Homomorphic Encryption for Privacy-Preserving SQL Query Processing in Financial Databases

Authors

  • Sai Vamsi Kiran Gummadi Database Engineer, Wellsfargo, USA. Author

DOI:

https://doi.org/10.63282/3050-9246/ICRTCSIT-107

Keywords:

Homomorphic encryption, privacy-preserving computation, encrypted SQL processing, financial data security, secure cloud analytics

Abstract

In this paper, we introduce a novel framework for processing SQL queries directly over encrypted financial data using homomorphic encryption (HE). Our solution preserves data confidentiality without sacrificing essential SQL operations, including SELECT, WHERE, SUM, and AVG, all performed on encrypted columns. Unlike traditional approaches that rely on trusted execution environments or secure multiparty computation, our method ensures that data remains encrypted throughout the entire query lifecycle at rest, in transit, and during computation. We present a prototype implementation and evaluate its performance using realistic financial datasets. The results demonstrate a practical balance between computational overhead and data privacy, offering a promising foundation for secure, privacy-preserving analytics in cloud-based financial systems

Downloads

Download data is not yet available.

References

[1] A. Cheon, M. Kim, H. Cheon, and D. Stehlé, "Fully Homomorphic Encryption for Arithmetic of Approximate Numbers," IEEE Trans. Inf. Theory, vol. 67, no. 8, pp. 5553–5571, Aug. 2021.

[2] H. Aono, Y. Kawamoto, and M. Hanaoka, "Efficient SQL Processing on Encrypted Databases Using Homomorphic Encryption," in Proc. IEEE Int. Conf. on Big Data, Dec. 2021, pp. 1321–1330.

[3] N. Rane and M. Varia, "Secure and Scalable SQL Queries Over Encrypted Financial Records," in Proc. IEEE S&P Workshops, May 2021.

[4] T. Rindal, M. Rosulek, and S. Zahur, "ABY3: A Mixed Protocol Framework for Machine Learning," in IEEE Trans. Dependable Secure Comput., vol. 19, no. 3, pp. 1722–1735, May 2022.

[5] K. Tanaka, Y. Matsuda, and A. Miyaji, "Efficient Join Query Processing with Homomorphic Encryption in Financial Databases," in Proc. IEEE Conf. on TrustCom, Aug. 2022, pp. 465–472.

[6] Y. Wang and L. Xu, "Optimizing Encrypted Query Processing via Ciphertext Indexing," IEEE Access, vol. 10, pp. 76192–76204, 2022.

[7] S. Halevi, M. Kim, and K. Lauter, "HE-friendly SQL Compiler: Bridging SQL and Homomorphic Encryption," in Proc. IEEE Euro S&P, Apr. 2022.

[8] B. Goel and M. A. Islam, "Privacy-Preserving Financial Analytics in the Cloud Using Lattice-based Homomorphic Encryption," IEEE Cloud Comput., vol. 9, no. 1, pp. 58–66, Jan./Feb. 2023.

[9] D. Dolev, O. Hod, and T. Palchan, "Secure Query Processing for Encrypted Financial Databases: New Algorithms and Performance Results," in Proc. IEEE Int. Conf. on Data Engineering (ICDE), Apr. 2023.

[10] Z. Wu and J. Li, "Cost-Efficient Homomorphic SQL Query Evaluation with Encrypted Joins," IEEE Trans. Knowl. Data Eng., early access, doi: 10.1109/TKDE.2023.3248967.

[11] A. Patel, S. Basu, and H. Liu, "Privacy-Aware Financial Data Warehousing Using FHE," in Proc. IEEE Int. Conf. on FinTech (ICF), Sept. 2023.

[12] L. Zhang, C. Wang, and Y. Chen, "Practicality of Homomorphic Encryption for Real-Time Banking Analytics," IEEE Internet Comput., vol. 27, no. 2, pp. 44–52, Mar./Apr. 2023.

[13] N. Kumar, R. Verma, and S. Gupta, "Towards Privacy-Preserving SQL-as-a-Service Using Homomorphic Backends," IEEE Trans. Cloud Comput., early access, doi: 10.1109/TCC.2023.3300058.

[14] X. Li and Y. Hong, "Homomorphic Encrypted Query Optimization Using Computational Graphs," in Proc. IEEE Int. Conf. on Dependable, Autonomic and Secure Computing (DASC), Dec. 2024.

[15] J. Kim and T. Lin, "HEQuery: A Homomorphic SQL Engine for Encrypted Financial Databases," IEEE Secur. Privacy Mag., vol. 22, no. 1, pp. 60–68, Jan./Feb. 2024.

[16] F. Zhao and G. Sun, "Lightweight Privacy-Preserving Aggregation for Financial Data Using CKKS Scheme," IEEE Access, vol. 12, pp. 102345–102356, 2024.

[17] M. Fernandes and A. Joshi, "Privacy-Preserving Financial Intelligence Using Fully Homomorphic Encryption: A Benchmark Study," IEEE Trans. Serv. Comput., vol. 17, no. 2, pp. 314–326, Mar. 2024.

[18] Thirunagalingam, A. (2022). Enhancing Data Governance Through Explainable AI: Bridging Transparency and Automation. Available at SSRN 5047713.

[19] Praveen Kumar Maroju, "Assessing the Impact of AI and Virtual Reality on Strengthening Cybersecurity Resilience Through Data Techniques," Conference: 3rd International conference on Research in Multidisciplinary Studies Volume: 10, 2024.

[20] L. N. R. Mudunuri, V. M. Aragani, and P. K. Maroju, "Enhancing Cybersecurity in Banking: Best Practices and Solutions for Securing the Digital Supply Chain," Journal of Computational Analysis and Applications, vol. 33, no. 8, pp. 929-936, Sep. 2024.

[21] Singhal, S., Kothuru, S. K., Sethibathini, V. S. K., & Bammidi, T. R. (2024). ERP excellence a data governance approach to safeguarding financial transactions. Int. J. Manag. Educ. Sustain. Dev, 7(7), 1-18.

[22] Sehrawat, S. K. (2023). The role of artificial intelligence in ERP automation: state-of-the-art and future directions. Trans Latest Trends Artif Intell, 4(4).

[23] Hullurappa, M. (2023). Intelligent Data Masking: Using GANs to Generate Synthetic Data for Privacy-Preserving Analytics. International Journal of Inventions in Engineering & Science Technology, 9, 9.

[24] Bhagath Chandra Chowdari Marella, “Scalable Generative AI Solutions for Boosting Organizational Productivity and Fraud Management”, International Journal of INTELLIGENT SYSTEMS AND APPLICATIONS IN ENGINEERING, vol. 11, no.10, pp. 1013–1023, 2023.

[25] Mohanarajesh, Kommineni (2024). Generative Models with Privacy Guarantees: Enhancing Data Utility while Minimizing Risk of Sensitive Data Exposure. International Journal of Intelligent Systems and Applications in Engineering 12 (23):1036-1044.

Published

2025-10-10

Issue

Section

Articles

How to Cite

1.
Gummadi SVK. Homomorphic Encryption for Privacy-Preserving SQL Query Processing in Financial Databases. IJETCSIT [Internet]. 2025 Oct. 10 [cited 2025 Oct. 29];:50-8. Available from: https://www.ijetcsit.org/index.php/ijetcsit/article/view/421

Similar Articles

1-10 of 320

You may also start an advanced similarity search for this article.