A Review of Security of Data Storage and Retrieval on Cloud using Homomorphic Encryption

Main Article Content

Sudesh Sharma

Abstract

From the earlier few years and nowadays the cloud computing is an era of rapid progressive in terms of providing services and resources to the users. As with the increase in the industrial and business area the involvement of cloud computing also increased though it provides the services for data storage and avoid the cost expensive on software, but with the wide usage of cloud the security of data becomes an important issue for cloud adopters. The users store their data on cloud in encrypted form so that their data would be in safe hand, for this encryption/decryption techniques are in practice. In this survey we are reviewing homomorphic encryption (HE) which provides security in cloud and also ease the computation performed on encrypted data without decrypting it and also discuss some homomorphic schemes and algorithms mainly EcElgamel algorithm

Downloads

Download data is not yet available.

Article Details

Section
Articles

References

P. Mell and T. Grance, "Draft NIST working definition of cloud computing - v15," 21. Aug 2009.

Craig Gentry, "Computing Arbitrary Functions of Encrypted Dataâ€, Communications of the ACM, VOL. 53, No. 3, pp.97-105, march 2010.

Ryan Hayward and Chia-Chu Chiang, “Parallelizing fully homomorphic encryption for a cloud environmentâ€, Journal of Applied Research and Technology (available online at science direct), Vol. 13, pp. 245-252, August 2015.

S.G Sutar and G. A. Patil, " Privacy Management in Cloud by making use of Homomorphic Functionsâ€, International Journal of Computer Applications, Vol. 37, No.2, pp.0975-8887, January 2012.

Maha Tebaa, Saïd El Hajji, Abdellatif El Ghazi “Homomorphic Encryption Applied to the Cloud Computing Securityâ€, Proceedings of the World Congress on Engineering, Vol.1, WCE 2012, July 4 - 6, 2012.

P. Paillier, “Public-key cryptosystems based on composite degree residuosity classes,†in EUROCRYPT, Vol. 1592, pp. 223–238, 1999.

Julien Bringe and al. “An Application of the Goldwasser-Micali Cryptosystem to Biometric Authenticationâ€, Springer-Verlag, 2007.

R. Rivest, A. Shamir, and L. Adleman. “A method for obtaining digital signatures and public key cryptosystemsâ€, Communications of the ACM, 21(2):120-126, 1978. Computer Science, pp. 223-238, Springer, 1999.

Taher ElGamal, “A public key cryptosystem and a signature scheme based on discrete logarithmsâ€, IEEE Transactions on Information Theory, pp. 469-472, 1985.

Craig Gentry, “Fully homomorphic encryption using ideal latticesâ€, in Proceedings of the 41 Annual ACM Symposium on Theory of Computing, pp. 169–178, 2009.

Zvika Brakerski and Vinod Vaikuntanathan, “Effcient Fully Homomorphic Encryption from (Standard) LWEâ€, 52 Annual IEEE Symposium on Foundations of Computer Science from IEEE Computer Society, pp.97-106, 2011.

Deyan Chen and Hong Zhao, “Data Security and Privacy Protection Issues in Cloud Computingâ€, International Conference on Computer Science and Electronics Engineering From IEEE Computer Society, pp.647-651, 2012.

M. Brenner, H. Perl, and M. Smith, “Practical applications of homomorphic encryption†,in SECRYPT 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, SECRYPT is part of ICETE - The International Joint Conference on e Business and Telecommunications, pp. 5–14, july 2012.

S. Mei, C. Liu, C. Yong, W. Jiangjiang and W. Zhiying, “TETPA: A case for trusted third party auditor in Cloud environmentâ€, IEEE Conference Anthology, pp-1 – 4, 1-8 Jan. 2013.

Simon Fau,Renaud Sirdey, Caroline Fontaine, Carlos Aguilar-Melchor and Guy Gogniat, "Towards practical program execution over fully homomorphic encryption schemes", IEEE Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, pp.284-290, 2013.

Bhabendu Kumar Mohanta and Debasis Gountia, “Fully homomorphic encryption equating to cloud security: An approach†IOSR Journal of Computer Engineering (IOSRJCE), e-ISSN. (2278-0661), p- ISSN.(2278-8727), Vol. 9, No. 2, PP. 46-50, jan-feb 2013.

W. Wang, Y. Hu, L. Chen, X. Huang, and B. Sunar, “Exploring the feasibility of fully homomorphic encryption†, IEEE Transactions on Computers, vol. 99, pp. 1, 2013.

FENG Chao and XIN Yang, “Fast key generation for Gentry-style homomorphic encryptionâ€, The Journal of China Universities of Posts and Telecommunications, Vol. 21, No. 6, pp. 37-44, December 2014.

G.jeeva Rathanam and M.R. Sumalatha, “Dynamic Secure Storage System in Cloud Servicesâ€, IEEE International Conference on Recent Trends in Information Technology.

Darko Hrestak and Stjepan Picek, “Homomorphic Encryption in the Cloudâ€, MIPRO, may 2014.

Kamal Kumar Chauhan, Amit K.S Sanger, Ajai Verma, “Homomorphic Encryption for Data Security in Cloud Computingâ€, IEEE International Conference on Information Technology, pp.206-209, 2015.

Ali Azougaghe, Zaid Kartit, Mustapha Hedaboui, Mostafa Belkasmi, Mohamed El marraki, “An Efficient Algorithm for Data Security in Cloud Storage â€, 15th International Conference on Intelligent Systems Design and Applications (ISDA), pp.421-427, 2015.

Ayantika Chatterjee and Indranil Sengupta, “Translating Algorithms to handle Fully Homomorphic Encrypted Data on the Cloudâ€, IEEE Transactions on Cloud Computing, pp. 1-14, September 2015.

Yasmina Bensitel and Rahal Romadi, “Secure data storage in the cloud with homomorphic encryption “, 2nd International Conference on Cloud Computing and Applications, 24-26 may 2016.

Gnanaprakasam T and Dr. Rajivkannan A, “Optimal ecc based dual encryption technique for data security in cloudâ€, International Journal of Advanced Engineering Technology, e-ISSN(0976-3945), Vol.7,no.2,pp.1049-1055, April-June 2016.

Prof. S.V.Phulari, Sneha Jamadade, Swati Mhetre, Pramila Gonde and Jyoti Birajdar, “Cloud Computing Security using Data Partitioning Techniqueâ€, International Journal of Engineering Science andComputing(IJESC),ISSN(2321-3361),Vol.6,No.4,pp.4595-4597,April 2016.

Ms. Nikita N Chintawar, Ms. Sonali J Gajare, Ms. Shruti V Fatak, Ms. Sayali S Shinde and Prof. Gauri Virkar, “Enhancing Cloud Data Security Using Elliptical Curve Cryptographyâ€, International Journal of Advanced Research in Computer and Communication Engineering(IJARCE), ISSN (Online) (2278-1021) ISSN(Print)(2319-5940), Vol.5, No.3, pp.94-97,march 2016.

Manish M. Potey, Dr. C. A. Dhote and Deepak H.Sharma, “Efficient Homomorphic Encryption using ECC-ElGamal Scheme for Cloud Dataâ€, 3rd International Conference on Electrical, Electronics, Engineering Trends, Communication, Optimization and Sciences (EEECOS),pp.39-43,2016.

Kamal Benzekki, Abdeslam El Fergougui, Abdelbaki El Belrhiti El Alaoui, "A Secure Cloud Computing Architecture Using Homomorphic Encryptionâ€, International Journal of Advanced Computer Science and Applications (IJACSA), Vol. 7, No. 2, pp.293-298, 2016.

Babitha.M.P and K.R Remesh Babu, "Secure Cloud Storage Using AES Encryptionâ€, IEEE International Conference on Automatic Control and Dynamic Optimization Techniques, pp.859-864, 2016.

J. Daemen & V. Rijmen, " The design of Rijndael: AES-the advanced encryption standardâ€, Springer Science & Business Media, 2013.