An Efficient Enhanced Full Homomorphic Encryption for Securing Video in Cloud Environment

被引:0
作者
N. Geetha
K. Mahesh
机构
[1] Alagappa University,Department of Computer Applications
来源
Wireless Personal Communications | 2022年 / 123卷
关键词
Cloud computing; Key generation; Fully homomorphic encryption; Video encryption;
D O I
暂无
中图分类号
学科分类号
摘要
At present days, exponential growth in the transmission of multimedia data takes place due to a significant rise in network bandwidth and video image compression technologies. However, the transmission of videos over wireless channels often brings an unseen risk that sensitive video details might be corrupted and distributed in an illegal way. So, the security of video transmission has become a hot research topic. Several encryption models have been presented in the literature, yet, it is believed that the performance of encryption process can be further improved. In this perspective, an efficient novel video encryption technique is presented using an enhanced variant of Fully Homomorphic Encryption (FHE) model called as EFHE model. By the hybridization of Ducas and Micciancio (DM) with the FHE model presented by Gentry, Sahai, and Waters (GSW), matrix operations vector additions are properly employed in the proposed EFHE model. In addition, a new key generation scheme to increase the fastness of the encryption process. The EFHE model is designed and placed on a cloud environment which leads to reduced cloud user’s communication and computation complexity. It is ensured that the presented EFHE model is highly efficient and secure over the compared methods.
引用
收藏
页码:1553 / 1571
页数:18
相关论文
共 78 条
[1]  
Quan W(2017)Enhancing crowd collaborations for sofware defned vehicular networks IEEE Communications Magazine 55 80-86
[2]  
Liu Y(2017)Locator/Identifer Split Networking: A Promising Future Internet Architecture IEEE Communications Surveys & Tutorials 19 2927-2948
[3]  
Zhang H(2016)Smart identifer network: A collaborative architecture for the future internet IEEE Network 30 46-51
[4]  
Yu S(2017)Coverless image steganography based on SIFT and BOF Journal of Internet Technology 18 209-216
[5]  
Feng B(2017)Smart Collaborative Caching for Information-Centric IoT in Fog Computing Sensors 17 2512-796
[6]  
Zhang H(2017)Flexible and fne-grained attribute-based data storage in cloud computing IEEE Transactions on Services Computing 10 785-2559
[7]  
Zhou H(2016)Enabling personalized search over encrypted outsourced data with efficiency improvement IEEE Transactions on Parallel Distributed Systems 27 2546-74
[8]  
Yu S(2018)A collaborative analysis method of user abnormal behavior based on reputation voting in cloud environment Future Generation Computer Systems 83 60-513
[9]  
Zhang H(2018)Smart perception and autonomic optimization: A novel bio-inspired hybrid routing protocol for MANETs Future Generation Computer Systems 81 505-2603
[10]  
Quan W(2014)Fully Homomorphic Encryption and Its Application Journal of Computer Research & Development 51 2593-322