Minimizing Ciphertext in Homomorphic Encryption Scheme for Cloud Data

被引:1
作者
Potey, Manish M. [1 ]
Dhote, C. A. [2 ]
Sharma, Deepak H. [1 ]
机构
[1] KJ Somaiya Coll Engn, Dept Comp Engn, Bombay, Maharashtra, India
[2] PRMIT&R, Dept Informat Technol, Amravati, India
来源
PROGRESS IN ADVANCED COMPUTING AND INTELLIGENT ENGINEERING, PROCEEDINGS OF ICACIE 2016, VOLUME 1 | 2018年 / 563卷
关键词
Data security; Cloud computing; Homomorphic encryption; AWS; DynamoDB; CSP; Security goals;
D O I
10.1007/978-981-10-6872-0_56
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Data security is a major concern in cloud computing. It must satisfy the three goals of security in computing-integrity, confidentiality, and availability. Homomorphic encryption is a technique in which user or cloud service provider (CSP) can perform operations on cloud data without performing decryption. Many algorithms are available for homomorphic encryption. But these algorithms generate large size ciphertext. This paper focuses on homomorphic encryption which generates small size ciphertext. It is a variant of scheme proposed by Dijk et al. In an experimentation of this scheme, encrypted data are stored in DynamoDB of Amazon Web service (AWS) public cloud. When user requires data, it can be downloaded on users machine and then decrypted.
引用
收藏
页码:583 / 591
页数:9
相关论文
共 50 条
  • [31] Security Analysis of Homomorphic Encryption Scheme for Cloud Computing: Known-Plaintext Attack
    Babenko, Mikhail
    Chervyakov, Nikolay
    Radchenko, Gleb
    Tchernykh, Andrei
    Navaux, Philippe O. A.
    Kucherov, Nikolay
    Deryabin, Maxim
    Svyatkin, Viktor
    PROCEEDINGS OF THE 2018 IEEE CONFERENCE OF RUSSIAN YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING (EICONRUS), 2018, : 270 - 274
  • [32] Secure scheme on mobile multi cloud computing based on homomorphic encryption
    Zkik, Karim
    Orhanou, Ghizlane
    El Hajji, Said
    2016 INTERNATIONAL CONFERENCE ON ENGINEERING & MIS (ICEMIS), 2016,
  • [33] DPP: Data Privacy-Preserving for Cloud Computing based on Homomorphic Encryption
    Wang, Jing
    Wu, Fengheng
    Zhang, Tingbo
    Wu, Xiaohua
    2022 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY, CYBERC, 2022, : 29 - 32
  • [34] Comparative Study of Homomorphic Encryption Methods for Secured Data Operations in Cloud Computing
    Rangasami, Kanagavalli
    Vagdevi, S.
    2017 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, COMMUNICATION, COMPUTER, AND OPTIMIZATION TECHNIQUES (ICEECCOT), 2017, : 551 - 556
  • [35] Cryptanalysis of a homomorphic encryption scheme
    Bogos, Sonia
    Gaspoz, John
    Vaudenay, Serge
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2018, 10 (01): : 27 - 39
  • [36] Homomorphic encryption scheme of the rational
    Zhu, Ping
    He, Yanxiang
    Xiang, Guangli
    2006 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-4, 2006, : 1230 - 1233
  • [37] Making data in cloud secure and usable: fully homomorphic encryption with symmetric keys
    Sharma, Iti
    Gupta, C. P.
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2015, 14 (04) : 379 - 399
  • [38] Cloud Security Implementation using Homomorphic Encryption
    Syafalni, Infall
    Fadhli, Hamdani
    Utami, Wuri
    Dharma, Gede Satya Adi
    Mulyawan, Rahmat
    Sutisna, Nana
    Adiono, Trio
    2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION, NETWORKS AND SATELLITE (COMNETSAT), 2020, : 341 - 345
  • [39] Low-Complexity Ciphertext Multiplication for CKKS Homomorphic Encryption
    Akherati, Sajjad
    Zhang, Xinmiao
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2024, 71 (03) : 1396 - 1400
  • [40] Cryptanalysis of a homomorphic encryption scheme
    Sonia Bogos
    John Gaspoz
    Serge Vaudenay
    Cryptography and Communications, 2018, 10 : 27 - 39