A Deep Study of Analysis For Encryption and Decryption Algorithm in Cloud Data With Machine Learning Techniques
A Deep Study of Analysis For Encryption and Decryption Algorithm in Cloud Data With Machine Learning Techniques
2024 International Conference on Communication, Computing and Internet of Things (IC3IoT) | 979-8-3503-5268-9/24/$31.00 ©2024 IEEE | DOI: 10.1109/IC3IoT60841.2024.10550207
Abstract- An emergence of cloud computing has made secure recent approaches build upon traditional searchable
search on encrypted cloud data a popular area of study. Previous encryption methods, aiming to strike a balance between
techniques' limited ability to generate query trapdoors made them
safeguarding user access and query privacy while improving
query efficiency within the cloud environment. Current
less effective at ensuring query secrecy. A data user can also
secure query methodologies empower cloud servers to
readily examine the query results of another data user in these
efficiently search encrypted data without obtaining any
systems, as the data owner often has complete knowledge of the
valuable information regarding data files or user queries.
query results of the data users. In certain application settings, the
Nevertheless, due to constraints in the query trapdoor
data user could be reluctant to give away the privacy of their
generation process, a significant portion of these schemes,
query to anybody but themselves. It provide a search technique typically relying on symmetric encryption, can inadvertently
that enhances privacy by letting the data user create a different disclose user query privacy to certain internal entities
random query trapdoor each time and also it suggest the security external to the cloud. Data owners are depending more and
of our scheme and show through extensive experiments that it is more on different untrusted platforms (such as open cloud
exactly right. Put the suggested plan into practice and evaluate services, edges, and ML service providers) for scalability
how well it performs in terms of key generation process, secure computing or collaborative learning because of an ever-
indexing, trapdoor creation, and search timing. Compared to increasing amount of data and the necessity of creating
current hashing and attribute-based encryption searchable strong machine learning models. As a result, there is a risk
encryption technologies, the suggested scheme outperforms them. of abuse, illegal access, and privacy violations with sensitive
So, contributed to plan into practice, assess, and contrast its data and models. Through the use of cloud storage services
results using the example of searchable algorithms for encryption offered by an authorized service provider, data owners can
Keywords: Secure encrypted data, inquery result, cloud data.
escape the intricate procedures. But, there are particular
difficulties with performance, availability, security, and
scalability (PASS) in the exciting new paradigm of cloud
I INTRODUCTION
computing. According to recent study, security concerns are
the main obstacle keeping businesses and data files from
As cloud computing rapidly advances, an increasing utilizing cloud services among these obstacles.
number of organizations and individuals are embracing the
cloud to benefit from cost savings, rapid deployment, high
computation performance, and on-demand quality services.
However, the cloud, often considered a semi-trusted entity,
doesn't always inspire full trust from its users for various
reasons. Consequently, many are hesitant to entrust their
sensitive data to the cloud in its raw, unencrypted form. To
address this concern, a practical solution is to secure data
through encryption before transferring it to the cloud with
the increasing adoption of cloud computing, the secure and
efficient retrieval of encrypted data stored in the cloud has
become a significant research area. Several searchable
Fig 1.1 Basic procedure of Encryption and Decryption
encryption techniques have been created with the goal of
improving query efficiency and security, both in private key
A rise of interest in the topic has been sparked by the
and public key situations. These schemes are designed to
machine learning community's fascinating and inventive
safeguard the privacy of data access and queries for users,
research. Nowadays, there is a lot of research being done on
particularly within the context of cloud computing. Some
the issue of trustworthiness.
979-8-3503-5268-9/24/$31.00
Authorized licensed use limited©2024
to: ANNAIEEE
UNIVERSITY. Downloaded on August 22,2024 at 13:13:10 UTC from IEEE Xplore. Restrictions apply.
II Different Encryption and Decryption
Algorithms
Authorized licensed use limited to: ANNA UNIVERSITY. Downloaded on August 22,2024 at 13:13:10 UTC from IEEE Xplore. Restrictions apply.
We provide the formal definition of public-key encryption
C. Pailier Encryption Cryptosystem (PEC) (PKE) and introduce additively homomorphic public-key
encryption (PKE).
The composite Residuosity class issue forms the foundation
of the effective additive homomorphic encryption system
known as the Paillier cryptosystem (Paillier et al., 1999). This
implies that with just the encrypted messages for m1 and m2,
with the shared public key, computing the cipher text
becomes straightforward for the sum of m1 and m2. This
approach proves highly effective in safeguarding privacy,
especially in financial contexts where transactions primarily
involve addition or subtraction operations on amounts or
balances. Utilizing the public key (a, b), Paillier encryption of
a message c within the range [0, b − 1] is represented as m =
E(c, k), where k is randomly selected from [0, b − 1]. This
encryption process is probabilistic, adhering to the principles
of probabilistic public-key encryption, and possesses
homomorphic properties. Specifically, multiplying E (a1, k1)
by E(a2, k2) modulo m^2 yields an encryption of (a1 + a2)
mod n. This homomorphic feature renders the factoring-based Fig 5 Architecture of Pailier encryption
Paillier cryptosystem highly advantageous for various
cryptographic applications, particularly in scenarios involving III Comparison of Algorithms
addition or subtraction operations on encrypted values.
Decisional Composite Residuosity (DCR) implies that the
Paillier encryption method provides semantic security from Encrypti Key Bloc No of Effects
chosen-plaintext threats and is one-way private under CR. on Size(bit k rounds
Additionally, it has been demonstrated to conceal O (log n) algorith s) size
plaintext bits under a slightly stronger assumption.
ms (bits
Data privacy protection is one of the main objectives of
modern cryptography. While safeguarding private
)
information has always been important, the increasing usage AES 256 128 10,12, Efficient
of cloud services has made it even more so. Recently, 14 encryption/decry
homomorphic encryption has gained popularity for ption with
safeguarding data stored in cloud computing environments. It reduced
allows mathematical operations to be performed on a processing time.
ciphertext and return the outcome in the same manner as if RSA >1024 Min 0 Rapid encryption
the relevant plaintext had been used for the operation. 512 Round and decryption
s with a smaller
key size.
Pailier 256 128 No Save the time
rounds
VI REFERENCES
Authorized licensed use limited to: ANNA UNIVERSITY. Downloaded on August 22,2024 at 13:13:10 UTC from IEEE Xplore. Restrictions apply.