Data confidentiality and computations hiding in cloud services for public administration (original) (raw)

A study paper on Homomorphic encryption in cloud computing

The use of cloud for outsource the database has increased rapidly in many organizations. it provides many benefits in terms of low cost and accessibility of data. Database is hosted and processed in cloud server, which is beyond the control of data owners. due to the privacy concerns that the cloud service provider is assumed semi-trust (honestbut curious.), it becomes a critical issue to put sensitive service into the cloud, so encryption or obfuscation are needed before outsourcing sensitive data. Increased number of queries will inevitably leak more information to the cloud server. One straightforward approach to mitigate the security risk of privacy leakage is to encrypt the private data and hide the query/access patterns. Homomorphic Encryption (HE), a special kind of encryption scheme, can address these concerns as it allows any third party to operate on the encrypted data without decrypting it in advance. This survey focuses on HE and FHE schemes. First,we present the basics of HE and the details of the well-known Partially Homomorphic Encryption (PHE) and Somewhat Homomorphic Encryption (SWHE), which are important pillars of achieving FHE.

Preserving Data Privacy in Cloud using Homomorphic Encryption

Cloud computing these days, may be an elementary amendment happening within the space of data technology. It plays a vital role in terms of information storing and reducing the value to entrepreneurs. However, knowledge security continues to be one in all the highest issues for cloud computing. To produce the secure knowledge storage and retrieval, several techniques are projected however the bulk of them face some drawbacks that diminish the practicality of Cloud Computing. This work scrutinizes the Partial Homomorphic encoding that permits performing arts operations on encrypted knowledge while not compromising the encoding. The most aim is to propose a brand-new design to secure cloud computing, forestall security risks and improve the performance and also the time of information process.

Homomorphic Encryption Algorithms and Schemes for Secure Computations in the Cloud

ICSCT 2016 - International Conference on Secure Computation and Technology, Virginia International University, Fairfax, VA , 2016

Although cloud computing continues to grow rapidly, shifting to Internet-based shared computing service has created new security challenge. Organizations move to the cloud technology looking for efficient and fast computing but data security remains their top concern. Confidential data are prone to leak because of modern trend to outsource computations to third-parties. Furthermore, the issue of data breaches can remove any benefits businesses make by moving to the cloud computing technology. Three important questions must be put into consideration: How to guarantee that the user's private data will always be kept safe and secure? Can the cloud service provider be reliable to store and process client's private data confidentially? Is it possible to ensure that even if the cloud provider have been attacked, client's confidential data will not be stolen or reused? To provide better data protection during the communication and storage process, many cryptographic algorithms have already been used, but these methods are practically inapplicable as they require that the data needs to be visible to the cloud provider, in order to do that, the private key has to be transmitted to the server to perform the operations required. In the past thirty years, privacy homomorphism has been used to solves this issue. Homomorphic encryption allows us to execute the arithmetical calculations directly on the ciphertext while keeping the secret key that is used to decrypt the result. In addition to preserve privacy, it provides the exact same result as if we perform the computations on the plaintext. So far, many fully homomorphic encryption (FHE) schemes which evaluate an arbitrary number of additions and multiplications are implemented but researches remains unable to design more secure and powerful schemes. In this paper, a detailed survey of homomorphic encryption using public key algorithms such as RSA, El-Gamal, and Paillier algorithms is given, then, FHE schemes are introduced as well. This work can be helpful as a guide of principles, properties of FHE as researchers believe in the possibility of advancement in the FHE area.

Secure Data in Cloud Computing Using Homomorphic Encryption

2015

The emergence of cloud computing and cyber-physical systems made of security in processing data a major challenge. In order to ensure privacy and confidentiality of the data being manipulated, the use of cryptography is widely used today. In 2009, C. Gentry proposed the first fully homomorphic cryptosystem, to perform calculations on data previously encrypted without having to decrypt. This progress has allowed the opening of many industrial and research perspectives. However, despite recent progress, many limitations remain today on the lack of performance of these systems and their strong memory requirements. In this paper we focus on cloud computing along with its various security and privacy issues, we describe the role of homomorphic encryption scheme for ensuring data privacy and compare its types based on different characteristics.

Homomorphic encryption applied to secure storage and treatments of data in cloud

International Journal of Cloud Computing, 2016

With the emergence of cloud computing, the concept of security has become a major issue. Indeed, the key challenge is to ensure customers that the selected cloud provider may store and process the sensitive data confidentially. If this is a storage service, data can be encrypted before sending them to the cloud server; in this case, data confidentiality is assured. However, before performing treatments, these data must be decrypted. It is this step that can be considered a breach of confidentiality. Indeed, the fear of seeing sensitive data be processed in raw is a major obstacle in adopting cloud services. To overcome this obstacle and strengthen confidence in the cloud services, in this paper we propose the adoption of homomorphic encryption technique which allows to perform operations on encrypted data without knowing the key secret.

A Secured Homomorphic Encryption Technique in Cloud Computing

International Journal of Computer Applications, 2017

Cloud computing security challenges to many researchers. Priority was to focus on security which is the biggest concern of organizations moving to the cloud. Cloud computing help in costs optimization, easy maintenance and re-provisioning of resources, and so the increased profits. The adoption of Cloud Computing applies only if the security is ensured. How to guaranty a better data security and also how can we keep the client private information confidential? There are two major queries that present a challenge to Cloud computing providers. When the data transferred to the Cloud we use standard encryption methods to secure the operations and the storage of the data. For processing data located on a remote server, the Cloud providers need to access the raw data. In this paper we are proposing a method to execute operations on encrypted data without decrypting them. It will yield the same results after calculations as if we have worked directly on the raw data.

A Survey on Homomorphic Encryption in Cloud Computing

2014

Cloud Computing is the delivery of service rather than product. You can share information to the clients on the cloud. Cloud provider can be of service provider, data provider and platform provider. There is major and challenging issue of cloud like security. The advantage of cloud is reduced cost, easy maintenance and providing of resources. In this paper I have survey the approach of Homomorphic encryption in cloud. Homomorphic encryption is the technique through which we can apply the algebraic operation on ciphertext without converting it in plaintext. Homomorphic encryption is the method which performs operation on encrypted data which will provide result without decrypting that data. This method provides the same result as operation performs on row data. The scheme is said to be “fully Homomorphic’’ when we can perform (a sequence of operations) both addition and multiplication, whereas, it is “somewhat Homomorphic’’ if it supports a limited number of operations.

Cloud Security based on the Homomorphic Encryption

Cloud computing provides services rather than products; where it offers many benefits to clients who pay to use hardware and software resources. There are many advantages of using cloud computing such as low cost, easy to maintain, and available resources. The main challenge in the Cloud system is how to obtain a highly secured system against attackers. For this reason, methods were developed to increase the security level in different techniques. This paper aims to review these techniques with their security challenges by presenting the most popular cloud techniques and applications. Homomorphic Encryption method in cloud computing is presented in this paper as a solution to increase the security of the data. By using this method, a client can perform an operation on encrypted data without being decrypted which is the same result as the computation applied to decrypted data. Finally, the reviewed security techniques are discussed with some recommendations that might be used to raise the required security level in such a system.

Secure Data Hiding in Cloud Computing

Cloud computing is very rapidly emerging as a technology trend that almost every industry, transmits information, such as pictures, videos, and text, can be transmitted rapidly on the internet. The MapReduce programming model can be used to process large-scale data sets in cloud environments. In this paper, we use the Hadoop system to build the cloud computing environment. By using data hiding technology to embed data into cover images. Thus, cloud computing provides a convenient platform and also decreases cost of the equipment required for processing large data.

Ensuring Data Security in Cloud Computing using Homomorphic Encryption

International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2020

Cloud computing is the most interesting and new technology which offers computing as service rather a product to its clients on demand through Internet. Since cloud computing provider stores the data and distributed resources in the open environment, however the major issues in cloud computing is the security of the data being stored in the cloud and privacy while the data is being transmitted to and from a cloud organization. We can use traditional encryption algorithms (like, AES, DES, TDES, and RSA etc.) to secure the storage of data in cloud provider. But they don’t allow to perform operations on encrypted data without giving the private keys to cloud remote server. So; there is a need for new mechanism to perform on ciphered data which provide data security such as confidentiality and privacy for cloud service users. Homomorphic encryption is a form of security technique which allows to execute computations on ciphered user’s data without having to decrypt and produce an encrypted result which, when decrypted, it is same as the result when operations performed on the plaintext. In this paper, paillier homomorphic algorithm is applied on encrypted data, MD5 algorithm for authentication and one time password for verification of identity is used. Thus, result of confidentiality and privacy of cloud client data are achieved through paillier homomorphic encryption and OTP and also proposed system allows cloud service provider to perform computations on encrypted data without knowing the secret key.