TEE-Graph: efficient privacy and ownership protection for cloud-based graph spectral analysis.

IF 2.4 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Frontiers in Big Data Pub Date : 2023-11-30 eCollection Date: 2023-01-01 DOI:10.3389/fdata.2023.1296469
A K M Mubashwir Alam, Keke Chen
{"title":"TEE-Graph: efficient privacy and ownership protection for cloud-based graph spectral analysis.","authors":"A K M Mubashwir Alam, Keke Chen","doi":"10.3389/fdata.2023.1296469","DOIUrl":null,"url":null,"abstract":"<p><strong>Introduction: </strong>Big graphs like social network user interactions and customer rating matrices require significant computing resources to maintain. Data owners are now using public cloud resources for storage and computing elasticity. However, existing solutions do not fully address the privacy and ownership protection needs of the key involved parties: data contributors and the data owner who collects data from contributors.</p><p><strong>Methods: </strong>We propose a Trusted Execution Environment (TEE) based solution: TEE-Graph for graph spectral analysis of outsourced graphs in the cloud. TEEs are new CPU features that can enable much more efficient confidential computing solutions than traditional software-based cryptographic ones. Our approach has several unique contributions compared to existing confidential graph analysis approaches. (1) It utilizes the unique TEE properties to ensure contributors' new privacy needs, e.g., the right of revocation for shared data. (2) It implements efficient access-pattern protection with a differentially private data encoding method. And (3) it implements TEE-based special analysis algorithms: the Lanczos method and the Nystrom method for efficiently handling big graphs and protecting confidentiality from compromised cloud providers.</p><p><strong>Results: </strong>The TEE-Graph approach is much more efficient than software crypto approaches and also immune to access-pattern-based attacks. Compared with the best-known software crypto approach for graph spectral analysis, PrivateGraph, we have seen that TEE-Graph has 10<sup>3</sup>-10<sup>5</sup> times lower computation, storage, and communication costs. Furthermore, the proposed access-pattern protection method incurs only about 10%-25% of the overall computation cost.</p><p><strong>Discussion: </strong>Our experimentation showed that TEE-Graph performs significantly better and has lower costs than typical software approaches. It also addresses the unique ownership and access-pattern issues that other TEE-related graph analytics approaches have not sufficiently studied. The proposed approach can be extended to other graph analytics problems with strong ownership and access-pattern protection.</p>","PeriodicalId":52859,"journal":{"name":"Frontiers in Big Data","volume":"6 ","pages":"1296469"},"PeriodicalIF":2.4000,"publicationDate":"2023-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10724017/pdf/","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Frontiers in Big Data","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3389/fdata.2023.1296469","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"2023/1/1 0:00:00","PubModel":"eCollection","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

Introduction: Big graphs like social network user interactions and customer rating matrices require significant computing resources to maintain. Data owners are now using public cloud resources for storage and computing elasticity. However, existing solutions do not fully address the privacy and ownership protection needs of the key involved parties: data contributors and the data owner who collects data from contributors.

Methods: We propose a Trusted Execution Environment (TEE) based solution: TEE-Graph for graph spectral analysis of outsourced graphs in the cloud. TEEs are new CPU features that can enable much more efficient confidential computing solutions than traditional software-based cryptographic ones. Our approach has several unique contributions compared to existing confidential graph analysis approaches. (1) It utilizes the unique TEE properties to ensure contributors' new privacy needs, e.g., the right of revocation for shared data. (2) It implements efficient access-pattern protection with a differentially private data encoding method. And (3) it implements TEE-based special analysis algorithms: the Lanczos method and the Nystrom method for efficiently handling big graphs and protecting confidentiality from compromised cloud providers.

Results: The TEE-Graph approach is much more efficient than software crypto approaches and also immune to access-pattern-based attacks. Compared with the best-known software crypto approach for graph spectral analysis, PrivateGraph, we have seen that TEE-Graph has 103-105 times lower computation, storage, and communication costs. Furthermore, the proposed access-pattern protection method incurs only about 10%-25% of the overall computation cost.

Discussion: Our experimentation showed that TEE-Graph performs significantly better and has lower costs than typical software approaches. It also addresses the unique ownership and access-pattern issues that other TEE-related graph analytics approaches have not sufficiently studied. The proposed approach can be extended to other graph analytics problems with strong ownership and access-pattern protection.

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
TEE-Graph:基于云的图谱分析的高效隐私和所有权保护。
简介社交网络用户互动和客户评级矩阵等大型图表需要大量计算资源来维护。目前,数据所有者正在使用公共云资源进行存储和弹性计算。然而,现有的解决方案并不能完全满足关键相关方(数据贡献者和从贡献者处收集数据的数据所有者)的隐私和所有权保护需求:我们提出了一种基于可信执行环境(TEE)的解决方案:方法:我们提出了一种基于可信执行环境(TEE)的解决方案:TEE-Graph,用于对云中的外包图形进行图谱分析。TEE是CPU的新特性,与传统的基于软件的加密解决方案相比,它能提供更高效的保密计算解决方案。与现有的保密图分析方法相比,我们的方法有几个独特的贡献。(1) 它利用独特的 TEE 特性来确保贡献者新的隐私需求,例如共享数据的撤销权。(2) 它利用不同的隐私数据编码方法实现了高效的访问模式保护。(3) 它实现了基于 TEE 的特殊分析算法:Lanczos 方法和 Nystrom 方法,可有效处理大型图并保护机密性免受受损云提供商的破坏:结果:TEE-Graph 方法比软件加密方法更高效,而且还能抵御基于访问模式的攻击。与最著名的用于图谱分析的软件加密方法 PrivateGraph 相比,我们发现 TEE-Graph 的计算、存储和通信成本要低 103-105 倍。此外,所提出的访问模式保护方法只占总体计算成本的 10%-25%:我们的实验表明,与典型的软件方法相比,TEE-Graph 的性能明显更好,成本更低。它还解决了其他与 TEE 相关的图分析方法尚未充分研究的独特所有权和访问模式问题。所提出的方法可扩展到其他具有强大所有权和访问模式保护的图分析问题。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
CiteScore
5.20
自引率
3.20%
发文量
122
审稿时长
13 weeks
期刊最新文献
Cybermycelium: a reference architecture for domain-driven distributed big data systems. Cognitive warfare: a conceptual analysis of the NATO ACT cognitive warfare exploratory concept. An enhanced whale optimization algorithm for task scheduling in edge computing environments. Promoting fairness in link prediction with graph enhancement. Exploring code portability solutions for HEP with a particle tracking test code.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1