When cryptography stops data science: Strategies for resolving the conflicts between data scientists and cryptographers

{"title":"When cryptography stops data science: Strategies for resolving the conflicts between data scientists and cryptographers","authors":"","doi":"10.1016/j.dsm.2024.03.001","DOIUrl":null,"url":null,"abstract":"<div><p>The advent of the digital era and computer-based remote communications has significantly enhanced the applicability of various sciences over the past two decades, notably data science (DS) and cryptography (CG). Data science involves clustering and categorizing unstructured data, while cryptography ensures security and privacy aspects. Despite certain CG laws and requirements mandating fully randomized or pseudonoise outputs from CG primitives and schemes, it appears that CG policies might impede data scientists from working on ciphers or analyzing information systems supporting security and privacy services. However, this study posits that CG does not entirely preclude data scientists from operating in the presence of ciphers, as there are several examples of successful collaborations, including homomorphic encryption schemes, searchable encryption algorithms, secret-sharing protocols, and protocols offering conditional privacy. These instances, along with others, indicate numerous potential solutions for fostering collaboration between DS and CG. Therefore, this study classifies the challenges faced by DS and CG into three distinct groups: challenging problems (which can be conditionally solved and are currently available to use; e.g., using secret sharing protocols, zero-knowledge proofs, partial homomorphic encryption algorithms, etc.), open problems (where proofs to solve exist but remain unsolved and is now considered as open problems; e.g., proposing efficient functional encryption algorithm, fully homomorphic encryption scheme, etc.), and hard problems (infeasible to solve with current knowledge and tools). Ultimately, the paper will address specific solutions and outline future directions to tackle the challenges arising at the intersection of DS and CG, such as providing specific access for DS experts in secret-sharing algorithms, assigning data index dimensions to DS experts in ultra-dimension encryption algorithms, defining some functional keys in functional encryption schemes for DS experts, and giving limited shares of data to them for analytics.</p></div>","PeriodicalId":100353,"journal":{"name":"Data Science and Management","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2024-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666764924000134/pdfft?md5=74cffc92910a646ae465235dd70aec61&pid=1-s2.0-S2666764924000134-main.pdf","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Data Science and Management","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2666764924000134","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The advent of the digital era and computer-based remote communications has significantly enhanced the applicability of various sciences over the past two decades, notably data science (DS) and cryptography (CG). Data science involves clustering and categorizing unstructured data, while cryptography ensures security and privacy aspects. Despite certain CG laws and requirements mandating fully randomized or pseudonoise outputs from CG primitives and schemes, it appears that CG policies might impede data scientists from working on ciphers or analyzing information systems supporting security and privacy services. However, this study posits that CG does not entirely preclude data scientists from operating in the presence of ciphers, as there are several examples of successful collaborations, including homomorphic encryption schemes, searchable encryption algorithms, secret-sharing protocols, and protocols offering conditional privacy. These instances, along with others, indicate numerous potential solutions for fostering collaboration between DS and CG. Therefore, this study classifies the challenges faced by DS and CG into three distinct groups: challenging problems (which can be conditionally solved and are currently available to use; e.g., using secret sharing protocols, zero-knowledge proofs, partial homomorphic encryption algorithms, etc.), open problems (where proofs to solve exist but remain unsolved and is now considered as open problems; e.g., proposing efficient functional encryption algorithm, fully homomorphic encryption scheme, etc.), and hard problems (infeasible to solve with current knowledge and tools). Ultimately, the paper will address specific solutions and outline future directions to tackle the challenges arising at the intersection of DS and CG, such as providing specific access for DS experts in secret-sharing algorithms, assigning data index dimensions to DS experts in ultra-dimension encryption algorithms, defining some functional keys in functional encryption schemes for DS experts, and giving limited shares of data to them for analytics.

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
当密码学阻碍数据科学时:解决数据科学家与密码学家之间冲突的策略
过去二十年来,数字时代的到来和基于计算机的远程通信大大提高了各种科学的适用性,特别是数据科学(DS)和密码学(CG)。数据科学涉及非结构化数据的聚类和分类,而密码学则确保安全和隐私。尽管某些密码学法律和要求强制规定密码学基元和方案的输出必须完全随机化或伪随机化,但似乎密码学政策可能会阻碍数据科学家研究密码或分析支持安全和隐私服务的信息系统。不过,本研究认为,计算机辅助决策并不完全妨碍数据科学家在有密码的情况下开展工作,因为有几个成功合作的例子,包括同态加密方案、可搜索加密算法、秘密共享协议和提供有条件隐私的协议。这些例子和其他例子表明,促进 DS 和 CG 之间合作的潜在解决方案很多。因此,本研究将 DS 和 CG 面临的挑战分为三类:具有挑战性的问题(可以有条件地解决,并且目前可以使用,例如使用秘密共享协议、零知识证明、部分同态加密算法等)、开放性问题(存在可解决的证明,但仍未解决,目前被视为开放性问题;例如,提出高效函数加密算法、完全同态加密方案等)和困难问题(以现有知识和工具无法解决)。最后,本文将讨论具体的解决方案,并概述未来的发展方向,以应对 DS 和 CG 交叉领域中出现的挑战,例如在秘密共享算法中为 DS 专家提供特定的访问权限,在超维度加密算法中为 DS 专家分配数据索引维度,在功能加密方案中为 DS 专家定义一些功能密钥,以及为他们提供有限的数据份额以供分析。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
CiteScore
7.50
自引率
0.00%
发文量
0
期刊最新文献
Comparative study of IoT- and AI-based computing disease detection approaches Forecast Uncertainties Real-Time Data-Driven Compensation Scheme for Optimal Storage Control Dual-market quantitative trading: The dynamics of liquidity and turnover in financial markets A Model for Predicting Dropout of Higher Education Students Value Realization of Intelligent Emergency Management: Research Framework from Technology Enabling to Value Creation
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1