A fully homomorphic encryption based on magic number fragmentation and El-Gamal encryption: Smart healthcare use case

被引:9
|
作者
Kara, Mostefa [1 ]
Laouid, Abdelkader [1 ]
Yagoub, Mohammed Amine [1 ]
Euler, Reinhardt [2 ]
Medileh, Saci [1 ]
Hammoudeh, Mohammad [3 ]
Eleyan, Amna [3 ]
Bounceur, Ahcene [2 ]
机构
[1] Univ El Oued, LIAP Lab, POB 789, El Oued, Algeria
[2] Univ Western Brittany UBO, CNRS, Lab STICC, UMR 6285, Brest, France
[3] Manchester Metropolitan Univ, Sch Comp & Math, Manchester, England
关键词
efficient computation; homomorphic encryption; privacy; smart healthcare; ELGAMAL CRYPTOSYSTEM; INTEGERS;
D O I
10.1111/exsy.12767
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Nowadays, cloud computing offers a digital infrastructure for smart city development. Cognitive cities are steadily automating daily urban processes. The ever expanding objective-driven communities gather and share sensitive data that must be stored securely. Cloud computing offers a suitable platform that allows cognitive smart cities to access and re-access data to learn from their past to adapt its current behaviour. However, the cloud is an untrusted entity that may expose data when decrypted for processing by systems. In this paper, we treat the issue of encrypted data processing. Often, the data is encrypted prior to transferring it to the cloud, where the cloud must have the data in clear to be able to make calculations which raises security and privacy threats if the cloud is considered untrusted. The scenario of asking users to make the calculations after decrypting the received cloud data and encrypting the obtained results before sending them back to the cloud is not a practical solution in distributed multi-tenant architectures. Homomorphic encryption allows offers a solution for processing encrypted data. Many existing homomorphic encryption schemes suffer from limitations that hinder their usability. This paper presents an efficient fully homomorphic encryption scheme using twin key encryption and magic number fragmentation. The details of the scheme are presented along with cryptanalytic attacks to assess its effectiveness. The proposed scheme exhibits strong resilience against brute-force attacks compared to its rivals from the literature. Finally, we illustrate the applicability of the proposed scheme using a cognitive smart city application.
引用
收藏
页数:14
相关论文
共 2 条
  • [1] Simulation based validation of a Smart Energy Use Case with Homomorphic Encryption
    Koelsch, Johannes
    Heinz, Christopher
    Ratzke, Axel
    Grimm, Christoph
    Nandagopal, Gomathi
    2019 15TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING IN SENSOR SYSTEMS (DCOSS), 2019, : 255 - 262
  • [2] On A Novel Security Scheme for The Encryption and Decryption Of 2×2 Fuzzy Matrices with Rational Entries Based on The Algebra of Neutrosophic Integers and El-Gamal Crypto-System
    Abobala M.
    Allouf A.
    Neutrosophic Sets and Systems, 2023, 54 : 19 - 32