IJSTR

International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
0.2
2019CiteScore
 
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020

CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT

IJSTR >> Volume 8 - Issue 10, October 2019 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Flexible And Efficient Encryption Scheme For Data Dynamics On Encrypted Outsourced Data To Public Cloud

[Full Text]

 

AUTHOR(S)

D. Ramesh,B. Rama

 

KEYWORDS

Cloud computing, storage security, flexible encryption, homomorphic encryption, Jelastic cloud

 

ABSTRACT

Persistence of data has been around for many decades. In computer science, storing data permanently and efficiently is the rationale behind all the innovations in the persistence media. The contemporary technology to store and handle voluminous data is the storage service rendered by cloud computing platforms. However, data owner has no control over cloud infrastructure. It is totally in an untrusted environment. Nevertheless, there have been some mechanisms to deal with the security of data that has been outsourced. Right from public auditing methods to provable data possession to data integrity methods came into existence to ensure cloud storage security. Cryptographic methods could solve security problems. However, flexible encryption methods that help in secure data outsourcing that supports search and data dynamics on encrypted data are still desired. In this paper, we proposed a methodology that handle secure data storage in cloud and allow operations directly on encrypted data. Besides it takes care of the different formats of data. Jelastic cloud platform is used with two kinds of environments, one for structured data and one for unstructured and semi-structured data, are used for empirical study. A prototype application is built using Java programming language that facilitates intuitive interface to have flexible encrypted storage in public cloud and data dynamics directly on encrypted cloud datawith the help of Homomorphic Encryption (HE). The empirical results showed that the proposed system is more efficient than many existing methods.

 

REFERENCES

[1]. Zhao, F., Li, C., & Liu, C. F. (2014). A cloud computing security solution based on fully homomorphic encryption. 16th International Conference on Advanced Communication Technology. P1-4.
[2]. Maha TEBAA, Saïd EL HAJJI, Abdellatif EL GHAZI. (2012). Homomorphic Encryption Applied to the Cloud Computing Security. Proceedings of the World Congress on Engineering. 1, p1-4.
[3]. Maha TEBAA, 2Said EL HAJII. (2013). Secure Cloud Computing through Homomorphic Encryption. International Journal of Advancements in Computing Technology. 5 (16), p1-10.
[4]. Tebaa, M., Hajji, S. E., & Ghazi, A. E. (2012). Homomorphic encryption method applied to Cloud Computing. 2012 National Days of Network Security and Systems. P1-4.
[5]. Yu, J., Lu, P., Zhu, Y., Xue, G., & Li, M. (2013). Toward Secure Multikeyword Top-k Retrieval over Encrypted Cloud Data. IEEE Transactions on Dependable and Secure Computing, 10(4), 239–250.
[6]. Potey, M. M., Dhote, C. A., & Sharma, D. H. (2016). Homomorphic Encryption for Security of Cloud Data. Procedia Computer Science, 79, 175–181.
[7]. Kocabas, O., &Soyata, T. (2015). Utilizing Homomorphic Encryption to Implement Secure and Private Medical Cloud Computing. 2015 IEEE 8th International Conference on Cloud Computing. P1-8.
[8]. Boyang Wang, Ming Li, Chow, S. S. M., & Hui Li. (2013). Computing encrypted cloud data efficiently under multiple keys. 2013 IEEE Conference on Communications and Network Security (CNS). P1-5.
[9]. KamalBenzekki, Abdeslam El Fergougui and Abdelbaki El Belrhiti El Alaoui. (2016). A Secure Cloud Computing Architecture Using Homomorphic Encryption. International Journal of Advanced Computer Science and Applications. 7 (2), p1-6.
[10]. Bhabendu Kumar Mohanta, 2Debasis Gountia. (2013). Fully homomorphic encryption equating to cloud security: An approach. IOSR Journal of Computer Engineering. 9 (2), p46-50.
[11]. Li, Y., Gai, K., Qiu, L., Qiu, M., & Zhao, H. (2017). Intelligent cryptography approach for secure distributed big data storage in cloud computing. Information Sciences, 387, 103–115.
[12]. Hamdi, M. (2012). Security of cloud computing, storage, and networking. 2012 International Conference on Collaboration Technologies and Systems (CTS). P1-5.
[13]. HUANG, Q., MA, Z., YANG, Y., FU, J., & NIU, X. (2013). Secure and privacy-preserving DRM scheme using homomorphic encryption in cloud computing. The Journal of China Universities of Posts and Telecommunications, 20(6), 88–95.
[14]. Tebaa, M., Hajji, S. E., & Ghazi, A. E. (2012). Homomorphic encryption method applied to Cloud Computing. 2012 National Days of Network Security and Systems. P1-4.
[15]. Padmapriya. (2013). Cloud Computing: Security Challenges & Encryption Practices. International Journal of Advanced Research in Computer Science and Software Engineering. 3 (3), p1-5.
[16]. Ogburn, M., Turner, C., &Dahal, P. (2013). Homomorphic Encryption. Procedia Computer Science, 20, 502–509.
[17]. Baharon, M. R., Shi, Q., & Llewellyn-Jones, D. (2015). A New Lightweight Homomorphic Encryption Scheme for Mobile Cloud Computing. 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing. P1-8.
[18]. FarhadFarokhi, Iman Shames and NathanBatterham. (2013). Secure and Private Cloud-Based Control Using Semi-Homomorphic Encryption, p1-8.
[19]. Li, J., Chen, S., & Song, D. (2012). Security structure of cloud storage based on homomorphic encryption scheme. 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems. P1-4.
[20]. Ora, P., & Pal, P. R. (2015). Data security and integrity in cloud computing based on RSA partial homomorphic and MD5 cryptography. 2015 International Conference on Computer, Communication and Control (IC4). P1-6.
[21]. Shai Halevi, “Homomorphic Encryption Tutorial”, CRYPTO-2011, 1-60
[22]. Kristin Lauter, Michael Naehrig and Vinod Vaikuntanathan, “Can Homomorphic Encryption be Practical”, ACM, 2011, 1-18.
[23]. Dan Boneh, Eu-Jin Goh and Kobbi Nissim, “Evaluating 2-DNF Formulas on Ciphertexts”, 2006, 1-16 .
[24]. Ihsan Jabbar and Saad Najim, “Using Fully Homomorphic Encryption to Secure Cloud Computing”, Internet of Things and Cloud Computing. 4 (2), 2016, 13-18.
[25]. Craig Gentry, Shai Halevi and Nigel P. Smart, “Homomorphic Evaluation of the AES Circuit (Updated Implementation)”, 2015, 1-35.
[26]. Payal V. Parmar and Shraddha B. Padhar, “Survey of Various Homomorphic Encryption algorithms and Schemes”, International Journal of Computer Applications. 91 (8), 2014, 26-32.
[27]. Jean-Sebastien Coron, Avradip Mandal, David Naccache and Mehdi Tibouchi, 2011 “Fully Homomorphic Encryption over the Integers with Shorter Public Keys”, 2011, 1-24.
[28]. Maha TEBAA and Said EL HAJII, “Secure Cloud Computing through Homomorphic Encryption”, International Journal of Advancements in Computing Technology. 5 (16), 2013, 29-38.
[29]. Dan Boneh and John Mitchell, “A FULLY HOMOMORPHIC ENCRYPTION SCHEME”, 2009, 1-209.
[30]. Shashank Bajpai and Padmija Srivastava, “A Fully Homomorphic Encryption Implementation on Cloud Computing”, International Journal of Information & Computation Technology. 4 (8), 2014, 811-816.
[31]. Iram Ahmad and Archana Khandekar, “Homomorphic Encryption Method Applied to Cloud Computing”, International Journal of Information & Computation Technology. 4 (15), 2014, 1519-1530.
[32]. Kamal Benzekki, Abdeslam El Fergougui and Abdelbaki El Belrhiti El Alaoui, “A Secure Cloud Computing Architecture Using Homomorphic Encryption”, International Journal of Advanced Computer Science and Applications. 7 (2), 2016, 293-298.
[33]. D. Ramesh, B. Rama, “A Light Weight Cryptographic Technique for Secure Outsourcing and Retrieval of Data in Cloud Computing”, International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-8, Issue 10August 2019.
[34]. Venkateshwarlu Velde, B. Rama, “Optimized Weighted Round Robin Approach for Load Balancing in Cloud Computing” published in Journal of Computational and Theoretical NanoScience, 2019, Vol. 16, pp. 1-8, doi:10.1166/jctn.2019.7823.
[35]. Vurukonda, Naresh, and B. Thirumala Rao. "DC-MAABE: Data Centric Multi-Authority Attribute Based Encryption on Cloud Storage." Journal of Computational and Theoretical Nanoscience 16.5-6 (2019): 1893-1901.
[36]. Venkatakotireddy, G., B. Thirumala Rao, and Naresh Vurukonda. "A Review on Security Issue in Security Model of Cloud Computing Environment." Artificial Intelligence and Evolutionary Computations in Engineering Systems. Springer, Singapore, 2018. 207-212.