowledge as they reflect these actors brand images. In this work, we investigate the use of homomorphic encryption to define a privacy preserving framework for sharing processes between different cybersecurity actors and for providing confidential data analysis. We describe a high level design for a secure cloud platform managing encrypted data. The data analysis algorithms provided by the cloud platform are designed with our open source tool Cingulata, which enables designers to implement any data analysis function, compile it and run it on homomorphically encrypted data.
This work is sponsored by the H2020 European Research Council funding (Grant agreement ID: 700294, and ID: 727528) for the C3ISP and KONFIDO projects (http://www.c3isp.eu/, https://konfido-project.eu/).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
5 V big data challenges: Data Volume, Velocity, Variety, Veracity and Value.
References
Brakerski, Z.: Fully homomorphic encryption without modulus switching from classical GapSVP. In: Advances in Cryptology - CRYPTO 2012. Lecture Notes in Computer Science, pp. 868–886 (2012)
Brakerski, Z., Gentry, C., Vaikuntanathan, V.: (Leveled) fully homomorphic encryption without bootstrapping. In: Proceedings of the 3rd Innovations in Theoretical Computer Science Conference on - ITCS 2012 (2012)
Carpov, S., Dubrulle, P., Sirdey, R.: Armadillo: a compilation chain for privacy preserving applications. In: Proceedings of the 3rd International Workshop on Security in Cloud Computing, pp. 13–19 (2015)
Chadwick, D.W., Fan, W., Constantino, G., Lemos, R.D., Cerbo, F.D., Herwono, I., Mori, P., Sajjad, A., Wang, X.S., Manea, M.: A cloud-edge based data security architecture for sharing and analyzing cyber threat information. Future Gener. Comput. Syst. 102, 710–722 (2019)
Chillotti, I., Gama, N., Georgieva, M., Izabachène, M.: Faster fully homomorphic encryption: bootstrapping in less than 0.1 seconds. In: ASIACRYPT 2016, Part I, pp. 3–33. Springer (2016)
Fan, J., Vercauteren, F.: Somewhat practical fully homomorphic encryption. Cryptology ePrint Archive Report 2012/144 (2012). http://eprint.iacr.org/
Fau, S., Sirdey, R., Fontaine, C., Melchor, C.A., Gogniat, G.: Towards practical program execution over fully homomorphic encryption schemes. In: 3PGCIC, pp. 284–290 (2013)
Fung, C.J., Boutaba, B.: Design and management of collaborative intrusion detection networks. In: IFIP/IEEE International Symposium on Integrated Network Management (2013)
Chillotti, I., Gama, N., Georgieva, M., Izabachène, M.: Improving TFHE: faster packed homomorphic operations and efficient circuit bootstrapping. In: Proceedings of ASICACRYPT 2017. LNCS, vol. 10624, pp. 377–408. Springer (2017)
Lidz, C.W.: Informed Consent: A Study of Decision Making in Psychiatry. Guilford, New York (1984)
McAfee: Common Event Format - McAfee, September 2018. https://kc.mcafee.com/resources/sites/MCAFEE/content
Melchor, C.A., Fau, S., Fontaine, C., Gogniat, G., Sirdey, R.: Recent advances in homomorphic encryption: a possible future for signal processing in the encrypted domain. IEEE Sig. Process. Mag. 30(2), 108–117 (2013)
Nabeel, M., Shang, N., Bertino, E.: Efficient privacy preserving content based publish subscribe systems. In: Proceedings of the 17th ACM Symposium on Access Control Models and Technologies (SACMAT 2012). ACM, New York (2012)
Trimintzios, P., Gavrila, R.: On national and international cyber security exercises: survey, analysis and recommendations. ENISA European Union Agency for Cybersecurity (2012). http://www.enisa.europa.eu/activities/Resilience-and-CIIP/cyber-crisis-cooperation/cce/cyber-exercises/exercise-survey2012
Pires, R., Pasin, M., Felber, P., Fetzer, C.: Secure content-based routing using Intel software guard extensions. In: Proceedings of the 17th International Middleware Conference (Middleware 2016). ACM, New York (2016)
Richardson, E.L., Weinberger, C.W.: Records, computers, and the rights of citizens. U.S. Department of Health, Education, and Welfare (1973)
C.L. team: Homomorphic encryption technology. github (2018)
UNISS: Cybersecurity policies and critical infrastructure protection (2018). https://uniss.org/cyber-security-policies-and-critical-infrastructure-protection/
NISP WG2: NISP WG2 plenary report information sharing and incident notification. Network and Information Security Group (2013)
eHealth Acceptance Factors and KONFIDO Adaptation Strategy (2018). https://konfido-project.eu
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Nguyen, TH., Herbert, V., Carpov, S. (2020). On the Design of a Privacy Preserving Collaborative Platform for Cybersecurity. In: Le Thi, H., Le, H., Pham Dinh, T., Nguyen, N. (eds) Advanced Computational Methods for Knowledge Engineering. ICCSAMA 2019. Advances in Intelligent Systems and Computing, vol 1121. Springer, Cham. https://doi.org/10.1007/978-3-030-38364-0_30
Download citation
DOI: https://doi.org/10.1007/978-3-030-38364-0_30
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-38363-3
Online ISBN: 978-3-030-38364-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)