Homomorphic Encryption Over Integers

被引:0
作者
Jain, Rachna [1 ]
Madan, Sushila [2 ]
Garg, Bindu [3 ]
机构
[1] Banasthali Vidyapith Univ, Dept Comp Sci, Vanasthali, Rajasthan, India
[2] Univ Delhi, Dept Comp Sci, Delhi, India
[3] Bharati Vidyapeeth Coll Engn, Dept Comp Sci, Delhi, India
来源
PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT | 2016年
关键词
Cloud Computing Environment; Homomorphic Encryption; HELIB; Privacy and Security;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In cloud computing technology user can store large amount of data on storage provided by cloud & make use of resources as and when required due to which it becomes very significant. As a result, cloud computing technology has recently becomes a new model by which we can host and deliver services over the internet. In cloud computing resources are shared between different computers and other devices by means of the internet. There are so many issues which have been observed in cloud computing environment that need to be addressed. These issues can he categorized as: Security, Protection, Identity Management, Management of resources, Management of Power and Energy, Data Isolation, Availability of resources and Heterogeneity of resources. According to survey conducted by IDC security was found to be most challenging issue. The first point of security where cryptography can facilitate cloud computing is secure storage but the major disadvantage of secure storage is that we cannot perform processing on encrypted data. So, in order to provide the security to the cloud network, homomorphic encryption technique can be used. In homomorphic encryption computations can be performed on cipher text and generate an encrypted result which will be same as result of operations performed on the plaintext when decrypted. This means in homomorphic encryption we can process the data without decryption. In this paper security issue is addressed in such a way that server perform processing on encrypted data which will be decrypted by owners of data only. Server performs addition on encrypted data without decryption.
引用
收藏
页码:774 / 778
页数:5
相关论文
共 7 条
  • [1] Armbrust Michael, 2009, EECS200928 UC BERK
  • [2] Brakerski Zvika., FULLY HOMOMORPHIC EN
  • [3] Ducas Lo, FHEW BOOTSTRAPPING H
  • [4] Gentry C., 2011, IMPLEMENTING GENTRYS
  • [5] Meissen Rebecca, MATH APPROACH FULLY
  • [6] Mell P., 2009, Draft NIST working definition of cloud computing: Recommendations of the National Institute of Standards and Technology
  • [7] Morris Liam., 2013, Analysis of partially and fully homomorphic encryption