The Next Frontier of Security: Homomorphic Encryption in Action (original) (raw)

Secure Data in Cloud Computing Using Homomorphic Encryption

2015

The emergence of cloud computing and cyber-physical systems made of security in processing data a major challenge. In order to ensure privacy and confidentiality of the data being manipulated, the use of cryptography is widely used today. In 2009, C. Gentry proposed the first fully homomorphic cryptosystem, to perform calculations on data previously encrypted without having to decrypt. This progress has allowed the opening of many industrial and research perspectives. However, despite recent progress, many limitations remain today on the lack of performance of these systems and their strong memory requirements. In this paper we focus on cloud computing along with its various security and privacy issues, we describe the role of homomorphic encryption scheme for ensuring data privacy and compare its types based on different characteristics.

Security Issues in Cloud Computing: The Potentials of Homomorphic Encryption

Journal of Emerging Trends in Computing …, 2011

The prominence of the place of cloud computing in future converged networks is incontestable. This is due to the obvious advantages of the cloud as a medium of storage with ubiquity of access platforms and minimal hardware requirements on the user end. Secure delivery of data to and from the cloud is however a serious issue that needs to be addressed. We present in this paper the security issues affecting cloud computing and propose the use of homomorphic encryption as a panacea for dealing with these serious security concerns vis-à-vis the access to cloud data.

The Effectiveness of Homomorphic Encryption in Protecting Data Privacy.

International Journal of Research Publication and Reviews, Vol 5, no 11, pp 3235-3256 , 2024

As the use of digital services grows, protecting the privacy and integrity of sensitive data, especially in fields like healthcare, finance, and secure surveying, has become a critical concern. Homomorphic encryption (HE) offers a solution by allowing computations to be performed on encrypted data without revealing the original information. This paper examines the principles of homomorphic encryption and its applications in privacy-preserving tasks, focusing on its use in cloud computing, healthcare, and cybersecurity. Various types of HE schemes, including Fully Homomorphic Encryption (FHE), Partially Homomorphic Encryption (PHE), and Somewhat Homomorphic Encryption (SHE), are reviewed to assess their performance, efficiency, and real-world use. The paper also discusses the challenges of implementing HE, such as computational overhead and key management. It suggests directions for future research to improve the scalability and usability of HE in real-time applications. Addressing these challenges will make homomorphic encryption an essential tool for secure, privacy-preserving data processing and sharing in modern digital systems

A study paper on Homomorphic encryption in cloud computing

The use of cloud for outsource the database has increased rapidly in many organizations. it provides many benefits in terms of low cost and accessibility of data. Database is hosted and processed in cloud server, which is beyond the control of data owners. due to the privacy concerns that the cloud service provider is assumed semi-trust (honestbut curious.), it becomes a critical issue to put sensitive service into the cloud, so encryption or obfuscation are needed before outsourcing sensitive data. Increased number of queries will inevitably leak more information to the cloud server. One straightforward approach to mitigate the security risk of privacy leakage is to encrypt the private data and hide the query/access patterns. Homomorphic Encryption (HE), a special kind of encryption scheme, can address these concerns as it allows any third party to operate on the encrypted data without decrypting it in advance. This survey focuses on HE and FHE schemes. First,we present the basics of HE and the details of the well-known Partially Homomorphic Encryption (PHE) and Somewhat Homomorphic Encryption (SWHE), which are important pillars of achieving FHE.

A Survey on Homomorphic Encryption in Cloud Computing

2014

Cloud Computing is the delivery of service rather than product. You can share information to the clients on the cloud. Cloud provider can be of service provider, data provider and platform provider. There is major and challenging issue of cloud like security. The advantage of cloud is reduced cost, easy maintenance and providing of resources. In this paper I have survey the approach of Homomorphic encryption in cloud. Homomorphic encryption is the technique through which we can apply the algebraic operation on ciphertext without converting it in plaintext. Homomorphic encryption is the method which performs operation on encrypted data which will provide result without decrypting that data. This method provides the same result as operation performs on row data. The scheme is said to be “fully Homomorphic’’ when we can perform (a sequence of operations) both addition and multiplication, whereas, it is “somewhat Homomorphic’’ if it supports a limited number of operations.

Using Fully Homomorphic Encryption to Secure Cloud Computing

Internet of Things and Cloud Computing, 2016

The concept of cloud computing receiving a great deal of attention both in publication and among users. Cloud computing is the delivery of computing services over the Internet. Cloud services allow individuals and businesses to use software and hardware resources that are managed by cloud providers at remote locations. The distance between the client and the physical location of his data creates a barrier because this data can be accessed by a third party and this would affect the privacy of client's data. The using of traditional encryption schemes to encrypt the remoted data before sending to the cloud provider has been most widely used technique to bridge this security gab. But, the client will need to provide the private key to the server to decrypt the data before perform the calculations required. Homomorphic encryption allows to perform computations on encrypted data without decryption. This paper deals with the use of homomorphic encryption to encrypt the client's data in cloud server and also it enables to execute required computations on this encrypted data.

Homomorphic Encryption for Solving Security Issues in Cloud Computing

International Journal of Innovative Research in Applied Sciences and Engineering, 2020

Even with so many cryptographies present, homomorphic encryption has attracted wide attention from various scholars of this field due to its special and optimized performance. This lies down to the fact that the common cryptography methods cannot perform computations on encrypted data, and homomorphic encryption can. Also, homomorphic encryption provides automatically encrypted operation results. Since data breach is the biggest threat in the field of cloud computing, homomorphic encryption has a wide and very useful application in data security in a cloud environment. The main aim of this paper is to give an outline of the current security threats in the field of cloud computing and also throw light on the findings of homomorphic encryption, which include functional computations with operations such as addition, multiplication and then study them for the security of the cloud. The results produced only selected features vital for the prediction of cancer. Also, its performance has been paralleled against other factors such as Accuracy, Precision, Recall and Specificity, and Fmeasure. The experimental results show that the Decision Tree classifier outperforms all other classifiers with an accuracy of 94.7 % increased to 97% after Cuckoo Optimization.

Homomorphic Encryption for Secure Data Storage on the Cloud

Industries are showing great interest in storing data on public clouds. This could be a result of the remarkable growth of data recorded in the last few years. However the security issues associated with data storage over cloud is a major demoralizing factor for probable adopters. Hence the polestar of today is to find cryptographic methods that will offer more than confidentiality. Homomorphic encryption is one of the methods that have interesting applications in cloud. The objective is to manage and protect the data from the users of a client organization which wants to store the data on untrusted public clouds. This paper is proposed that addresses the confidentiality and assurance concerns and produces encrypted storage with public clouds. This proposed approach adopts Homomorphic encryption for saving the user data and uses an updation method for modified file to reduce the bandwidth consumption while the transmission of large encrypted files.

Homomorphic encryption applied to secure storage and treatments of data in cloud

International Journal of Cloud Computing, 2016

With the emergence of cloud computing, the concept of security has become a major issue. Indeed, the key challenge is to ensure customers that the selected cloud provider may store and process the sensitive data confidentially. If this is a storage service, data can be encrypted before sending them to the cloud server; in this case, data confidentiality is assured. However, before performing treatments, these data must be decrypted. It is this step that can be considered a breach of confidentiality. Indeed, the fear of seeing sensitive data be processed in raw is a major obstacle in adopting cloud services. To overcome this obstacle and strengthen confidence in the cloud services, in this paper we propose the adoption of homomorphic encryption technique which allows to perform operations on encrypted data without knowing the key secret.

A Secured Homomorphic Encryption Technique in Cloud Computing

International Journal of Computer Applications, 2017

Cloud computing security challenges to many researchers. Priority was to focus on security which is the biggest concern of organizations moving to the cloud. Cloud computing help in costs optimization, easy maintenance and re-provisioning of resources, and so the increased profits. The adoption of Cloud Computing applies only if the security is ensured. How to guaranty a better data security and also how can we keep the client private information confidential? There are two major queries that present a challenge to Cloud computing providers. When the data transferred to the Cloud we use standard encryption methods to secure the operations and the storage of the data. For processing data located on a remote server, the Cloud providers need to access the raw data. In this paper we are proposing a method to execute operations on encrypted data without decrypting them. It will yield the same results after calculations as if we have worked directly on the raw data.