Big Data Privacy using Fully Homomorphic Non-deterministic Encryption

被引:0
作者
Patil, Tejashree B. [1 ]
Patnaik, Girish Kumar [1 ]
Bhole, Ashish T. [1 ]
机构
[1] North Maharashtra Univ, SSBTs Coll Engn & Technol, Dept Comp Engn, Jalgaon, Maharashtra, India
来源
2017 7TH IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC) | 2017年
关键词
Security and Privacy; Big Data; Encryption; Non-deterministic; Fully homomorphic encryption;
D O I
10.1109/IACC.2017.33
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Big data is a large amount of digital information. Now days, data security is a challenging issue that touches several areas along with computers and communication. The security of data which stored online has become a main concern. Several attackers play with confidentiality of the user. Cryptography is a approach that provide data security to the user. Despite of huge efforts to protect sensitive data, hackers typically manage to steal it. Computing with encrypted data is strategies for safeguarding confidential data. The partial homomorphic encryption is specialized for only one operation on the encrypted data. For example the Pailliers encryption scheme performs only one mathematical operation on encrypted numerical data and is successful to compute the sum of encrypted values. The Pailliers encryption scheme is unable to do multiple mathematical operations on encrypted numerical data. The proposed encryption algorithm computes more than one mathematical operation on encrypted numerical data thereby further protecting the encrypted sensitive information.
引用
收藏
页码:138 / 143
页数:6
相关论文
共 12 条
[1]  
[Anonymous], 2009, P 41 ACM S THEOR COM
[2]  
[Anonymous], 2014, INT J COMPUT APPL
[3]  
Chavan Vibhavari., 2014, Int. J. Comput. Sci. Inf. Technol., V5, P7932
[4]   Calibrating noise to sensitivity in private data analysis [J].
Dwork, Cynthia ;
McSherry, Frank ;
Nissim, Kobbi ;
Smith, Adam .
THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2006, 3876 :265-284
[5]  
Gamal T.E., 1984, P WORKSH THEOR APPL, V196, P10, DOI DOI 10.1007/3-540-39568-7_2
[6]  
Hemalatha S., 2014, INT J ADV RES COMP C, V3
[7]  
Kamakshi P., 2014, INT J RES ENG TECHNO, V3
[8]  
Katal A, 2013, INT CONF CONTEMP, P404, DOI 10.1109/IC3.2013.6612229
[9]  
Paillier P, 1999, LECT NOTES COMPUT SC, V1592, P223
[10]  
Popa R.A., 2014, P 11 USENIX C NETWOR, P157