Homomorphic Encrypted Algorithms To Achieve Security in Cloud Computing
Homomorphic Encrypted Algorithms To Achieve Security in Cloud Computing
Computing
Abstract
Cloud computing is an emerging technology and the use of cloud computing offers many benefits. In
cloud we can store large amount of data. But while storing data in cloud we bother about security.
There are many security related algorithms in cloud computing. In other algorithms like Hybrid
algorithm, AES and DES we need to provide two keys: Public key and Private key. To perform any
operations on data in above algorithms we need to decrypt data. While Decryption if we know the
keys then we can hack the data easily. So there may be a chance of losing the data using these
algorithms. So we consider Homomorphic Encryption algorithm because homomorphic encryption
algorithm does not require any keys to perform operations on data.In other algorithms our data will
be stored in the cloud but encoded data will be stored in the cloud by using the homomorphic
encryption algorithm. If any attack occurs also our data will be secure. Homomorphic Encryption is
divided into Single and Fully Homomorphic Encryption.
1. Introduction
Homomorphic Encryption Algorithm is one type of encryption algorithm that is used to
analyse encrypted data without revealing our original data to anyone. The data is stored in the
encoded format in the homomorphic encryption algorithm. Homomorphic encryption is an
asymmetrical algorithm. Homomorphic Encryption algorithm is used in voting Systems. In present
society elections place a crucial role in which voting system is the decision making system. In voting
system each voter has a right to vote for any candidate as per his/her wish. The vote of the particular
voter will be stored but his/her information is kept secret and no modifications will be done to the
vote. The personal information of the voter will not be revealed to anyone.
Original Encryption Encryption
Data Key Result
Store in
Cloud
Encrypted
Data is Safe Decrypt the
and
Result
decrypted
result same
Data is Corrupted
HE = {Key, Encryption,Assesment,Decoding}
1. Key age: customer will be generating key pairs open key is pk and the other hidden key is sk for
plaintext encyption.
2. Encryption: By using mystery key sk customer encodes the plain content PT and generate Esk(PT)
and this figure material CT is sent to the server alongside open key pk.
3. Assessment: The server has capacity f for assessing the figure content CT and played out this as
per the necessary capacity utilizing pk.
4. Decoding: It will generate Eval(f(PT)) that will be decoded by customer utilizing their sk and it
will gets the unique outcome.
1. A contains x ∈{0 ,1 }k , containing a (k-1)-bits representing the revenue in binary as x 0.. , x k−2 x k−1
for 0 with a hidden SK code..
4. B will choose a random n-bit of integers y i∈ N + in such a way that y i ≡ yi % 2 for range of i
' '
' '
between {0,k-1}). He will computes y i← y i+ 1 for a range of i between {0,k-1}, choosing at random
an n-bit int t '∈ N + posessingt ' ≡ 1%2, calculates l 0)) ← y 0+t ' and z 0← y 0 · t ' and furtherl i+ ← y i +
' ' ' ' ' '
B will start calculating the 2’s complement of his/her argument and then add A’s x. The MSB of
the sign indicating that the relation between x and y: if the result is not positive, i.e. the signed bit is 1,
then obviously y > x.
Paillier algorithm was proposed in the year 1999 by Pascal Paillier. Paillier Homomorphic
Encryption Algorithm supports additive homomorphic operations but it does not support
multiplicative homomorphic operations. Paillier homomorphic encryption algorithm is an
Asymmetric algorithm.
Algorithm:
For encryption and decryption of the data we used lattice based cryptography in NTRU where
NTRU is an open-source public key cryptography. In NTRU we are having two different type of
algorithms: NTRUEncrypt and NTRUSign. NTRUEncrypt is an algorithm which is used for the
encryption process and NTRUSign algorithm is used for digital signatures. In other fully
homomorphic encryption algorithms we will be using the same public key to perform the
homomorphic encryption operations and encryption whereas in some cases when we perform
homomorphic operations for many users then the key of every user will be differen. So in the year
2012 NTRU based multi-key fully homomorphic encryption technique is proposed.
Algorithm:
Stage 1: User Bob randomly chooses 2 small polynomials x and y in the range of truncated
polynomials (x, y € R).
Stage 2: The reverse of x mod q and the reverse of x mod p will be determined.
x*xq^-1=1(modulo q) and
x*xp^-1=1(modulo p)
Step 2. Encryption:
Stage 1: The message to be sent is stored in polynomial m and ratio between –p/2 and p/2.
Step 3. Decryption:
A message e was received by bob from Alex and decrypt it:
Stage 2: With the assistance of the previous polynomial b=a(mod p) he computed another polynomial.
Bob reduces each of the coffecientof a module p.
Stage 3: Bob uses another private polynomial xp for calculating ciphertext c=xp*b(module p) where
this is alex’s original text.
6. Conclusion:
Homomorphic encryption algorithm is used to hide original data and it stores the encrypted
data in the cloud instead of original data. There are 2 types of homomorphic encryption algorithms:
Single and fully homomorphic encrypted algorithm. Single homomorphic encryption supports either
additive or multiplicative operations for each algorithm. But if we need to perform both operations at
the same algorithm then single homomorphic encryption algorithm may not be useful. So to perform
both operations in the same algorithm fully homomorphic encryption algorithm is proposed. By using
homomorphic encryption algorithms our data will be more secure. As per the fig[02] execution time
of paillier algorithm is more when compared to NTRU algorithm. So, we prefer fully homomorphic
encryption rather than single encryption algorithm.
Acknowledgement
We would say thank you for faculty of engineering state University of Koneru Lakshmaiah
Educational Foundation. Specially our guide for supporting facility and finance during this research.
References:
[1] https://www.sciencedirect.com/science/article/pii/S1877050919307811
[2] Tharam Dillon, Chen Wu and Elizabeth Chang, “Cloud Computing: Issues and Challenges,” in
Proceeding of 2010 24th IEEE International Conference on Advanced Information Networking and
Applications, pp. 27-33, 20-23 April 2010.
[3] http://people.scs.carleton.ca/~maheshwa/courses/4109/Seminar11/NTRU_presentation.pdf
[4] https://www.sciencedirect.com/science/article/pii/S187705091600154X
[5]
https://www.researchgate.net/publication/308277139_Paillier's_encryption_Implementation_and_clou
d_applications
[6]
https://www.researchgate.net/publication/261528316_A_Scalable_Implementation_of_Fully_Homom
orphic_Encryption_Built_on_NTRU
[7] V. Varadharajan and U. Tupakula, “Security as a Service Model for Cloud Environment,” IEEE
Trans. Netw. Serv. Manag ., 2014.
[8]https://www.sciencesmaths-paris.fr/upload/Contenu/Horizon%20Maths/HM2015/hm2015-
coron.pdf
[9] Paruchuri, V. L., Anantha, N. L., Konagala, V. L., & Bhattacharyya, D. (2016). Ciphertext-policy
attribute-based encryption for access control of data in cloud. International Journal of Software
Engineering and its Applications, 10(8), 13-22. doi:10.14257/ijseia.2016.10.8.02
[10] https://arxiv.org/ftp/arxiv/papers/1409/1409.0829.pdf
[12]D. Jamil and H. Zaki, “Security Issues in Cloud Computing and Countermeasures,” Int. J. Eng.
Sci. Technol., 2011.
[13]S. Singh, Y. S. Jeong, and J. H. Park, “A survey on cloud computing security: Issues, threats, and
solutions,” J. Netw. Comput. Appl., vol. 75, pp. 200–222, 2016.
[14] https://arxiv.org/pdf/1912.09034.pdf
[15] Srinivas Kumar, P., &Thirumala Rao, B. (2016). An efficient cloud based key aggregate data
sharing. Journal of Theoretical and Applied Information Technology, 83(3), 337-344. Retrieved from
www.scopus.com
[16] https://acadffhjpubl.eu/jhsi/2018-119-7/articles/7a/3.pdf
[17] Vurukonda, N., & Rao, B. T. (2016). A study on data storage security issues in cloud computing.
Paper presented at the Procedia Computer Science, , 92 128-135. doi:10.1016/j.procs.2016.07.335
Retrieved from www.scopus.com
[18]https://www.google.co.in/search?
q=encryption+and+decryption&safe=strict&source=lnms&tbm=isch&sa=X&ved=0ahUKEwiii7u0oL
PhAhUNFHIKHXxqB5QQ_AUIDigB&biw=1517&bih=730#imgrc=4jb2eldRwj2AIM:
[19]https://www.google.co.in/search?
q=symmetric+and+asymmetric+encryption&safe=strict&source=lnms&tbm=isch&sa=X&ved=0ahU
KEwjW07PzoLPhAhWVfn0KHc7zA1EQ_AUIDigB&biw=1517&bih=730#imgrc=S_HBEljhd7Kks
M:
[21] ElbasheerMO,Mohammed T. Signing and verifying certificates by NTRU and RSA algorithms
[C] 2015 International Conference on CloudComputing,2015:7149655.
[22]https://www.google.com/search?
q=encryption+and+decryption&source=lnms&tbm=isch&sa=X&ved=0ahUKEwj
EnY2_orPhAhUNEnIKHXTJAa8Q_AUIDigB#imgrc=uCcn_7GzjNejvM:
[23] Amudhavel, J., Kathavate, P., Reddy, L. S. S., &Satyanarayana, K. V. V. (2017). Effects,
challenges, opportunities and analysis on security based cloud resource virtualization. Journal of
Advanced Research in Dynamical and Control Systems, 9(Special Issue 12), 1458-1463. Retrieved
from www.scopus.com [24]https://www.google.com/search?
q=homomorphic+algorithm&source=lnms&tbm=isch&s=X&ved=0ahUKEwjww
M7xp7PhAhW6nMBHSXQBiMQ_AUIDygC#imgrc=OFodhWzdirnCuM
,