Secure and efficient online data storage and sharing over cloud environment using probabilistic with homomorphic encryption

被引:19
作者
Jayapandian, N. [1 ]
Rahman, A. M. J. Md. Zubair [2 ]
机构
[1] Knowledge Inst Technol, Dept Comp Sci & Engn, Salem, India
[2] Al Ameen Engn Coll, Erode, India
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2017年 / 20卷 / 02期
关键词
Cloud computing; Probabilistic; Homomorphic; Encryption; Data storage;
D O I
10.1007/s10586-017-0809-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is one of the great tasks in the business world nowadays, which provides shared processing resources. In cloud area network, security is the main challenge faced by cloud providers and their customers. The advantage of cloud computing includes reduced cost, re-provisioning of resources etc. The cloud network makes use of standard encryption method to secure documents while storing in online. In this paper, we have depicted two efficient encryption algorithms that meet security demand in cloud. Probabilistic encryption, one of these algorithms may be used to produce randomness of text encryption. With this algorithm, if the same message is encrypted twice it should yield different secret coded texts on both calculations. Another crucial algorithm is homomorphic encryption, is a cryptographic method to define the sample system and to provide a software implementation. In order to maintain quality of service (QoS) and improve customer satisfaction, we are going to propose an efficient algorithm which combines the characteristics of both probabilistic and homomorphic encryption techniques, to provide high level of security. Our proposed scheme will yield better encryption techniques reduce security attacks, increased throughput and improve the QoS.
引用
收藏
页码:1561 / 1573
页数:13
相关论文
共 21 条
[1]  
[Anonymous], 2007, PROC INTRO CRYPTOGR
[2]   Enhanced Public Key Security for the McEliece Cryptosystem [J].
Baldi, Marco ;
Bianchi, Marco ;
Chiaraluce, Franco ;
Rosenthal, Joachim ;
Schipani, Davide .
JOURNAL OF CRYPTOLOGY, 2016, 29 (01) :1-27
[3]  
Bendlin R, 2011, LECT NOTES COMPUT SC, V6632, P169, DOI 10.1007/978-3-642-20465-4_11
[4]  
Cheng-Chi Lee, 2013, International Journal of Network Security, V15, P231
[5]  
Daemen J, 1999, AES PROPOSAL RIJNDAE
[6]  
De di Capitani Vimercati S., 2010 IEEE 30 INT C D, P42
[7]   A Survey of Homomorphic Encryption for Nonspecialists [J].
Fontaine, Caroline ;
Galand, Fabien .
EURASIP JOURNAL ON INFORMATION SECURITY, 2007, (01)
[8]  
Glenn R., 1998, NULL ENCRYPTION ALGO
[9]   A homomorphic encryption scheme with adaptive chosen ciphertext security but without random oracle [J].
Gong, Linming ;
Li, Shundong ;
Mao, Qing ;
Wang, Daoshun ;
Dou, Jiawei .
THEORETICAL COMPUTER SCIENCE, 2016, 609 :253-261
[10]  
Katz J., 2001, FAST SOFTWARE ENCRYP, P284