Database secure manipulation based on paillier's homomorphic encryption (DSM-PHE)

被引:2
作者
Prakancharoen S. [1 ]
机构
[1] King Mongkut's University of Technology North Bangkok, Bangsue Bangkok
关键词
Database manipulation; Homomorphic encryption; Paillier's encryption algorithm;
D O I
10.3991/ijim.v13i12.11396
中图分类号
学科分类号
摘要
The objective of this research was to suggest some simple solution to increase database manipulation security. Based on advantage of Homomorphic encryption, user's data in database is always encrypted by Homomorphic encryption algorithm such as Paillier. User's data is manipulated or processed on many times such as addition, subtraction, multiplication and division. By the advantage of Homomorphic encryption algorithm, user's data will not be decrypted while manipulated. Therefore, secrecy of data is still kept. Unfortunately, Paillier's Homomorphic encryption normally covers only addition and multiplication operation on numerical data. This paper suggests simple technique to enhance Pailler's encryption algorithm to perform data operation as well in subtraction and division operation. Evaluation in suggested database manipulation, DSM-PHE, indicates that its operation tasks take five operation times more than ordinary data base manipulation operation tasks, without any encryption. Therefore DSM-PHE shall be especially used in more sensitive data. © International Association of Online Engineering.
引用
收藏
页码:136 / 151
页数:15
相关论文
共 50 条
  • [21] A Comparative Study of Secure Outsourced Matrix Multiplication Based on Homomorphic Encryption
    Babenko, Mikhail
    Golimblevskaia, Elena
    Tchernykh, Andrei
    Shiriaev, Egor
    Ermakova, Tatiana
    Pulido-Gaytan, Luis Bernardo
    Valuev, Georgii
    Avetisyan, Arutyun
    Gagloeva, Lana A.
    [J]. BIG DATA AND COGNITIVE COMPUTING, 2023, 7 (02)
  • [22] FORESEE: Fully Outsourced secuRe gEnome Study basEd on homomorphic Encryption
    Zhang, Yuchen
    Dai, Wenrui
    Jiang, Xiaoqian
    Xiong, Hongkai
    Wang, Shuang
    [J]. BMC MEDICAL INFORMATICS AND DECISION MAKING, 2015, 15
  • [23] Efficient secure federated learning aggregation framework based on homomorphic encryption
    Yu S.
    Chen Z.
    [J]. Tongxin Xuebao/Journal on Communications, 2023, 44 (01): : 14 - 28
  • [24] SADHE: Secure Anomaly Detection for GPS Trajectory Based on Homomorphic Encryption
    Singh, Priyanka
    Rathi, Jash
    Patel, Priyankaben Babulal
    [J]. 39TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2024, 2024, : 139 - 141
  • [25] Secure Smart Grid Power Monitoring and Simulations Based on Homomorphic Encryption
    Liao, Teh-Lu
    Lin, Chung-Pao
    Hou, Yi-You
    [J]. IEEE ACCESS, 2024, 12 : 122820 - 122827
  • [26] A Secure Image Retrieval Method Based on Homomorphic Encryption for Cloud Computing
    Zhang, Yan
    Zhuo, Li
    Peng, Yuanfan
    Zhang, Jing
    [J]. 2014 19TH INTERNATIONAL CONFERENCE ON DIGITAL SIGNAL PROCESSING (DSP), 2014, : 269 - 274
  • [27] Secure and Efficient Similarity Retrieval in Cloud Computing Based on Homomorphic Encryption
    Wang, Na
    Zhou, Wen
    Wang, Jingjing
    Guo, Yifan
    Fu, Junsong
    Liu, Jianwei
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 2454 - 2469
  • [28] Discrete logarithm based additively homomorphic encryption and secure data aggregation
    Wang, Licheng
    Wang, Lihua
    Pan, Yun
    Zhang, Zonghua
    Yang, Yixian
    [J]. INFORMATION SCIENCES, 2011, 181 (16) : 3308 - 3322
  • [29] Secure scheme on mobile multi cloud computing based on homomorphic encryption
    Zkik, Karim
    Orhanou, Ghizlane
    El Hajji, Said
    [J]. 2016 INTERNATIONAL CONFERENCE ON ENGINEERING & MIS (ICEMIS), 2016,
  • [30] FORESEE: Fully Outsourced secuRe gEnome Study basEd on homomorphic Encryption
    Yuchen Zhang
    Wenrui Dai
    Xiaoqian Jiang
    Hongkai Xiong
    Shuang Wang
    [J]. BMC Medical Informatics and Decision Making, 15