Enhanced Privacy Preservation of Cloud Data by using ElGamal Elliptic Curve (EGEC) Homomorphic Encryption Scheme

被引:1
作者
Vedara, M. [1 ]
Ezhumalai, P. [1 ,2 ]
机构
[1] RMD Engn Coll, Dept Comp Sci & Engn, Chennai, Tamil Nadu, India
[2] RMD Engn Coll, Chennai, Tamil Nadu, India
关键词
Privacy Preservation; Message Encoding; Encryption; Decryption; Homomorphic; Message decoding; SECURITY; SEARCH;
D O I
10.3837/tiis.2020.11.015
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, cloud is the fastest emerging technology in the IT industry. We can store and retrieve data from the cloud. The most frequently occurring problems in the cloud are security and privacy preservation of data. For improving its security, secret information must be protected from various illegal accesses. Numerous traditional cryptography algorithms have been used to increase the privacy in preserving cloud data. Still, there are some problems in privacy protection because of its reduced security. Thus, this article proposes an ElGamal Elliptic Curve (EGEC) Homomorphic encryption scheme for safeguarding the confidentiality of data stored in a cloud. The Users who hold a data can encipher the input data using the proposed EGEC encryption scheme. The homomorphic operations are computed on encrypted data. Whenever user sends data access permission requests to the cloud data storage. The Cloud Service Provider (CSP) validates the user access policy and provides the encrypted data to the user. ElGamal Elliptic Curve (EGEC) decryption was used to generate an original input data. The proposed EGEC homomorphic encryption scheme can be tested using different performance metrics such as execution time, encryption time, decryption time, memory usage, encryption throughput, and decryption throughput. However, efficacy of the ElGamal Elliptic Curve (EGEC) Homomorphic Encryption approach is explained by the comparison study of conventional approaches.
引用
收藏
页码:4522 / 4536
页数:15
相关论文
共 21 条
[1]  
[Anonymous], 2015, P INN INF EMB COMM S
[2]   Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data [J].
Cao, Ning ;
Wang, Cong ;
Li, Ming ;
Ren, Kui ;
Lou, Wenjing .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (01) :222-233
[3]  
Dasgupta S., 2016, Perspectives in Science, Vol, V8, P692, DOI [DOI 10.1016/J.PISC.2016.06, 10.1016/j.pisc.2016.06]
[4]   Fast Cloud-RSA Scheme for Promoting Data Confidentiality in the Cloud Computing [J].
El Makkaoui, Khalid ;
Beni-Hssane, Abderrahim ;
Ezzati, Abdellah ;
El-Ansari, Anas .
8TH INTERNATIONAL CONFERENCE ON EMERGING UBIQUITOUS SYSTEMS AND PERVASIVE NETWORKS (EUSPN 2017) / 7TH INTERNATIONAL CONFERENCE ON CURRENT AND FUTURE TRENDS OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN HEALTHCARE (ICTH-2017) / AFFILIATED WORKSHOPS, 2017, 113 :33-40
[5]  
Fan K, 2017, CHINA COMMUN, V14, P61, DOI 10.1109/CC.2017.7839758
[6]   Secure and Private Cloud-Based Control Using Semi-Homomorphic Encryption [J].
Farokhi, Farhad ;
Shames, Iman ;
Batterham, Nathan .
IFAC PAPERSONLINE, 2016, 49 (22) :163-168
[7]   Fully Enhanced Homomorphic Encryption algorithm of MORE approach for real world applications [J].
Hariss, Khalil ;
Noura, Hassan ;
Samhat, Abed Ellatif .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2017, 34 :233-242
[8]  
Hayward Ryan, 2015, J. appl. res. technol, V13, P245
[9]   Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms [J].
Kaaniche, Nesrine ;
Laurent, Maryline .
COMPUTER COMMUNICATIONS, 2017, 111 :120-141
[10]  
Li F., 2015, P 2015 ACM WORKSH CL, P53, DOI DOI 10.1145/2808425.2808430