Secure cloud computing using homomorphic construction

被引:0
作者
Swathi V. [1 ,2 ]
Vani M.P. [3 ]
机构
[1] SCOPE, VIT University, Vellore
[2] Guru Nanak Institutions Technical Campus (Autonomous), Ibrahimpatnam, R.R Dist.
[3] Vellore Institute of Technology, Vellore, Tamilnadu
来源
International Journal of Cloud Computing | 2019年 / 8卷 / 04期
关键词
Cloud computing; Confidential data; Homomorphic encryption; Privacy; Security;
D O I
10.1504/IJCC.2019.104498
中图分类号
学科分类号
摘要
When customers are transferring their private data to any third party, then there is much responsibility of both security and compliance. There exist hurdles in mainly two aspects - one is in the users' or customers point of view, where they want to ensure the privacy of its input parameters and results. Another is to cloud servers point of view, where cloud entity is worried about feasibleness of encrypted/transformed inputs and operating on them. Thus, users would not like to submit their private problem data inputs to the cloud. encrypting the private data prior to submission to cloud is a usual solution. Here in this paper, we have suggested a framework for cloud data security and presented the detailed construction of our proposed homomorphic encryption system. Along with that the security and correctness analysis of our proposed construction is given. The scheme satisfies both Additive and Multiplicative homomorphism properties. © 2019 Inderscience Enterprises Ltd.
引用
收藏
页码:354 / 370
页数:16
相关论文
共 37 条
[1]  
Armknecht F., Boyd C., Carr C., Gjosteen K., Jaschke A., Reuter C.A., Strand M., A guide to fully homomorphic encryption, Report 2015/1192, Cryptology, (2015)
[2]  
Asharov G., Jain A., Lopez-Alt A., Tromer E., Vaikuntanathan V., Wichs D., Multiparty computation with low communication, computation and interaction via threshold fhe, Advances in Cryptology, EUROCRYPT 2012, Lecture Notes in Computer Science, pp. 483-501, (2012)
[3]  
Atallah M.J., Li J., Secure outsourcing of sequence comparisons, Intl J. Inf. Security, 4, 4, pp. 277-287, (2005)
[4]  
Atallah M.J., Pantazopoulos K., Rice J.R., Spafford E.E., Secure Outsourcing of Scientific Computations, Trends in Software Engineering, 54, pp. 215-272, (2002)
[5]  
Benjamin D., Atallah M.J., Private and cheating-free outsourcing of algebraic computations, Proc. 6th Annu. Conf. PST, pp. 240-245, (2008)
[6]  
Brakerski Z., Vaikuntanathan V., Efficient fully homomorphic encryption from (standard) LWE, Proceedings of the IEEE 52nd Annual Symposium on Foundations of Computer Science (FOCS 11), pp. 97-106, (2011)
[7]  
Chen X., Huang X., New algorithms for secure outsourcing of large-scale systems of linear equations, IEEE Transactions on Information Forensics and Security, January, 10, 1, pp. 69-78, (2015)
[8]  
Coron J.-S., Lepoint T., Tibouchi M., Batch fully homomorphic encryption over the integers, EUROCRYPT 2013, Lecture Notes in Computer Science, 7881, pp. 315-335, (2013)
[9]  
Coron J.S., Mandal A., Naccache D., Tibouchi M., Fully homomorphic encryption over the integers with shorter public keys, CRYPTO 2011, 6841, (2011)
[10]  
Coron J.S., Naccache D., Tibouchi M., Public key compression and modulus switching for fully homomorphic encryption over the integers, Advances in Cryptology -EUROCRYPT 2012, Lecture Notes in Computer Science, 7237, pp. 446-464, (2012)