SlideShare a Scribd company logo
Presentation
on
A Secure Database
System using
Homomorphic
Encryption
Schemes
1
23 January 2020
GROUP INFORMATION 2
Md. Shahin Kadir
Student ID: 183235
Md. Ibrahim Ali
Student ID: 183202
Md. Shams Sayied Haque
Student ID: 183227
Saleh Ahmmed Miajee
Student ID: 183228
IIT, Jahangirnagar University
23 January 2020
INTRODUCTION 3
IIT, Jahangirnagar University
Cloud computing is an attractive
solution that can provide low cost
storage and processing capabilities
for government agencies, hospitals,
and small and medium enterprises.
23 January 2020
INTRODUCTION 4
IIT, Jahangirnagar University
The confidentiality of information
as well as the liability for incidents
affecting the infrastructure arise
major problems.
So, the ultimate objective is to present a relational database system based on
homomorphism encryption schemes to preserve the integrity and confidentiality of
the data.
23 January 2020
INTRODUCTION 5
IIT, Jahangirnagar University
The data can be encrypted by the client, and then
sent to the cloud’s provider for storage or processing.
Only the client holds the decryption keys necessary
to read the data. Despite the fact that this type of
processing may increase the amount of computing
time, the benefits associated with it are worth the
processing overhead. Indeed, this model of
computing can preserve the confidentiality and
integrity of the data while delegating the storage and
processing to an un-trusted third party.
23 January 2020
INTRODUCTION 6
IIT, Jahangirnagar University
In this paper, it is presented a novel
technique to execute SQL statements over
encrypted data and developed a secure
database system that processes these
queries. The parameters of SQL queries are
encrypted by the client and sent to the
server for processing. The latter performs
the requested operation over an encrypted
database and returns an encrypted result to
the client.
23 January 2020
PRIVATE INFORMATION RETRIEVAL 7
IIT, Jahangirnagar University
Chow et al. [8]
discussed the
importance of cloud
computing, and how
this technology can be
enticing due to its
flexibility and cost-
efficiency. The
authors highlight that
people require explicit
guarantees that their
data will be protected
under well-defined
policies and
mechanisms.
The private
information retrieval
(PIR) approach,
introduced by Chor et
al. in [9], achieves the
retrieval of an ith bit
in a block without
revealing information
about the bit
retrieved or about the
request for the bit
itself.
Raykova et al. [10]
extended the PIR
approach by
proposing a secure
anonymous search
system. The system
employs keyword
search such that only
authorized clients
have access to their
blocks.
23 January 2020
PRIVATE INFORMATION RETRIEVAL 8
IIT, Jahangirnagar University
Shang et al. [11]
tackled the problem
of protecting the
database itself. The
information attained
from the monitoring
process is used to
understand how a
malicious querier can
conduct attacks to
retrieve excessive
amount of data from
the server.
Nakamura et al. [12]
constructed a system
with three
components, a
querier that initiates
requests, an
authentication-server
that processes these
requests, and a
database that returns
the appropriate data
in response to the
request.
Yinan and Cao [13]
used the PIR approach
to propose a system
that controls the
access to the
database.
23 January 2020
PRIVATE INFORMATION RETRIEVAL 9
IIT, Jahangirnagar University
Among the most important criteria in PIR protocol are the communication cost and the
amount of data sent back to the querier.
Gentry et al. [14] proposed a
scheme to retrieve a bit or a
block from a database with a
constant communication rate.
Melchor et al. [15] proposed a
scheme that reaches the
available data with a
reasonable communication
cost while achieving lower
computational cost compared
to other PIR protocols.
23 January 2020
SECURED SQL OPERATIONS 10
IIT, Jahangirnagar University
Cloud
Provider
Client
Encrypted Data
Encrypted Request
Encrypted Result
Figure: Secure Data Retrieval
23 January 2020
SECURED SQL OPERATIONS 11
IIT, Jahangirnagar University
Here describe below the circuit of a simple SQL SELECT query:
SELECT * from T where c = v
Here the value v is in encrypted
form.
The processing of the SELECT query is divided into three sub-circuits. Firstly, we calculate the
following index for each record R in the table T:
Where size is the number of bits in column c; 𝑐𝑖 and 𝑣𝑖 are the ith bits of column c and search criteria v, respectively. 𝐼𝑅
is a one bit value that is equal to 1 if v matches the value of column c, 0 otherwise.
23 January 2020
SECURED SQL OPERATIONS 12
IIT, Jahangirnagar University
Next, identify the nth record that matches the selection criteria. For that purpose, we consider 𝜂
= 𝜀𝑝𝑘(𝑛) to be the encryption of n under public key pk. For each record R we calculate the
following sum:
Calculate a second index 𝐼′𝑅:
𝐼′𝑅 is equal to 1 if the record R is the nth record that matches the selection criteria, 0 otherwise.
23 January 2020
SECURED SQL OPERATIONS 13
IIT, Jahangirnagar University
Then, we multiply every bit of each record R in table T by the corresponding value 𝐼′𝑅.
This latter operation forms a table 𝑇′ that is related to the original table T as follows:
23 January 2020
SECURED SQL OPERATIONS 14
IIT, Jahangirnagar University
Finally, by adding all records of table 𝑇′, we retrieve the nth record Rs that matches the
selection criteria:
If no record matches the selection criteria, a record containing zeros will be returned to
the requester.
23 January 2020
HOMOMORPHIC ENCRYPTION SCHEME 15
IIT, Jahangirnagar University
Key Generation
The private key Sk is a random P-bit odd number.Private Key
Public Key
The public key consists of a list of integers that are the using the
encryption scheme with the secret key sk as a public key.
Generate a set 𝑦⃗={𝑦1,…,yβ} of rational numbers in [0,2[ such that there is a sparse subset
𝑆 ∈ {1,…,𝛽} of size ∝ with
Set sk* to be the sparse subset S, encoded as a vector 𝑠 ∈ {0,1} 𝛽 with hamming weight α.
Set 𝑝𝑘∗← to be the public key.
23 January 2020
HOMOMORPHIC ENCRYPTION SCHEME 16
IIT, Jahangirnagar University
Encryption (pk*,m)
Set 𝑚′ to be a random N-bit number such that m and m’ have the same parity,
Here q is a random Q-bit number. Then the cipher text c is post-processed to produce a
vector 𝑧⃗={𝑧1,…,𝑧𝛽}, defined by,
The output cipher text c* consists of c and 𝑧⃗={ 𝑧1,…, 𝑧𝛽}
Now compute c as,
23 January 2020
HOMOMORPHIC ENCRYPTION SCHEME 17
IIT, Jahangirnagar University
Decryption (sk*, c*)
Addition
Multiplication
The output cipher text c* consists of c together with the result of post-processing the
resulting cipher text with 𝑦⃗.
Arithmetic Operations
23 January 2020
HOMOMORPHIC ENCRYPTION SCHEME 18
IIT, Jahangirnagar University
Bootstrapping the Encryption Scheme
C1
Decryption circuit
m
(Noise)
C2
m
Figure: Removing noise from original cipher text (bootstrapping)
23 January 2020
IMPLEMENTATION 19
IIT, Jahangirnagar University
The application supports the following SQL
operations:
SELECT with wildcard characters (*, ?)
and relational operators (< >).
UPDATE with wildcard characters (*, ?)
and relational operators (< >).
DELETE with wildcard characters (*, ?) and
relational operators (< >).
Statistical operations like COUNT and AVG.
Figure: Client side of the application
23 January 2020
PERFORMANCE ANALYSIS 20
IIT, Jahangirnagar University
Table lists the number of arithmetic operations required to execute some basic SQL statements
over an encrypted database of 10 records. From this table we can see that processing data in
encrypted form creates a substantial computation overhead.
TABLE: NUMBER OF ARITHMETIC OPERATIONS
23 January 2020
PERFORMANCE ANALYSIS 21
IIT, Jahangirnagar University
Figure: Processing time required to perform
the product of two n-bits integers
As we can see in Figure, it takes 23 minutes to
compute the product of two 16-bit integers.
The implementation of the system proves that the
execution of SQL statements over encrypted data is
feasible.
The time required to execute these statements is very
high and therefore is not suitable for real-time
transactions that involve a large database.
 This drawback is mainly due to the homomorphic
encryption scheme.
In fact, there might be more efficient techniques to
optimize the implementation, that is, one could
perform recryption only when it is necessary, since the
noise value can be bounded.
23 January 2020
CONCLUSION & FUTURE DIRECTIONS 22
IIT, Jahangirnagar University
This concept has many direct applications in cloud computing environments, banking,
electronic voting and many other applications.
In this paper we developed the first secure database system based on a fully homomorphic
encryption scheme.
Presented the circuits to implement SQL statements over encrypted data.
Built a prototype of a database system where data is stored & processed in encrypted form.
 Conducted performance analysis to measure the time needed to execute a simple query on
the database.
As future work, here planning to work on the optimization of the efficiency of the system.
 Also investigate how to reduce the number of recryptions needed.
23 January 2020
REFERENCES 23
IIT, Jahangirnagar University
[1] R. Rivest, A. Shamir, and L. Adleman, A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Communications of the ACM 21 (2): pp.
120–126, 1978.
[2] T. ElGamal, A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms, IEEE Transactions on Information Theory, pp. 469–472,
1985.
[3] S. Goldwasser and S. Micali, Probabilistic Encryption. Journal of Computer and System Sciences, 28(2): pp. 270-299, April 1984.
[4] P. Paillier, Public-Key Cryptosystems Based on Composite Degree Residuosity Classes, Advances in Cryptology — EUROCRYPT ’99 In Advances in
Cryptology — EUROCRYPT ’99 , Vol. 1592 (1999), pp. 223-238, 1999.
[5] M. V. Dijk, C. Gentry, S. Halevi, and V. Vaikuntanathan, Fully Homomorphic Encryption over the Integers. EUROCRYPT 2010: pp. 24-43, June 2010.
[6] C. Gentry, Computing arbitrary functions of encrypted data, Commun. ACM, Vol. 53, No. 3., pp. 97-105, March 2010.
[7] C. Gentry, A fully homomorphic encryption scheme. PhD thesis, Stanford University, 2009.
[8] R. Chow, P. Golle, M. Jakobsson, R. Masuoka, and J. Molina, Controlling Data in the Cloud : Outsourcing Computation without Outsourcing Control.
CCSW’09, pp. 85-90, Chicago, Illinois, USA, November 13, 2009.
[9] B. Chor, E. Kushilevitz, O. Goldreich, and M. Sudan, Private Information Retrieval, Journal of the ACM, 45(6): pp. 965-982, 1998.
[10] M. Raykova, B. Vo, and S. Bellovin, Secure Anonymous Database Search, CCSW’09, pp. 115-126, Chicago, Illinois, USA, November 13, 2009.
[11] N. Shang, G. Ghinita, Y. Zhou, and E. Bertino, Controlling Data Disclosure in Computational PIR Protocols. ASIACCS’10, pp. 310-313, Beijing, China, April
13–16, 2010.
[12] T. Nakamura, S. Inenaga, D. Ikeda, K. Baba, H. Yasuura, Anonymous Authentication Systems Based on Private Information Retrieval. Networked Digital
Technologies. NDT '09, pp.53-58, 28-31 July 2009.
[13] S. Yinan and Z. Cao, Extended Attribute Based Encryption for Private Information Retrieval. Mobile Adhoc and Sensor Systems, 2009. MASS '09, pp. 702-
707, 12-15 Oct. 2009.
[14] C. Gentry and Z. Ramzan, Single-Database Private Information Retrieval with Constant Communication Rate. ICALP 2005, LNCS 3580, pp. 803–815, 2005.
[15] C. A. Melchor and P. Gaborit, A Fast Private Information Retrieval Protocol. ISIT 2008, pp. 1848-1852, Toronto, Canada, July 6 - 11, 2008.
23 January 2020
24
IIT, Jahangirnagar University
23 January 2020
25
IIT, Jahangirnagar University
Any Question Please

More Related Content

PDF
Performance Analysis of Hashing Mathods on the Employment of App
PDF
IRJET- Secure Skyline Queries over the Encrypted Data
PDF
A Survey on Privacy-Preserving Data Aggregation Without Secure Channel
PDF
PDF
IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...
PDF
IRJET- Enhancement of 128-Bits Data Security through Steganography and Crypto...
PDF
Ijarcet vol-2-issue-7-2236-2240
PDF
PRIVACY PRESERVING DATA MINING BASED ON VECTOR QUANTIZATION
Performance Analysis of Hashing Mathods on the Employment of App
IRJET- Secure Skyline Queries over the Encrypted Data
A Survey on Privacy-Preserving Data Aggregation Without Secure Channel
IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...
IRJET- Enhancement of 128-Bits Data Security through Steganography and Crypto...
Ijarcet vol-2-issue-7-2236-2240
PRIVACY PRESERVING DATA MINING BASED ON VECTOR QUANTIZATION

What's hot (17)

PDF
Pseudo-Random Bit Generator Using Chaotic Seed for Cryptographic Algorithm in...
PDF
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
PDF
Application of Advance Encryption Algorithm to Implement Access to Sensitive ...
PDF
Security System for Data Using Steganography and Cryptography (SSDSC)
PDF
IRJET- Execution of Privacy - Preserving Multi-Keyword Positioned Search Over...
PDF
Building confidential and efficient query services in the cloud with rasp dat...
PDF
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
PDF
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
PDF
Paper id 28201425
PDF
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
PDF
Secure Outsourcing of Linear Programming in Cloud Computing Environment: A Re...
PDF
Implementation of message authentication code using DNA-LCG key and a novel h...
PDF
A predictive model for network intrusion detection using stacking approach
PDF
Authentic and Anonymous Data Sharing with Data Partitioning in Big Data
PDF
Implementation for Data Hiding using Visual Cryptography
PDF
DIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITY
PDF
FEATURE EXTRACTION AND FEATURE SELECTION: REDUCING DATA COMPLEXITY WITH APACH...
Pseudo-Random Bit Generator Using Chaotic Seed for Cryptographic Algorithm in...
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
Application of Advance Encryption Algorithm to Implement Access to Sensitive ...
Security System for Data Using Steganography and Cryptography (SSDSC)
IRJET- Execution of Privacy - Preserving Multi-Keyword Positioned Search Over...
Building confidential and efficient query services in the cloud with rasp dat...
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
Paper id 28201425
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
Secure Outsourcing of Linear Programming in Cloud Computing Environment: A Re...
Implementation of message authentication code using DNA-LCG key and a novel h...
A predictive model for network intrusion detection using stacking approach
Authentic and Anonymous Data Sharing with Data Partitioning in Big Data
Implementation for Data Hiding using Visual Cryptography
DIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITY
FEATURE EXTRACTION AND FEATURE SELECTION: REDUCING DATA COMPLEXITY WITH APACH...
Ad

Similar to Homomorphic encryption scheme (20)

PDF
Rough set method-cloud internet of things: a two-degree verification scheme ...
PDF
Performance Comparison of Dimensionality Reduction Methods using MCDR
PDF
IRJET- Implementation of DNA Cryptography in Cloud Computing and using Socket...
PDF
A data quarantine model to secure data in edge computing
PDF
Hierarchal attribute based cryptographic model to handle security services in...
PDF
A dynamic data encryption method based on addressing the data importance on ...
PDF
Secure Outsourcing Mechanism for Linear Programming in Cloud Computing
PDF
Ijarcet vol-2-issue-7-2236-2240
PDF
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...
PDF
Intrusion Detection for HealthCare Network using Machine Learning
PDF
561 1530-1-pb (1)
PDF
Detecting Password brute force attack and Protecting the cloud data with AES ...
PDF
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
PDF
Irjet v7 i3475
PDF
IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...
PDF
DIGITAL INVESTMENT PREDICTION IN CRYPTOCURRENCY
PDF
Presentation.pdf
PDF
Emerging Trends In Cryptography And Digital Forensics
PDF
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
PDF
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
Rough set method-cloud internet of things: a two-degree verification scheme ...
Performance Comparison of Dimensionality Reduction Methods using MCDR
IRJET- Implementation of DNA Cryptography in Cloud Computing and using Socket...
A data quarantine model to secure data in edge computing
Hierarchal attribute based cryptographic model to handle security services in...
A dynamic data encryption method based on addressing the data importance on ...
Secure Outsourcing Mechanism for Linear Programming in Cloud Computing
Ijarcet vol-2-issue-7-2236-2240
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...
Intrusion Detection for HealthCare Network using Machine Learning
561 1530-1-pb (1)
Detecting Password brute force attack and Protecting the cloud data with AES ...
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
Irjet v7 i3475
IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...
DIGITAL INVESTMENT PREDICTION IN CRYPTOCURRENCY
Presentation.pdf
Emerging Trends In Cryptography And Digital Forensics
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
Ad

More from shahin kadir (6)

PPTX
Market segmentation of bkash
PPTX
Test case point analysis
PPTX
Facebbok
PPTX
Li fi technology
PPTX
Disadvantage of facebook
PPTX
Emitter Coupled Logic (ECL)
Market segmentation of bkash
Test case point analysis
Facebbok
Li fi technology
Disadvantage of facebook
Emitter Coupled Logic (ECL)

Recently uploaded (20)

PPTX
Safety Seminar civil to be ensured for safe working.
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
Sustainable Sites - Green Building Construction
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
DOCX
573137875-Attendance-Management-System-original
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PDF
Well-logging-methods_new................
PDF
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
PPTX
additive manufacturing of ss316l using mig welding
PPT
Mechanical Engineering MATERIALS Selection
PPT
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PDF
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
PDF
PPT on Performance Review to get promotions
PPT
introduction to datamining and warehousing
PPT
Total quality management ppt for engineering students
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PDF
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
Safety Seminar civil to be ensured for safe working.
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Sustainable Sites - Green Building Construction
Embodied AI: Ushering in the Next Era of Intelligent Systems
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
573137875-Attendance-Management-System-original
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Well-logging-methods_new................
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
additive manufacturing of ss316l using mig welding
Mechanical Engineering MATERIALS Selection
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
PPT on Performance Review to get promotions
introduction to datamining and warehousing
Total quality management ppt for engineering students
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Automation-in-Manufacturing-Chapter-Introduction.pdf
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS

Homomorphic encryption scheme

  • 1. Presentation on A Secure Database System using Homomorphic Encryption Schemes 1
  • 2. 23 January 2020 GROUP INFORMATION 2 Md. Shahin Kadir Student ID: 183235 Md. Ibrahim Ali Student ID: 183202 Md. Shams Sayied Haque Student ID: 183227 Saleh Ahmmed Miajee Student ID: 183228 IIT, Jahangirnagar University
  • 3. 23 January 2020 INTRODUCTION 3 IIT, Jahangirnagar University Cloud computing is an attractive solution that can provide low cost storage and processing capabilities for government agencies, hospitals, and small and medium enterprises.
  • 4. 23 January 2020 INTRODUCTION 4 IIT, Jahangirnagar University The confidentiality of information as well as the liability for incidents affecting the infrastructure arise major problems. So, the ultimate objective is to present a relational database system based on homomorphism encryption schemes to preserve the integrity and confidentiality of the data.
  • 5. 23 January 2020 INTRODUCTION 5 IIT, Jahangirnagar University The data can be encrypted by the client, and then sent to the cloud’s provider for storage or processing. Only the client holds the decryption keys necessary to read the data. Despite the fact that this type of processing may increase the amount of computing time, the benefits associated with it are worth the processing overhead. Indeed, this model of computing can preserve the confidentiality and integrity of the data while delegating the storage and processing to an un-trusted third party.
  • 6. 23 January 2020 INTRODUCTION 6 IIT, Jahangirnagar University In this paper, it is presented a novel technique to execute SQL statements over encrypted data and developed a secure database system that processes these queries. The parameters of SQL queries are encrypted by the client and sent to the server for processing. The latter performs the requested operation over an encrypted database and returns an encrypted result to the client.
  • 7. 23 January 2020 PRIVATE INFORMATION RETRIEVAL 7 IIT, Jahangirnagar University Chow et al. [8] discussed the importance of cloud computing, and how this technology can be enticing due to its flexibility and cost- efficiency. The authors highlight that people require explicit guarantees that their data will be protected under well-defined policies and mechanisms. The private information retrieval (PIR) approach, introduced by Chor et al. in [9], achieves the retrieval of an ith bit in a block without revealing information about the bit retrieved or about the request for the bit itself. Raykova et al. [10] extended the PIR approach by proposing a secure anonymous search system. The system employs keyword search such that only authorized clients have access to their blocks.
  • 8. 23 January 2020 PRIVATE INFORMATION RETRIEVAL 8 IIT, Jahangirnagar University Shang et al. [11] tackled the problem of protecting the database itself. The information attained from the monitoring process is used to understand how a malicious querier can conduct attacks to retrieve excessive amount of data from the server. Nakamura et al. [12] constructed a system with three components, a querier that initiates requests, an authentication-server that processes these requests, and a database that returns the appropriate data in response to the request. Yinan and Cao [13] used the PIR approach to propose a system that controls the access to the database.
  • 9. 23 January 2020 PRIVATE INFORMATION RETRIEVAL 9 IIT, Jahangirnagar University Among the most important criteria in PIR protocol are the communication cost and the amount of data sent back to the querier. Gentry et al. [14] proposed a scheme to retrieve a bit or a block from a database with a constant communication rate. Melchor et al. [15] proposed a scheme that reaches the available data with a reasonable communication cost while achieving lower computational cost compared to other PIR protocols.
  • 10. 23 January 2020 SECURED SQL OPERATIONS 10 IIT, Jahangirnagar University Cloud Provider Client Encrypted Data Encrypted Request Encrypted Result Figure: Secure Data Retrieval
  • 11. 23 January 2020 SECURED SQL OPERATIONS 11 IIT, Jahangirnagar University Here describe below the circuit of a simple SQL SELECT query: SELECT * from T where c = v Here the value v is in encrypted form. The processing of the SELECT query is divided into three sub-circuits. Firstly, we calculate the following index for each record R in the table T: Where size is the number of bits in column c; 𝑐𝑖 and 𝑣𝑖 are the ith bits of column c and search criteria v, respectively. 𝐼𝑅 is a one bit value that is equal to 1 if v matches the value of column c, 0 otherwise.
  • 12. 23 January 2020 SECURED SQL OPERATIONS 12 IIT, Jahangirnagar University Next, identify the nth record that matches the selection criteria. For that purpose, we consider 𝜂 = 𝜀𝑝𝑘(𝑛) to be the encryption of n under public key pk. For each record R we calculate the following sum: Calculate a second index 𝐼′𝑅: 𝐼′𝑅 is equal to 1 if the record R is the nth record that matches the selection criteria, 0 otherwise.
  • 13. 23 January 2020 SECURED SQL OPERATIONS 13 IIT, Jahangirnagar University Then, we multiply every bit of each record R in table T by the corresponding value 𝐼′𝑅. This latter operation forms a table 𝑇′ that is related to the original table T as follows:
  • 14. 23 January 2020 SECURED SQL OPERATIONS 14 IIT, Jahangirnagar University Finally, by adding all records of table 𝑇′, we retrieve the nth record Rs that matches the selection criteria: If no record matches the selection criteria, a record containing zeros will be returned to the requester.
  • 15. 23 January 2020 HOMOMORPHIC ENCRYPTION SCHEME 15 IIT, Jahangirnagar University Key Generation The private key Sk is a random P-bit odd number.Private Key Public Key The public key consists of a list of integers that are the using the encryption scheme with the secret key sk as a public key. Generate a set 𝑦⃗={𝑦1,…,yβ} of rational numbers in [0,2[ such that there is a sparse subset 𝑆 ∈ {1,…,𝛽} of size ∝ with Set sk* to be the sparse subset S, encoded as a vector 𝑠 ∈ {0,1} 𝛽 with hamming weight α. Set 𝑝𝑘∗← to be the public key.
  • 16. 23 January 2020 HOMOMORPHIC ENCRYPTION SCHEME 16 IIT, Jahangirnagar University Encryption (pk*,m) Set 𝑚′ to be a random N-bit number such that m and m’ have the same parity, Here q is a random Q-bit number. Then the cipher text c is post-processed to produce a vector 𝑧⃗={𝑧1,…,𝑧𝛽}, defined by, The output cipher text c* consists of c and 𝑧⃗={ 𝑧1,…, 𝑧𝛽} Now compute c as,
  • 17. 23 January 2020 HOMOMORPHIC ENCRYPTION SCHEME 17 IIT, Jahangirnagar University Decryption (sk*, c*) Addition Multiplication The output cipher text c* consists of c together with the result of post-processing the resulting cipher text with 𝑦⃗. Arithmetic Operations
  • 18. 23 January 2020 HOMOMORPHIC ENCRYPTION SCHEME 18 IIT, Jahangirnagar University Bootstrapping the Encryption Scheme C1 Decryption circuit m (Noise) C2 m Figure: Removing noise from original cipher text (bootstrapping)
  • 19. 23 January 2020 IMPLEMENTATION 19 IIT, Jahangirnagar University The application supports the following SQL operations: SELECT with wildcard characters (*, ?) and relational operators (< >). UPDATE with wildcard characters (*, ?) and relational operators (< >). DELETE with wildcard characters (*, ?) and relational operators (< >). Statistical operations like COUNT and AVG. Figure: Client side of the application
  • 20. 23 January 2020 PERFORMANCE ANALYSIS 20 IIT, Jahangirnagar University Table lists the number of arithmetic operations required to execute some basic SQL statements over an encrypted database of 10 records. From this table we can see that processing data in encrypted form creates a substantial computation overhead. TABLE: NUMBER OF ARITHMETIC OPERATIONS
  • 21. 23 January 2020 PERFORMANCE ANALYSIS 21 IIT, Jahangirnagar University Figure: Processing time required to perform the product of two n-bits integers As we can see in Figure, it takes 23 minutes to compute the product of two 16-bit integers. The implementation of the system proves that the execution of SQL statements over encrypted data is feasible. The time required to execute these statements is very high and therefore is not suitable for real-time transactions that involve a large database.  This drawback is mainly due to the homomorphic encryption scheme. In fact, there might be more efficient techniques to optimize the implementation, that is, one could perform recryption only when it is necessary, since the noise value can be bounded.
  • 22. 23 January 2020 CONCLUSION & FUTURE DIRECTIONS 22 IIT, Jahangirnagar University This concept has many direct applications in cloud computing environments, banking, electronic voting and many other applications. In this paper we developed the first secure database system based on a fully homomorphic encryption scheme. Presented the circuits to implement SQL statements over encrypted data. Built a prototype of a database system where data is stored & processed in encrypted form.  Conducted performance analysis to measure the time needed to execute a simple query on the database. As future work, here planning to work on the optimization of the efficiency of the system.  Also investigate how to reduce the number of recryptions needed.
  • 23. 23 January 2020 REFERENCES 23 IIT, Jahangirnagar University [1] R. Rivest, A. Shamir, and L. Adleman, A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Communications of the ACM 21 (2): pp. 120–126, 1978. [2] T. ElGamal, A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms, IEEE Transactions on Information Theory, pp. 469–472, 1985. [3] S. Goldwasser and S. Micali, Probabilistic Encryption. Journal of Computer and System Sciences, 28(2): pp. 270-299, April 1984. [4] P. Paillier, Public-Key Cryptosystems Based on Composite Degree Residuosity Classes, Advances in Cryptology — EUROCRYPT ’99 In Advances in Cryptology — EUROCRYPT ’99 , Vol. 1592 (1999), pp. 223-238, 1999. [5] M. V. Dijk, C. Gentry, S. Halevi, and V. Vaikuntanathan, Fully Homomorphic Encryption over the Integers. EUROCRYPT 2010: pp. 24-43, June 2010. [6] C. Gentry, Computing arbitrary functions of encrypted data, Commun. ACM, Vol. 53, No. 3., pp. 97-105, March 2010. [7] C. Gentry, A fully homomorphic encryption scheme. PhD thesis, Stanford University, 2009. [8] R. Chow, P. Golle, M. Jakobsson, R. Masuoka, and J. Molina, Controlling Data in the Cloud : Outsourcing Computation without Outsourcing Control. CCSW’09, pp. 85-90, Chicago, Illinois, USA, November 13, 2009. [9] B. Chor, E. Kushilevitz, O. Goldreich, and M. Sudan, Private Information Retrieval, Journal of the ACM, 45(6): pp. 965-982, 1998. [10] M. Raykova, B. Vo, and S. Bellovin, Secure Anonymous Database Search, CCSW’09, pp. 115-126, Chicago, Illinois, USA, November 13, 2009. [11] N. Shang, G. Ghinita, Y. Zhou, and E. Bertino, Controlling Data Disclosure in Computational PIR Protocols. ASIACCS’10, pp. 310-313, Beijing, China, April 13–16, 2010. [12] T. Nakamura, S. Inenaga, D. Ikeda, K. Baba, H. Yasuura, Anonymous Authentication Systems Based on Private Information Retrieval. Networked Digital Technologies. NDT '09, pp.53-58, 28-31 July 2009. [13] S. Yinan and Z. Cao, Extended Attribute Based Encryption for Private Information Retrieval. Mobile Adhoc and Sensor Systems, 2009. MASS '09, pp. 702- 707, 12-15 Oct. 2009. [14] C. Gentry and Z. Ramzan, Single-Database Private Information Retrieval with Constant Communication Rate. ICALP 2005, LNCS 3580, pp. 803–815, 2005. [15] C. A. Melchor and P. Gaborit, A Fast Private Information Retrieval Protocol. ISIT 2008, pp. 1848-1852, Toronto, Canada, July 6 - 11, 2008.
  • 24. 23 January 2020 24 IIT, Jahangirnagar University
  • 25. 23 January 2020 25 IIT, Jahangirnagar University Any Question Please