2018
DOI: 10.1371/journal.pone.0202752
|View full text |Cite
|
Sign up to set email alerts
|

The Trusted Server: A secure computational environment for privacy compliant evaluations on plain personal data

Abstract: A growing framework of legal and ethical requirements limit scientific and commercial evaluation of personal data. Typically, pseudonymization, encryption, or methods of distributed computing try to protect individual privacy. However, computational infrastructures still depend on human system administrators. This introduces severe security risks and has strong impact on privacy: system administrators have unlimited access to the computers that they manage including encryption keys and pseudonymization-tables.… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 6 publications
0
4
0
Order By: Relevance
“…Our approach; using a trusted server for secure secondary use of data. To improve throughput, secure computation using a "trusted server" enables realistic and secure data use, and has been proposed as one form of implementation 34 . Essentially, it is necessary to have a one-stop system that can guarantee information theoretic security among the data owner, i.e., the authorized genomic data bank, and users, e.g., the medical doctor.…”
Section: Preset Work For Secure Secondary Use Of Data Methods (Multi-...mentioning
confidence: 99%
“…Our approach; using a trusted server for secure secondary use of data. To improve throughput, secure computation using a "trusted server" enables realistic and secure data use, and has been proposed as one form of implementation 34 . Essentially, it is necessary to have a one-stop system that can guarantee information theoretic security among the data owner, i.e., the authorized genomic data bank, and users, e.g., the medical doctor.…”
Section: Preset Work For Secure Secondary Use Of Data Methods (Multi-...mentioning
confidence: 99%
“…The novelty of our scheme is to introduce the share calculator to guarantee an integrity of the data. The trusted assumptions on processing hardware are practical and have often been introduced in secure multiparty computation studies [20,25]. In our case, we require that share calculations are performed secretly and the memory used to calculate MAC tags is long-term secure but small.…”
Section: Advantage Of Our Schemes (For Both Information Theoretical Security and Computational Security)mentioning
confidence: 99%
“…A problem of this setting is that the MAC generator enables to falsify the MAC tags easily due to the property of the universal2 hash function. Therefore, in the proposed scheme, we introduce "a trusted calculator" [20] for the MAC taggenerator. Such a concept of secure computation using a trusted hardware, which is trusted but has small long-term memory capacities, is used in practices (an example of such a device is in [21,22]).…”
Section: Introductionmentioning
confidence: 99%
“…To solve these two subjects, secure computation using "a trusted server" enables realistic and secure data use, and has been proposed as one form of implementation [27].…”
Section: Introductionmentioning
confidence: 99%