A New Lightweight Homomorphic Encryption Scheme for Mobile Cloud Computing

被引:21
作者
Baharon, Mohd Rizuan [1 ]
Shi, Qi [1 ]
Llewellyn-Jones, David [1 ]
机构
[1] Liverpool John Moores Univ, Sch Comp & Math Sci, Liverpool, Merseyside, England
来源
CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING | 2015年
关键词
Cloud Computing; Mobile Cloud Computing; Data Storing and Processing; Homomorphic Encryption;
D O I
10.1109/CIT/IUCC/DASC/PICOM.2015.88
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The emerging technology of mobile devices allows mobile users to access a wide range of applications through the Internet connection. As such applications demand extensive computational power, it poses a challenge to the devices with limited computation power, memory, storage and energy. However, such a challenge could be overcome by cloud computing as the cloud offers virtually unlimited dynamic resources for computation, storage and service provision. Nevertheless, mobile users are still reluctant to adopt this technology as moving private data to the cloud with no physical and limited digital control by themselves raises security concerns to their data. Encryption using the primitive encryption schemes is unsuitable for use in cloud environments, as data need to be decrypted first before they can be processed, resulting in the data being exposed to the cloud. Moreover, although homomorphic encryption is believed to be one of the potential solutions to allowing arbitrary computation on encrypted data, its efficiency is still an obstacle for its implementation. Thus, this paper will deeply look at efficiency issues and propose a new Lightweight Homomorphic Encryption (LHE) scheme which minimizes the use of computation power at encryption and key generation. The key contribution of this work is to have a lightweight scheme with improved efficiency, while enabling homomorphism under both addition and multiplication.
引用
收藏
页码:618 / 625
页数:8
相关论文
共 23 条
[1]  
[Anonymous], 2012, IACR CRYPTOLOGY EPRI
[2]  
Ateniese G., 2004, ACM Transactions on Information and Systems Security, V7, P1, DOI 10.1145/984334.984335
[3]  
Baharon MR, 2013, ANN CONF PRIV SECUR, P82, DOI 10.1109/PST.2013.6596040
[4]   Making encryption work in the cloud [J].
Boldyreva, Alexandra ;
Grubbs, Paul .
Network Security, 2014, 2014 (10) :8-10
[5]  
Boneh D, 2005, LECT NOTES COMPUT SC, V3378, P325
[6]   A survey of mobile cloud computing: architecture, applications, and approaches [J].
Dinh, Hoang T. ;
Lee, Chonho ;
Niyato, Dusit ;
Wang, Ping .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2013, 13 (18) :1587-1611
[7]   Mobile cloud computing: A survey [J].
Fernando, Niroshinie ;
Loke, Seng W. ;
Rahayu, Wenny .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (01) :84-106
[8]   Homomorphic Evaluation of the AES Circuit [J].
Gentry, Craig ;
Halevi, Shai ;
Smart, Nigel P. .
ADVANCES IN CRYPTOLOGY - CRYPTO 2012, 2012, 7417 :850-867
[9]  
Itani W., 2010, 2010 INT C EN AW COM, P26
[10]   Towards secure mobile cloud computing: A survey [J].
Khan, Abdul Nasir ;
Kiah, M. L. Mat ;
Khan, Samee U. ;
Madani, Sajjad A. .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (05) :1278-1299