William Bowditch
Privacy-preserving Surveillance Methods using Homomorphic Encryption
Bowditch, William; Abramson, Will; Buchanan, William J; Pitropakis, Nikolaos; Hall, Adam J
Authors
Will Abramson
Prof Bill Buchanan B.Buchanan@napier.ac.uk
Professor
Dr Nick Pitropakis N.Pitropakis@napier.ac.uk
Associate Professor
Adam J Hall
Abstract
Data analysis and machine learning methods often involve the processing of cleartext data, and where this could breach the rights to privacy. Increasingly, we must use encryption to protect all states of the data: in-transit, at-rest, and in-memory. While tunnelling and symmetric key encryption are often used to protect data in-transit and at-rest, our major challenge is to protect data within memory, while still retaining its value. Ho-momorphic encryption, thus, could have a major role in protecting the rights to privacy, while providing ways to learn from captured data. Our work presents a novel use case and evaluation of the usage of homomorphic encryption and machine learning for privacy respecting state surveillance.
Citation
Bowditch, W., Abramson, W., Buchanan, W. J., Pitropakis, N., & Hall, A. J. (2020). Privacy-preserving Surveillance Methods using Homomorphic Encryption. In ICISSP: Proceedings of the 6th International Conference on Information Systems Security and Privacy (240-248). https://doi.org/10.5220/0008864902400248
Conference Name | 6th International Conference on Information Security Systems and Privacy (ICISSP) |
---|---|
Conference Location | Valletta, Malta |
Start Date | Feb 25, 2020 |
End Date | Feb 27, 2020 |
Acceptance Date | Dec 3, 2019 |
Publication Date | 2020 |
Deposit Date | Jan 9, 2020 |
Publicly Available Date | Oct 12, 2020 |
Publisher | Scitepress Digital Library |
Volume | 1 |
Pages | 240-248 |
Book Title | ICISSP: Proceedings of the 6th International Conference on Information Systems Security and Privacy |
ISBN | 978-989-758-399-5 |
DOI | https://doi.org/10.5220/0008864902400248 |
Keywords | Cryptography; SEAL; Machine Learning; Homomorphic Encryption; FV (Fan and Vercauteren) |
Public URL | http://researchrepository.napier.ac.uk/Output/2461708 |
Publisher URL | http://www.icissp.org/Home.aspx |
Files
Privacy Preserving Surveillance Methods Using Homomorphic Encryption
(261 Kb)
PDF
Publisher Licence URL
http://creativecommons.org/licenses/by-nc-nd/4.0/
Copyright Statement
Published under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0) license.
You might also like
Post Quantum Cryptography Analysis of TLS Tunneling on a Constrained Device
(2022)
Conference Proceeding
Identifying Roles, Requirements and Responsibilities in Trustworthy AI Systems
(2021)
Conference Proceeding
PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching
(2022)
Conference Proceeding
Evaluating Trust Assurance in Indy-Based Identity Networks Using Public Ledger Data
(2021)
Journal Article