 Research
 Open access
 Published:
A privacy protectionoriented parallel fully homomorphic encryption algorithm in cyber physical systems
EURASIP Journal on Wireless Communications and Networking volume 2019, Article number: 15 (2019)
Abstract
Cyber physical system (CPS) is facing enormous security challenges because of open and interconnected network and the interaction between cyber components and physical components, the development of cyber physical systems is constrained by security and privacy threats. A feasible solution is to combine the fully homomorphic encryption (FHE) technique to realize the efficient operation of ciphertext without decryption. However, most current homomorphic encryption algorithms only support limited data types, making it difficult to be widely applied in actual environment. To address this limitation, we propose a parallel fully homomorphic encryption algorithm that supports floatingpoint numbers. The proposed algorithm not only expands the data types supported by the existing fully homomorphic encryption algorithms, but also utilizes the characteristics of multinodes in cloud environment to conduct parallel encryption through simultaneous groupwise ciphertext computations. The experimental results show that, in a 16core 4node cluster with MapReduce environment, the proposed encryption algorithm achieves the maximum speedup exceeding 5, which not only solves the limited application problem of the existing fully homomorphic encryption algorithm, but also meets the requirements for the efficient homomorphic encryption of floatingpoint numbers in cloud computing environment.
1 Introduction
The cyber physics system is a multidimensional complicated system that integrates computation, communication, and physical environments. The system emphasizes the interaction between cyber and the physical system, so secure information transmission between physical components and information system has become more important [1,2,3]. For the cyber physical system, a relatively complete secure service should provide privacy protection, data confidentiality, information integrity, ID certification and access control. Therefore, how to provide privacy and security protection to users in the cyber physics system in a secure and effective manner has become a hotspot in the current academic research [4, 5].
In recent years, various technologies have been broadly used for data privacy protection, such as private information retrieval [6,7,8,9,10,11], searchable encryption [12,13,14,15,16,17], and secure multiparty computation [18,19,20,21,22,23], but these technologies can only provide limited functions, such as keyword search, order search, range query, and subset search. However, for many application scenarios in the cloud environment, it requires various types operations of ciphertext data. For example, based on the medical data of thousands of patients, we could conduct analysis of drug effects, summarize frequently searched words by users in the search engine to releaserelated advertisement, and conduct statistical analysis of encrypted financial information of company. Most traditional encryption methods do not support ciphertext operation. According to the traditional method, these data are sent to the cloud after encryption, and when processing the data, the user needs to download data to a local system and uses the data after decryption. This approach tends to cause exposure of privacy, and in the meantime, when the user has frequent use of data to conduct communication with service provider and realize encryption and decryption of data, it will consume massive network bandwidth and user’s time, which will significantly reduce the usability of cloud computing.
Another solution is to adopt the homomorphic encryption technique [24]. This technique supports ciphertext data management under privacy protection, which can be used to realize various operations such as direct search, computation, and statistics of ciphertext at cloud, and the result can be returned to the user in the form of ciphertext. Compared to the traditional encryption algorithms, this method does not require frequent encryption and decryption operations between the cloud and user, which can reduce the overhead of communication and computation resources. The user’s private data are saved in the form of ciphertext at cloud, and the service provider cannot know the data content, which can prevent them from exploring user’s privacy through illegal embezzling and tampering of user data. It has provided a security basis for the users to fully utilize the cloud computing resources to conduct massive data analysis and processing, and in particular, it can be combined with the secure multiparty computation protocol to well solve the privacy security issue when the user outsources the computation service.
Most current homomorphic encryption schemes support integer homomorphic operation, but do not support homomorphic operation of floatingpoint data, so they cannot satisfy the requirement of actual application. By combining the cloud computing environment, this paper proposes a fully homomorphic encryption algorithm that supports floatingpoint operation, and the objective is to expand encryption algorithm from integer to floatingpoint number. This scheme has combined the MapReduce framework to realize fully homomorphic encryption of parallel floatingpoint number. In the meantime, the cluster advantage is used to improve the execution efficiency of algorithm, realize efficient encryption and decryption operation, and effectively reduce the time of homomorphic operation. Both the theoretical analysis and experiment results show that the parallel homomorphic encryption algorithm supports floatingpoint operation, which can be used to conduct fast and efficient encryption and decryption operation of massive floatingpoint data. It has high security and practicality, and it is applicable to the cloud computing scenario.
The main contributions of our work are summarized as follows:

(1)
We propose a fully homomorphic encryption algorithm supporting Floatingpoint operation (FFHE) in this paper, which has solved the problem that direct operation of many floatingpoint ciphertexts cannot be carried out in the real environment.

(2)
We design a parallel homomorphic encryption scheme in order to address the low efficiency of homomorphic encryption algorithm. This scheme is based on the MapReduce environment, which can realize parallel performance of algorithm through data blocks. The experimental result shows that, in a 16core 4node cluster, this encryption algorithm can reach the maximum speedup ratio exceeding 5.

(3)
In addition to improve the security of algorithm, we add an operation to disrupt the ciphertext order in the proposed homomorphic encryption scheme that supports floatingpoint operation, which has eliminated the association between the child ciphertext and key pair.
The rest of this paper is organized as follows. Related work is summarized in Section 2. Section 3 introduces the background knowledge. The homomorphic encryption scheme that supports floatingpoint number is proposed in Section 4, and the homomorphic performance and security of algorithm are also proved. In Section 5, parallel design of algorithm is conducted, and specific realization method is provided. Section 6 consists of experiment and analysis, and the experiment results and discussion are presented in the form of a chart. Finally, we conclude this paper in Section 7.
2 Related work
In 1978, Rivest et al. proposed the concept of homomorphic encryption for the first time in Literature [25], which is also called the “privacy homomorphism,” and in the same year, they also proposed that the RSA public key encryption algorithm has multiplication homomorphism [26], and the security of this scheme is based on integer factorization. Later, many homomorphic encryption schemes have been proposed, such as the ElGamal [27] encryption scheme with multiplication homomorphism and the Paillier [28] encryption scheme with the addition of homomorphism, but none of these methods have the feature of fully homomorphic encryption, and are called partial homomorphic encryption (PHE).
In 2009, Gentry proposed the fully homomorphic encryption(FHE) scheme based on the ideal lattice problem for the first time [29], and this scheme can be used to conduct any addition and multiplication operations of ciphertext. Later, the fully homomorphic encryption technique entered the period of fast development. Dijk et al. proposed the fully homomorphic encryption scheme DGHV within the integer field [30], and this scheme is based on the greatest common divisor problem. Brakerski et al. proposed a fully homomorphic encryption scheme based on the LWE (learning with errors) problem [31], its main idea is to address the defects of ideal latticebased scheme through the relinearization technique. Stehle et al. introduced the NTRU (number theory research unit) algorithm for the first time to improve the efficiency of initial FHE scheme [32]. Its security assumption is based on RLWE (ring learning with errors). Brakerski et al. proposed the BGV scheme in literature [33], which can support multibit operation, and the computation complexity is much lower than that of Gentry’s initial scheme. From the initial scheme of Gentry to BGV scheme, the research on the homomorphic encryption scheme has made remarkable progress, but still far away from the actual application.
In recent years, some mature homomorphic encryption schemes are proposed in literatures [34,35,36,37,38,39,40,41], especially, Garg et al. proposed a fully homomorphic algorithm based on the LWE and RLWE problems, which utilizes the addition and multiplication operations of matrix to realize homomorphic computation of ciphertext, and it is believed as an ideal scheme at present. Based on the approximate greatest common divisor problem, Liu proposed a fully homomorphic encryption (LFHE) that supported integer operation [42], and a fully homomorphic encryption is realized through complicated algebraic equation, which has high execution efficiency. He also applied this scheme to cloud computing environment [43]. Liu et al. [44, 45] designed a computation framework and toolkit that support privacy protection, this scheme supports multikey encryption, and it can be expanded to rational number computation.
In real scenarios, some homomorphic encryption techniques have been used in the cloud environment for privacy protection. According to the data privacy problem in cloud computing environment, Brenner et al. [46] adopted a fully homomorphic encryption technique to realize safe execution of confidential program at thirdparty server. For the multimedia information retrieval problem in cloud computing environment, Lu et al. [47] proposed SIFT (the security scale invariant feature transform) scheme based on Paillier encryption scheme. The feasibility and efficiency problems of existing homomorphic encryption schemes are discussed in literatures [48,49,50,51,52,53,54,55,56], and some application scenarios were combined to analyze the requirement for homomorphic algorithms. In accordance with the low efficiency problem of Paillier encryption algorithm, Min et al. [57] proposed a homomorphic encryption algorithm that can conduct parallel encryption in the cloud environment, but because most practical computations involve integer and floatingpoint number operation, this method still has its shortages.
Literatures [58,59,60] expanded the homomorphic encryption scheme of integer domain to the fixedpoint and floatingpoint parts, which has extended the application scenarios of homomorphic algorithm. Literature [61] specifically analyzed the theoretical basis and characteristics of above homomorphic encryption schemes in theory, stipulated various terms, related concepts and definitions used in the homomorphic schemes, and made uniform description of above concepts based on mathematical knowledge.
As most current homomorphic encryption schemes support integer homomorphic operation, we propose a fully homomorphic encryption algorithm that supports floatingpoint operation. The proposed algorithm can not only solve the problem of limited application in the existing fully homomorphic encryption, but also conduct parallel encryption based on the characteristics of multinodes in cloud environment, and as a result, the efficiency can be improved.
3 Background
3.1 The LFHE algorithm
LFHE algorithm allows the ciphertext to contain huge noise, and the ciphertext generated after multiple homomorphic operations can still be accurately decrypted, no matter how big noise volume has been accumulated during this process. This scheme is mainly based on the approximate greatest common divisor problem, which depends on complicated algebraic operation, so it has higher efficiency than the homomorphic encryption scheme based on the ideal lattice problem. The specific encryption scheme is as follows:

1.
Generation of key
Assume q is a prime number and Z_{q} be the set of integers modulo q, from GF(q)^{n + 1}, select a random integer vector K(n) = [ k_{1}, …, k_{n} ], n ≥ 3; in GF(q)^{l}, select random vector Θ = [θ_{1},…,θ_{l}], select random ciphertexts encrypted by elements in Θ, which is Φ = [Enc_{l}(K(n),θ_{1}),…,Enc_{l}(K(n),θ_{l}), Enc_{l}(K(n),1)]. Then the private keys are K(n) and Φ.

2.
Encryption algorithm
LFHE algorithm generally consists of two parts: the lower level encryption algorithm and the upper level encryption algorithm. Given the secret key K(n) and an integer v ∈Z_{q}, the lower level encryption algorithm can be expressed as Enc_{l} = (K(n),v) = (c_{1}, …, c_{n + 1}); the specific algorithm is shown as Eq. (1).
where r_{1},…,r_{h}, rs_{1},…,rs_{m}, rv_{1},…,rv_{h1} and rr are random integers uniformly sampled from Z_{q}. For correctness, we require a ≠ 0 t_{i} ≠ 0 for 1 ≤ i ≤ h, andS(i)is defined as \( S(i)={\sum}_{j=1}^m{s}_{ij}\ast {rs}_j \).
The lower level encryption algorithm is only used to generate the key element in the fourth part Φ of key. Assume in key K(n), Θ = [θ_{1},…, θ_{l}] has been defined, and it satisfies l ≤ n2. For each element θ in Θ, n + 1 ciphertexts C_{θ1}, …,C_{θ(n + 1)} can be obtained according to Eq.(1), which is element ϕ in key Φ. Therefore, Φ can be defined as Eq. (2).
And the specific definition of ϕ_{i} is:
where ϕ_{l + 1} is the ciphertext result obtained through encryption of integer 1. If it satisfies the requirement of loworder encryption algorithm, it can use maximal n − 1 constraints.
Assume ru_{1},…,ru_{l1}, and ru_{l} are all random integers samples from Ζ_{q}, ru_{l + 1} and plaintext v are satisfied \( {ru}_{l+1}=v{\sum}_{i=1}^l{ru}_i\ast {\theta}_i\operatorname{mod}q \). In key K(n), the third and fourth parts are Θ = [θ_{1},…θ_{l}] and Φ=[ϕ_{1}, ⋯, ϕ_{l + 1}] respectively, every plaintext can be encrypted into l + 1 ciphertexts. And then, the upper level encryption algorithm can be expressed as Eq. (4).
where c_{i} = ru_{1} × c_{θ1i} + … + ru_{l + 1} × c_{θ(l + 1)i}.

3.
Decryption algorithm
The decryption algorithm uses key K(n) to decrypt ciphertext (c_{1},…,c_{n + 1}) into plaintext v, and it mainly involves the following steps:

RR = c_{Π(n + 1)} mod q;

RS_{m} = c_{Π(n)} − t_{n} ∗ RR mod q;

\( {RS}_u=\kern1em {c}_{\Pi (i)}{t}_i\ast RR{\sum}_{j=u+1}^m{s}_{ij}\ast {RS}_j\operatorname{mod}q \)
where u ranges from m − 1 to 1,i = u + h;

\( F=\kern1em {\sum}_{i=1}^h\left(\left({c}_{\prod (i)}{\sum}_{j=1}^m\ast {RS}_j\right)/{t}_i\right)\operatorname{mod}q \);

v = F/a mod q.
In the above definition, the decryption algorithm is described in five steps by using intermediate variables, such as RS_{u} and F. Actually, we can fuse these steps and then we can get a linear form of the decryption algorithm as Eq. (5).
Compared to the common fully homomorphic encryption algorithm, LFHE can provide good execution efficiency, which has certain practical value and realistic significance. The defects mainly consist of two aspects: (1) the algorithm can only support integer homomorphic operation, but do not support homomorphic operation of floatingpoint data, so they cannot satisfy the requirement of actual application; (2) it has certain limitation on the aspect of security, which has the risk of leaking the key. The reason why the attacker is able to decode all ciphertexts information based on the PEK is that the relative location of key elements k_{i} is maintained the same when the LFHE scheme uses the key to encrypt plaintext data, so the attacker is still able to decode the key information by solving the equations.
In this chapter, a new fully homomorphic encryption algorithm is proposed to support floatingpoint operation, which increase its application scene range, and makes further improvements in the areas of security flaws. In the meantime, in order to improve the execution efficiency of algorithm, we combine the MapReduce framework to realize fully homomorphic encryption of parallel floatingpoint number.
3.2 MapReduce model
The MapReduce parallel computation framework is a parallel program execution system, and it provides the parallel processing model and process that consists of the two stages of Map and Reduce. The Map function and Reduce function provide two highlevel abstract models and interfaces for parallel programming, and the programmer only needs to realize these two interfaces to quickly complete parallel programming.
The basic processing procedure of MapReduce parallel programming model is as follows:

Various Map nodes conduct parallel processing of divided data, generating corresponding intermediate results from different input data and output the results;

Various Reduce nodes also conduct parallel computation, and they are responsible of processing the datasets of different intermediate results;

The processing of all Map nodes must be completed before the Reduce processing, so it requires a synchronous barrier (Barrier) before the Reduce processing.

By summarizing the output results of Reduce nodes, the final result can be obtained.
4 The proposed full homomorphic encryption algorithm supporting floatingpoint operation
4.1 The proposed FFHE algorithm
The FFHE encryption scheme proposed in this paper supports both integer and floatingpoint number operations (in the following part, it will be illustrated with floating point number as example), which simultaneously has the characteristics of addition homomorphism and multiplication homomorphism. This algorithm mainly consists of three parts: generation of key, encryption algorithm, and decryption algorithm.
Generation of key: assume k and s are ndimension key vectors, set K(n) = [(k_{1},s_{1}),…, (k_{n},s_{n})], where k_{i}∈R, s_{i}∈R and n > 3, and they satisfy Eq. (6).
Encryption algorithm: assume v is the floatingpoint number that needs to be encrypted. The specific encryption process mainly consists of the following steps:

1.
Randomly generate n − 1 pairs of floatingpoint number sets P = [(r_{1}, p_{1}),…,(r_{n1}, p_{n1})] as the encrypted noise.

2.
Compute the order ciphertext C′ which includes nciphertexts, and the specific computation Equation is:
in which v∈R.

3.
Define the mapping function Π:
Rearrange the ciphertext fragments according to the output result of mapping function Π, and generate outoforder ciphertext C″; according to the mapping result of function Π, map the ith child ciphertext c_{i} of order ciphertext C′ into the jth child ciphertext of outoforder ciphertext C″, denoted as c_{dj}, so d_{j} = i. In which, the subscript j indicates that c_{dj} is at the jth position of ciphertext C″. For i∈[1,2,…,n], define the set of all mapping results as J, so the child ciphertexts c_{i} and c_{dj} satisfy:
According to Eq. (9), function Π maintains the relationship among the child ciphertexts of C′ and C″. The mapping results of function Πare random, and the mapping results for different ciphertext C′ are independent from each other. Therefore, the child ciphertexts order of different ciphertexts do not influence each other, and they are all random arrangement.

4.
Use the AES (Advanced Encryption Standard) encryption algorithm to encrypt mapping array J and generate child ciphertext c_{n + 1}, i.e., c_{n + 1} = Enc(J), and ciphertext C′ and child ciphertext c_{n + 1} are the final encryption result \( C=\left[{c}_{d_1},\cdots {c}_{d_n},{c}_{n+1}\right] \) of plaintext v.
Decryption algorithm: the process to decrypt ciphertextCinto plaintext v mainly consists of the following three steps:

(1)
Use the AES algorithm to decrypt ciphertext c_{n + 1} and obtain array J, determine the child ciphertext c_{i} according to Eq. (9), and build corresponding relationship between c_{i} and key elements k_{i} and s_{i};

(2)
Compute S:

(3)
Compute plaintext v:
Specifically, based on Eqs. (7) and (11), the derivation process of Eq. (11) can be described as follows:
4.2 Homomorphism proof
For this scheme, the security parameter is n. During the homomorphic addition and multiplication operations, the n child ciphertexts of ciphertext C″ are believed as participating in computation by default. Unless it is pointed out otherwise, child ciphertext c_{n + 1} is only used as the ciphertext to reflect the mapping relation, which does not participate into the addition and multiplication operations of child ciphertext. In the improved FFHE scheme, the encryption and decryption operations can be reflected by the following expressions:
4.2.1 Addition homomorphism
For plaintexts v_{1} and v_{2}, assume their ciphertext data after encryption are C_{1} and C_{2}, respectively, then
In this scheme, the homomorphic addition operation of ciphertexts C_{1} and C_{2} is defined as vector addition. However, because the child ciphertexts have been randomly shuffled, the child ciphertexts c_{1dj} and c_{2dj} at corresponding locations of C_{1} and C_{2} are not necessarily encrypted from the same key pair k_{i} and s_{i}, so the child ciphertexts at corresponding locations cannot be directly added.
If ciphertext C is decrypted as original ciphertext C′, and addition homomorphism operation is completed by adding the child ciphertexts at corresponding locations of C_{1}′ and C_{2}′, the attacker might obtain corresponding location relation between child ciphertext c_{i} and keys k_{i} and s_{i}, and crack the keys.
This paper utilized the mapping function to regenerate a group of new mapping relationships, denoted as J_{adj}. Based on J_{adj}, adjust the arrangement of the child ciphertexts of outoforder ciphertexts C_{1}″ and C_{2}″ into new outoforder arrangement. Assume the ciphertexts are \( {C}_{1\_ adj}^{{\prime\prime} }=\left[{c}_{1{d}_1},\cdots, {c}_{1{d}_n}\right] \) and \( {C}_{2\_ adj}^{{\prime\prime} }=\left[{c}_{2{d}_1},\cdots, {c}_{2{d}_n}\right] \) after adjustment, and the adjustment method is:
Adjust the child ciphertext order of C_{1}″ and C_{2}″, generate new ciphertexts \( C{\hbox{'}\hbox{'}}_{1\_ adj}=\left[{c}_{1{d}_1}\cdots {c}_{1{d}_n}\right] \) and \( C{\hbox{'}\hbox{'}}_{2\_ adj}=\left[{c}_{2{d}_1}\cdots {c}_{2{d}_n}\right] \), add corresponding terms of ciphertexts C″_{1_adj} and C″_{2_adj}, and use the new mapping relation J_{adj} as child ciphertext c_{n + 1}, i.e.,
where ⊕ denotes the addition operation of ciphertext vectors. Using the Eq. (12), we decrypt the ciphertext of homomorphic addition:
In other words, they are the corresponding results of plaintext addition. In summary, it can be inferred that the FFHE scheme has additive homomorphism.
4.2.2 Multiplication homomorphism
Assume C_{1} and C_{2} are the generated ciphertexts of plaintexts v_{1} and v_{2} after using key K(n) for encryption (K(n) can be different). The child ciphertext c_{n + 1} has mapping relation, which does not participate in the operation, then we can obtain a n ∗ n ciphertext matrix:
Using Eq. (13), we conduct decryption operation of ciphertext matrix according to rows or lines (here, we conduct decryption based on lines), i.e.:
LFHE scheme supports the multiplication operation between plaintext constant and ciphertext vector. Assume d∈Z_{n}, then d ⊙ C = (d^{∗}c_{1} mod q,…, d*c_{n + 1} mod q) in which ⊙ represents the multiplication operation between plaintext constant and ciphertext vector. Then, according to the property of homomorphic addition, this multiplication operation also satisfies the homomorphic decryption algorithm, i.e., Dec(K(n), d ⊙ C) = d^{∗}Dec(K(n), C) mod q. So, we can obtain:
Ciphertext C^{*} is the result of ciphertext multiplication, and its ciphertext dimension and child ciphertext order are the same as that of ciphertext C_{2}. Similarly, if the decryption is conducted based on rows, the dimension of ciphertext C^{*}and the order of child ciphertext should be maintained the same as ciphertext C_{1}, and by decrypting ciphertext C^{*}, we can obtain the product of v_{1}^{∗}v_{2}.
In conclusion, this scheme has multiplication homomorphism. After executing the homomorphic multiplication operation, the number of child ciphertexts will be maintained the same, which will not cause the expansion of ciphertext data.
4.3 Security analysis
In order to avoid the problem of cracking the key through the linear equations in the LFHE algorithm that may occur in this algorithm, this paper introduces a new mapping function Π, and through the mapping function Π, it can turn the order ciphertext after reach encryption to randomly generate outoforder ciphertext. The mapping function can ensure that the orders of ciphertext fragments obtained from plaintext data v and v′ through encryption algorithm are independent and irrelevant, and each mapping is random with no rules. For random and independent mapping relationship Π, during execution of certain encryption operation, it requires using a convenient and effective method to save the relative order of result ciphertext (i.e., the specific mapping relationship of this mapping Π into the result ciphertext for subsequent homomorphic operation or decryption operation). Without the assistance of mapping relationship, even the legitimate user cannot accurately match the corresponding relationship between key k_{i} and ciphertext fragment c_{i} and accurately decrypt the original plaintext.
This paper encrypts each specific corresponding relationship of mapping relationship Π as critical data and adds it to the end of result ciphertext C as additional ciphertext fragment c_{n + 1}, which can be used as the baseline to localize ciphertext fragment during subsequent operation. Therefore, in this paper, the final ciphertext after encryption is C_{v, Π} = (c_{Π(0)}, ⋯, c_{Π(n)}), and for different plaintext v, the child ciphertext arrangement [d_{1},…,d_{n}] of different ciphertext C is independent and random, without any relationship between them. Based on the above analysis, we can draw the following conclusion.
Theorem 1 Adopting the Chosenciphertext attack model, the probability of obtaining key from known ciphertexts is 1/n!^{n}.
Proof We assume that the order of ciphertext C′ is randomly disrupted, which contains n child ciphertexts, and there are n! different arrangements. If the n child ciphertexts are chosen to crack the key, the accurate coefficients 1/(k_{i}*S) and 1/(k_{n}*s_{n}*S) of decryption algorithm can only be obtained when the arrangements of n child ciphertexts are completely consistent. Because each ciphertext C′ has n! different arrangements, n groups of ciphertexts have n!^{n} combinations and the probability of accurately obtaining the coefficients is n!/n!^{n}. Even after obtaining the accurate coefficients 1/(k_{i}*S) and 1/(k_{n}*s_{n}*S), there are still n! possible arrangements, so the probability of obtaining accurate coefficients and recovering the original relative order is 1/n!^{n}, and the time complexity is O(n!^{n}). That is, the probability of obtaining the key is 1/n!^{n}. According to Lemma 1, we have that this scheme cannot be cracked within linear time, and related information of key cannot be obtained.
5 Design of parallel algorithm based on MapReduce
This paper proposes a parallel floatingpoint number encryption scheme based on MapReduce, which combines the parallel characteristics of cloud computing with the floatingpoint encryption algorithm to realize parallel encryption through plaintext blocking, and it has significantly increased the encryption efficiency.
5.1 Algorithm procedure
In the MapReduce programming model, the Split function is used to split the input data into data blocks with fixed size according to the user’s requirement, and then, these blocks will be distributed to different slave nodes by the master node based on corresponding scheduling mechanism. The Map function conducts corresponding operation of each data block after splitting based on the userdefined encryption algorithm. Each Map completes one part of final result, and each Reduce is responsible of integrating all partial results completed by Maps. Each encryption computation of parallel encryption scheme is independent, so it can be distributed to multiple Maps for simultaneous encryption. It can be defined as a cubic polynomial time algorithm ∏ = (Split, Map, Reduce), and the specific process is as shown in Fig. 1.
5.2 Split algorithm
Assume the plaintext file size is L(MB), the number of cluster processing nodes is P, and the original file is split into t data blocks (t ≥ 1). We give the specific split algorithm as algorithm 1. In which, pos refers to the location of currently processed data in the original file; i represents the ith data block; l_{i} represents the size of the ith block (i ≤ t). The specific process is as follows: Open the bigdata file to be encrypted, use the pos variable to save the offset of first byte in the file, and when current data under processing has not reached the end of file, use Eq. (22) to calculate the length l_{i} of the ith fragment. Filebuffer refers to the content saved in the ith block; Key refers to the offset of the start of ith block in the file; value is the value saved in each filebuffer. pos points to the next shard The size of each data block l_{i} can be calculated based on Eq. (22).
5.3 “Map” function and “Reduce” function
After the splitting stage, each Mapper will independently compute part of ciphertext. Each Mapper will conduct the encryption process of steps 1 ~ 4 in the encryption algorithm of Section 4.1, before each encryption of data, generate n − 1 pairs of encrypted noise; then, compute the order child ciphertext c_{i} according to Eq. (7); finally, generate outoforder ciphertext with the mapping function.
The definition of the specific interface of Map ( ) function is as follows: public void map (Object key, Text value, Context context) throws IOExecption, Interrupted Exception. In which, the parameter key is the key value passed into map; value is the value of corresponding key value; and context is the context object parameter, which is the context object of Hadoop to accessed by the program. For each floatingpoint number in each data block, repeat executing the Map algorithm in Algorithm 2.
Reduce function waits for the partial ciphertext computation by all Map functions to be completed and then conducts sorting according to the key value. Because the key value is the offset of text, the sorting result is the readin order of file. When writing in the file, only the value part is output, and the final file splices partial ciphertexts based on the order and forms splices ciphertext for output.
5.4 Performance analysis
The encryption process of floatingpoint number FFHE scheme can be divided into two stages: the preparation stage and encryption stage. The first stage mainly involves the generation and check of key, the second stage mainly involves the data encryption operation, and they are the main parts of algorithm performance analysis. In the improved FHE scheme, the operation granularity is floatingpoint number. In the computer, the addition operation, shift operation and assignment operation have close complexity. An X operation is defined in this paper to uniformly express the above three operations.
Assume the file with the size of L(MB), contains N floatingpoint numbers, the total encryption time of plaintext file is T_{seq}, the generation and check time of key is T_{key}, the encryption time is T_{Enc}, and T_{seq} can be expressed by Eq. (23).
The preparation stage mainly involves the generation of key K(n), including the generation of two ndimension vectors, i.e., keys k and s. By adding subsidiary conditions, the preparation stage consists of 2n fixed assignment operations, so T_{key} consists of 2n X operations.
The data encryption stage mainly involves the addition, multiplication, division, and assignment operations. The part to generate random noise involves 2(n − 1) assignment operations. Execute encryption algorithm to real number v and obtain ndimension ciphertext array. In which, the first n − 1 child ciphertexts correspond to 2(n − 1) multiplication operations and 2(n − 1) addition operations, and there are 4(n − 1) X operations in total. The child ciphertext c_{n} mainly consists of two multiplication operations, n − 1 addition operations and n − 1 division operations, which can be expressed as 2(n − 1) + 2 X operations. The random sorting operation involves n mapping and n assignment operations of mapping function Π, as well as deterministic encryption operation that includes m X operations, which can be expressed as 2n + m X operations, and it require the following number of X operations in order to encrypt N floatingpoint number plaintexts:
Assume one X operation takes time of T_{fc}, then, the FHE parallel encryption algorithm that includes N floatingpoint number takes time of T_{seq}:
When N> > n, the value of 2n (i.e., T_{key}) can be ignored; however, with the increase of N, the encryption time generally presents linear increase.
During the parallel encryption process, assume there is no overlapping during the operation process, and the execution time of parallel encryption algorithm consists of four parts, i.e.:
In which, T_{comm} is the communication time, T_{key} is the generation and check time of key, T_{Map} is the parallel encryption time of Map, and T_{reduce} is the time to merge encrypted ciphertexts according to the key value.
During the parallel encryption stage of Map, each slave node would have communication with host during the start and ending stages of task, and the plaintext of N floatingpoint numbers are divided into t data blocks, so it requires overhead for at least 2 t data communications, and we can set T_{comm} = ξ_{1}tT_{fc}.
Assume each data block contains x floatingpoint numbers, then x = N/t. T_{i} represents the time required to encrypt the ith data block, then T_{i} = x × (10n6 + m) × T_{fc}. Set S_{T} as the speedup ratio of each Map during the parallel encryption stage, then
In the actual application scenario, both the file partition number t and the number of child ciphertexts n are significantly smaller than the floatingpoint number M in the plaintext, i.e., t, n < <M. In addition, the communication time can be ignored, so we can know that the speedup ratio S_{T} is close to N/x, i.e., the block number t of plaintext.
For plaintext data with the same size, the generated ciphertexts also have the same size. Assume it requires reduce time of T_{ric} for each floatingpoint number to generate ciphertext, then the plaintext that contains N floatingpoint numbers requires the time of T_{reduce} = N × T_{ric}, and it can be seen that T_{reduce} is proportional to the size of generated ciphertext.
Considering Reduce takes a lot of time, and the experiment involves 16 nodes, so in this experiment, the number of Reduce is 15, and the time required by parallel encryption can be expressed as:
when the value of N is high, T_{key} and T_{comm} can be ignored. Therefore, it can be seen that during parallel encryption, if N stays the same, with the increase of t, the time consumed by Reduce also stays the same, the time consumed by Map gradually declines, and the time consumed by Reduce gradually becomes dominant.
If S_{P} is used to represent the overall speedup ratio, S_{P} can be expressed as:
It can be seen that under fixed core number p, when t∈(kp,kp + p] (in which k is a natural number), the speedup ratio η_{T} presents growth trend, and it will not exceed p.
6 Experimental results and analysis
The hardware platform of experiment includes 1 Master node and 3 Slave nodes. The Master node is responsible of the monitoring and scheduling of tasks, and the Slave nodes are responsible of the distributive storage data file and computation task, see “Table 1experiment cluster node configuration” for the specific hardware configuration and software environment for each node.
In this experiment, data test was conducted from two main different perspectives: in the first scenario, plaintext data with different sizes were chosen to compare their encryption speed and speedup ratio in different serial and parallel environment; in the second situation, plaintext data with fixed size were chosen to compare their encryption speed and speedup ratio under different block sizes. In the first situation, the chosen plaintext data had the sizes of 256 MB, 512 MB, 768 MB, 1024 MB, 1280 MB, 1536 MB, 1792 MB, and 2048 MB, the default data block size was 64 MB in the parallel environment, and the encryption test was conducted in both serial and parallel environment. For the second situation, the plaintext data with the sizes of 2G and 4G were chosen in the experiment, the data fragment numbers were 1, 4, 8, 12, 16, 20, 24, 28, and 32, respectively, and their encryption speeds were tested. In the experiment, the size of floatpoint numbers is 32 bit, and the dimension of the security parameter n is 128 bit.
In the experiment, 4 computation nodes were used, and each node had 4core CPU, so the CPU had total 16 cores. In the parallel experiment, we found that with the increase of plaintext data volume, the time occupied by Reduce would keep growing, and in order to increase the efficiency, the number of Reduce was all set as 15 in parallel experiment.
In this paper, the file encryption time and overall speedup ratio under different file sizes are summarized in the serial and parallel environment, and the results are shown in Table 2, Figs. 2 and 3. Tables 3 and 4 have recorded the overall encryption time of file, the execution time of Map process, and the overall speedup ratio and the speedup ratio of Map process when the plaintext size is 2G and 4G, respectively.
According to Table 2 and Figs. 2 and 3, it can be seen that under fixed number of nodes: (1) the time required by serial encryption is basically proportional to the plaintext size; (2) the time required by parallel encryption will increase with the increase of plaintext; (3) when t < p, the time consumed by Reduce function will gradually increase with the increase of t, and with the time consumed by Map function stayed the same, the proportion of time consumed by Reduce function in the overall parallel encryption process will gradually increase; (4) when t < p, the increase of speedup ratio S_{P} is fast, and it will reach the highest value when t = p. When t > p, for each t∈(kp,kp + p], the speedup ratio presents the trend of slow growth, and it will reach the highest value when t = (k + 1) × p.
Figures 4 and 5 show the encryption time of 2GB and 4GB files allocated to different cores in parallel environments. According to Figs. 4 and 5, we can see that with the increase of usable cores and file partitions in the cluster: (1) for plaintext bigdata file with certain length, with the increase of Map quantity, the file encryption time presents a general trend of decline, and the time consumption will be the lowest when the Map quantity equals the node number; (2) the time consumed by max Map will gradually decline, because with the increase of Map quantity, the size of each Map data block will decline, and the timeconsuming of Map mainly concentrates on the encryption operation, so the time consumed by this part will be low. The time consumed by Reduce is basically the same, because no matter how high the Map quantity is, the number of Reduce is always 15.
Figures 6 and 7 compares the Map speedup and General speedup of 2GB and 4GB files under different cores in parallel environments. According to Figs. 4 and 5, we can see that with the increase of usable cores in the cluster: (1) the speedup ratio of Map will increase with the increase of Map quantity, and it will always be lower than the Map quantity, which is consistent with the theoretical analysis in previous section; (2) the speedup ratio of general also increase with the increase of Map quantity, but the acceleration ratio tends to be stable when the Map quantity equals the node number. During the early stage, with the increase of usable cores, the file encryption time presents significant decline, and the cluster performance can be effectively carried out; when all cores of cluster are used in the computation equation, the increase of Map quantity will have little influence on the improvement of cluster performance, and the file encryption time will become stable.
7 Conclusions
With the rapid development of cyber physical systems technology, the privacy protection problem of data in cyber physical systems has become more and more important. Most of the existing fully homomorphic encryption algorithms are limited to process the integer type. In order to expand the practical application range of the existing fully homomorphic encryption algorithm, we propose a parallel fully homomorphic encryption scheme that supports floatingpoint operation. The proposed scheme can enhance the algorithm security by using outoforder ciphertexts operations. In addition, we also design and implement an efficient algorithm performed on the MapReduce platform based on the proposed scheme. Specifically, during the encryption process, a file is divided into different number of data blocks, and the algorithm’s parallelism can be controlled by specifying the usable cores and the number of partitions. Meanwhile, the multiple Reduce functions can be parallel carried out to alleviate the high realtime cost of Reduce operation. The experimental results show that, compared to the traditional linear encryption algorithm, the proposed algorithm obtains the greater speedup ratio when processing big data files in MapReduce cluster.
References
F. Pasqualetti, F. Dörfler, F. Bullo, Attack detection and identification in cyberphysical systems. IEEE Trans. Autom. Control 58(11), 2715–2272 (2013)
R. Rajkumar, I. Lee, L. Sha, et al., 44.1 Cyberphysical systems: The next computing. Theol Rev. 14(6), 731–736 (2010)
J. Wang, R. Zhu, S. Liu, A differentially private unscented Kalman filter for streaming data in IoT. IEEE Access 6(99), 6487–6495 (2018)
R. Zhu, X. Zhang, X. Liu, et al., ERDT: Energyefficient reliable decision transmission for intelligent cooperative spectrum sensing in industrial IoT. IEEE Access. 3(28), 2366–2378 (2015)
K. Zhu, R. Zhu, H. Nii, et al., PaperIO: a 3D interface towards the internet of embedded papercraft. IEICE Trans inf System. 97(10), 2597–2605 (2014)
B. Dan, E. Kushilevitz, R. Ostrovsky, W.E. Skeith, Public key encryption that allows PIR queries, Advances in Cryptology CRYPTO (2007), pp. 50–67
H. Avni, S. Dolev, N. Gilboa, X. Li, in Proc. of ALGOCLOUD, Patras, Greece. SSSDB: Database with private information search (2015), pp. 49–61
Q. Liu, G. Wang, J. Wu, Secure and privacy preserving keyword searching for cloud storage services. J. Netw. Comput. Appl. 35(3), 927–933 (2012)
K. Gu, W.J. Jia, J.M. Zhang, Identitybased multiproxy signature scheme in the standard model. Fund. Inform. 150(2), 179–210 (2017)
X.B. Shen, W. Liu, I.W. Tsang, et al., Multilabel prediction via crossview search. IEEE Trans. Neural Netw. Learn. Syst. 29(9), 4324–4338 (2018)
X.B. Shen, F.M. Shen, Q.S. Sun, et al., Semipaired discrete hashing: Learning latent hash codes for semipaired crossview retrieval. IEEE Trans. Cybern. 47(12), 4275–4288 (2017)
C.Y. Yin, J.W. Xi, R.X. Sun, J. Wang, Location privacy protection based on differential privacy strategy for big data in industrial internet of things. IEEE Trans. Ind. Inf. 14(8), 3628–3636 (2018)
S.K. Pasupuleti, S. Ramalingam, R. Buyya, An efficient and secure privacypreserving approach for outsourced data of resource constrained mobile devices in cloud computing. J. Netw. Comp. Appl. 64(C), 12–22 (2016)
S. Gajek, Symmetric Searchable Encryption from Constrained Functional Encryption, in Cryptographers’ Track at the RSA Conference (Springer, Cham, 2016), pp. 75–89
M. Long, F. Peng, H.Y. Li, Separable reversible data hiding and encryption for HEVC video. J. RealTime Image Proc. 14(1), 171–182 (2018)
J. Wang, C.W. Ju, Y. Gao, A.K. Sangaiah, G.J. Kim, A PSO based energy efficient coverage control algorithm for wireless sensor networks. Comp. Mater. Continua 56(3), 433–446 (2018)
J. Wang, Y. Cao, B. Li, H.J. Kim, S.Y. Lee, Particle swarm optimization based clustering algorithm with mobile sink for WSNs. Futur. Gener. Comput. Syst. 76, 452–457 (2017)
Y. Lindell, B. Pinkas, Secure multiparty computation for privacy preserving data mining. J. Priv. Confid. 25(2), 761–766 (2009)
I. Damgård, A. Polychroniadou, V. Rao, in Proc. of PKC, New York. Adaptively secure multiparty computation from LWE via equivocal FHE (2016), pp. 208–233
X.B. Shen, F.M. Shen, L. Li, et al. Multiview discrete hashing for scalable multimedia search, in Proc. of ACM TIST, 2018
Q. Zhou, G. Yang, S. Li, L. Chen, An integritychecking private data aggregation algorithm. J. Electron. Inform. Technol, 35(6), 1277–1283 (2013)
J. Wang, Z.Q. Zhang, B. Li, S.Y. Lee, R.S. Sherratt, An enhanced fall detection system for elderly person monitoring using consumer home networks. IEEE Trans. Consum. Electron. 60(1), 23–29 (2014)
E.B. Tirkolaee, A.A.R. Hosseinabadi, M. Soltani, A.K. Sangaiah, J. Wang, A hybrid genetic algorithm for multitrip green capacitated arc routing problem in the scope of urban services. Sustain 10, 5 (2018)
D. Micciancio, A first glimpse of cryptography’s holy grail. Commun. ACM 53(3), 96–96 (2010)
R.L. Rivest, L. Adleman, M.L. Dertouzos, in Foundations of Secure Computation, London. On data banks and privacy homomorphisms (1978), pp. 169–179
R.L. Rivest, L. Adleman, M.L. Dertouzos, A method for obtaining digital signatures and public key cryptosystems. Commun. ACM 21(2), 120–126 (1978)
T. Elgamal, A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inform. Theor. 31(4), 469–472 (1985)
P. Paillier, in Proc. of Eurocrypt’99. Publickey cryptosystems based on composite degree residuosity classes (1999), pp. 223–238
C. Gentry, in Proc. of the Annual ACM Symposium on Theory of Computing , Bethesda. Fully homomorphic encryption using ideal lattices (2009), pp. 169–178
M. Dijk, C. Gentry, S. Halevi, V. Vaikuntanathan, in Proc. of EUROCRYPT’2010. Full homomorphic encryption over the integers (Springer, Berlin, 2010), pp. 24–43
Z. Brakerski, V. Vaikuntanathan, in Foundations of Computer Science. IEEE. Efficient fully homomorphic encryption from (standard) LWE (2011), pp. 97–106
D. Stehlé, R. Steinfeld, Making NTRU as Secure as WorstCase Problems over Ideal Lattices, in Proc. of EUROCRYPT’2011, LNCS (2011), pp. 27–47
Z. Brakerski, C. Gentry, V. Vaikuntanatha, in Proc. of the 3rd Innovations in Theoretical Computer Science Conf, New York. (Leveled) fully homomorphic encryption without bootstrapping (2012), pp. 309–325
Z. Brakerski, V. Vaikuntanathan, in Proc. of CRYPTO, Berlin. Fully homomorphic encryption from ringLWE and security for key dependent messages (2011), pp. 505–524
A. LópezAlt, E. Tromer, V. Vaikuntanathan, in Proc. of the Annual ACM Symposium on Theory of Computing, New York. Onthefly multiparty computation on the cloud via multikey full homomorphic encryption (2012), pp. 1219–1234
C. Gentry, A. Sahai, B. Waters, in Proc. of the 33rd Annual International Cryptology Conference, Berlin. Homomorphic encryption from learning with errors: Conceptually simpler, asymptoticallyfaster, attribute based (2013), pp. 75–92
J.H. Cheon, J.S. Coron, J. Kim, M.S. Lee, T. Lepoint, in Proc. of CRYPTO 2013, Berlin. Batch full homomorphic encryption over the integes (2013), pp. 315–335
J.N. Gaithuru, M. Bakhtiari, Insight Into the operation of NTRU and a Comparative Study of NTRU, RSA and ECC public key cryptosystems, in Software Engineering Conference (2014), pp. 273–278
H. Chen, Y.P. Hu, Z. Lian, Double batch for RLWEbased leveled fully homomorphic encryption. Chin. J. Electron. 24(3), 661–666 (2015)
J.H. Cheon, J. Kim, M.S. Lee, A. Yun, CRTbased fully homomorphic encryption over the integer. Inform. Sci. An Intern. J 310(C), 149–162 (2015)
S. Garg, C. Gentry, S. Halevi, A. Sahai, B. Waters, in Proc. of 33rd Annual Cryptology Conf , Berlin. Attributebased encryption for circuits from multilinear map (2013), pp. 479–499
D. Tan, H. Wang, Fully homomorphic encryption based on the parallel computing. KSII Trans. Int. Inform . Syst 12(1), 497–522 (2018)
D. Liu, Practical Fully Homomorphic Encryption without Noise Reduction. Cryptology ePrint Archive, [Online]. Available: http://eprint.iacr.org/2015/468.pdf
D. Liu, Efficient processing of encrypted data in honestbutcurious clouds, IEEE cloud (2017), IEEE Computer Society (2017), pp. 970–974
X. Liu, R.H. Deng, K.K.R. Choo, J. Weng, An efficient privacypreserving outsourced calculation toolkits with multiple keys. IEEE Trans. Inform. Forensics Sec. 11(11), 2401–2414 (2016)
X. Liu, R. Choo, R. Deng, R. Lu, J. Wengl, Efficient and PrivacyPreserving Outsourced Calculation of Rational Numbers, IEEE Trans on Dependable and Secure Computting, PP(99), 27–39 (2018)
M. Brenner, J. Wiebelitz, G.V. Voigt, M. Smith, in Proc. of IEEE International Conference on Digital Ecosystems and Technologies Conference(DEST). Secret program execution in the cloud applying homomorphic encryption (2011), pp. 114–119
C.S. Lu, Homomorphic encryptionbased secure SIFT for privacypreserving feature extraction. Proc. of SPIE 7880(2), 788005 (2011)
M. Naehrig, K. Lauter, V. Vaikuntanathan, in Proc. of ACM CCSW, ACM, Chicago. Can homomorphic encryption be practical? (2011), pp. 113–124
K. Gjøsteen, M. Strand. Fullyhomomorphic encryption must be fat or ugly? Cryptology ePrint Archive, [Online]. Available: http:// eprint.iacr.org/2016/105.pdf
M. Chase, K. Lauter, J. Benaloh, A.Z. Horvitz, Patient controlled encryption: Patient privacy in electronic medical records , in Proc of Cloud Computing Security Workshop (2009), pp. 103–114
Y. Tu, Y. Lin, J. Wang, J.U. Kim, Semisupervised learning with generative adversarial networks on digital signal modulation classification. Comp. Mater. Continua 55(2), 243–254 (2018)
D.J. Zeng, Y. Dai, F. Li, R.S. Sherratt, J. Wang, Adversarial learning for distant supervised relation extraction. Comp. Mater. Continua 55, 121–136 (2018)
J. Wang, J.Y. Cao, S. Ji, J.H. Park, Energy efficient clusterbased dynamic routes adjustment approach for wireless sensor networks with mobile sinks. J. Supercomput. 73(7), 3277–3290 (2017)
J. Yao, K. Zhang, Y.T. Yang, J. Wang, Emergency vehicle route oriented signal coordinated control model with twolevel programming. Soft. Comput. 22(13), J4283–J4294 (2018)
Y.J. Ren, Y.P. Liu, S. Ji, A.K. Sangaiah, J. Wang, Incentive Mechanism of Data Storage Based on Blockchain for Wireless Sensor Networks, Mobile Information Systems, Volume 2018, Article ID 6874158 2018, 10.1155/2018/6874158/
Z. Min, G. Yang, J.Q. Shi, A privacypreserving parallel and homomorphic encryption scheme. Open Physics 15(1), 135–142 (2017)
J.H Cheon , A. Kim , M. Kim and Y Song. FloatingPoint Homomorphic Encryption, [Online]. Available: http:// eprint.iacr.org /2016/421.pdf
Arita S, Nakasato S. Fully Homomorphic Encryption for Point Numbers , [Online]. Available: http://eprint.iacr.org /2016/402.pdf
Costache A, Smart N P, Vivek S, et al. Fixed point arithmetic in she schemes, [Online]. Available: http://eprint.iacr.org /2016/250.pdf
Armknecht F, Boyd C, Carr C, et al. A Guide to Fully Homomorphic Encryption, [Online]. Available: http://eprint.iacr.org /2015/1192.pdf
Funding
This work was supported in part by the National Natural Science Foundation of China under the Grant 61872197, Grant 61572263, Grant 61502251 and Grant 61502243, in part by the Colleges and Universities in Jiangsu Province plans to graduate research and innovation under Grant KYLX_0816, and in part by the Natural Science Foundation of Jiangsu Province under the Grant BK20151511 and Grant BK2016151.
Availability of data and materials
We declared that materials described in the manuscript will be freely available to any scientist wishing to use them for noncommercial purposes, without breaching participant confidentiality.
Author information
Authors and Affiliations
Contributions
ZM and GY designed the study, performed the research, analyzed the data, and wrote the paper. All authors read and approved the final manuscript.
Corresponding author
Ethics declarations
Competing interests
The authors declare that they have no competing interests.
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
About this article
Cite this article
Min, Z., Yang, G., Sangaiah, A.K. et al. A privacy protectionoriented parallel fully homomorphic encryption algorithm in cyber physical systems. J Wireless Com Network 2019, 15 (2019). https://doi.org/10.1186/s1363801813179
Received:
Accepted:
Published:
DOI: https://doi.org/10.1186/s1363801813179