keyboard_arrow_up
Privacy-Aware White and Black List Searching for Fraud Analysis

Authors

William J Buchanan1, Jamie Gilchrist2, Zakwan Jaroucheh2, Dmitri Timosenko2, Nanik Ramchandani2, Hisham Ali1, 1Edinburgh Napier University, UK, 2Bright Red Triangle, UK

Abstract

In many areas of cybersecurity, we require access to Personally Identifiable Information (PII), such as names, postal addresses and email addresses. Unfortunately, this can lead to data breaches, especially in relation to data compliance regulations such as GDPR. An Internet Protocol (IP) address is an identifier that is assigned to a networked device to enable it to communicate over networks that use IP. Thus, in applications which are privacy-aware, we may aim to hide the IP address while aiming to determine if the address comes from a blacklist. One solution to this is to use homomorphic encryption to match an encrypted version of an IP address to a blacklisted network list. This matching allows us to encrypt the IP address and match it to an encrypted version of a blacklist. In this paper, we use the OpenFHE library [1] to encrypt network addresses with the BFV homomorphic encryption scheme. In order to assess the performance overhead of BFV, we implement a matching method using the OpenFHE library and compare it against partial homomorphic schemes, including Paillier, Damgard-Jurik, Okamoto-Uchiyama, Naccache-Stern and Benaloh. The main findings are that the BFV method compares favourably against the partial homomorphic methods in most cases.

Keywords

Partially Homomorphic Encryption, Fully Homomorphic Encryption, IP subnetting, BFV

Full Text  Volume 15, Number 17