Secure Computation over Cloud using Fully Homomorphic Encryption

被引:0
作者
Bilakanti, Anusha [1 ]
Anjana, N. B. [1 ]
Divya, A. [1 ]
Divya, K. [1 ]
Chakraborty, Nilotpal [2 ]
Patra, G. K. [3 ]
机构
[1] CMR Inst Technol, Bangalore, Karnataka, India
[2] Indian Inst Technol Patna, Dept Comp Sc & Engn, Patna, Bihar, India
[3] CSIR, CSIR Paradigm Inst 4, Bangalore, Karnataka, India
来源
PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT) | 2016年
关键词
Fully homomorphic encryption; learning with errors; image encryption; computing on encrypted domain; cloud security; KEY;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Computing by a cloud service has not succeeded much due to concerns about confidentiality and privacy assurances by the service providers. This challenge can be addressed if computations can be performed on encrypted data directly. In this paper, we have developed a scheme based on fully homomorphic encryption that can perform operations directly on encrypted images. Our aim is to take the first step towards solving the problem of those which are in dire need of computing services by a third party, namely cloud, without any security breaches. We believe this will be a major breakthrough in which security has been handled while computing.
引用
收藏
页码:633 / 636
页数:4
相关论文
共 17 条
[1]  
Acharya B., 2009, INT J RECENT TRENDS, V1
[2]  
[Anonymous], 2010, 2010 6 IR C MACH VIS
[3]  
[Anonymous], 2012, P ITCS 12 CIT
[4]  
Brakerski Z., Efficient fully homomorphic encryption from
[5]   A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS [J].
ELGAMAL, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) :469-472
[6]   Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence [J].
Enayatifar, Rasul ;
Abdullah, Abdul Hanan ;
Isnin, Ismail Fauzi .
OPTICS AND LASERS IN ENGINEERING, 2014, 56 :83-93
[7]   Fully Homomorphic Encryption Using Ideal Lattices [J].
Gentry, Craig .
STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2009, :169-178
[8]   Fully Homomorphic Encryption Using Ideal Lattices [J].
Gentry, Craig .
STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2009, :169-178
[9]  
Li Jian, P IEEE CCIS2012
[10]  
Paillier P, 1999, LECT NOTES COMPUT SC, V1592, P223