0% found this document useful (0 votes)
13 views

Enhancing Cloud Data Security Using Homomorphic Encryption Techniques

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-5 , October 2024, URL: https://www.ijtsrd.com/papers/ijtsrd70464.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-network/70464/enhancing-cloud-data-security-using-homomorphic-encryption-techniques/gopal-prasad-sharma

Uploaded by

Editor IJTSRD
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views

Enhancing Cloud Data Security Using Homomorphic Encryption Techniques

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-5 , October 2024, URL: https://www.ijtsrd.com/papers/ijtsrd70464.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-network/70464/enhancing-cloud-data-security-using-homomorphic-encryption-techniques/gopal-prasad-sharma

Uploaded by

Editor IJTSRD
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

International Journal of Trend in Scientific Research and Development (IJTSRD)

Volume 8 Issue 5, Sep-Oct 2024 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470

Enhancing Cloud Data Security Using


Homomorphic Encryption Techniques
Gopal Prasad Sharma
Associate Professor, Purbanchal University School of Science & Technology (PUSAT), Biratnagar, Nepal

ABSTRACT How to cite this paper: Gopal Prasad


As cloud computing completely changes how companies store and Sharma "Enhancing Cloud Data Security
process data, data security has become more important. When we use Using Homomorphic Encryption
standard encryption methods in the cloud, which don't work well Techniques" Published in International
Journal of Trend in
with the unique restrictions of this setting, we often end up with data
Scientific Research
breaches and more points of vulnerability. Homomorphic Encryption and Development
(HE), which lets us do calculations on encrypted data without (ijtsrd), ISSN:
showing the data itself, is a game-changing option. The article 2456-6470,
discusses the operation of homomorphic encryption and its potential Volume-8 | Issue-5,
to enhance cloud security, data protection, and trust. There are October 2024, IJTSRD70464
several trends that could potentially enhance the security of pp.940-946, URL:
homomorphic encryption in the future, as cloud data security is www.ijtsrd.com/papers/ijtsrd70464.pdf
limited. Real-life case studies and applications are used in this piece
to show and discuss about how this cutting-edge cryptographic Copyright © 2024 by author (s) and
International Journal of Trend in
method works in the real world. The future of cloud data security will
Scientific Research and Development
be significantly influenced by heteromorphic encryption. Journal. This is an
KEYWORDS: Homomorphic Encryption, Cloud Computing, Data Open Access article
Security, Privacy, Compliance distributed under the
terms of the Creative Commons
Attribution License (CC BY 4.0)
(http://creativecommons.org/licenses/by/4.0)

1. INTRODUCTION
Cloud computing has revolutionised data storage and are to safeguard sensitive data, as cloud data may be
administration. Distributes computer services over the required to adhere to regulations. Cloud data
Internet ("the cloud") to give consumers on-demand protection is indispensable in light of these concerns.
access to many resources [1]. These services include In order to safeguard data, organisations should
servers, storage, databases, networking, software, establish rigorous security protocols.
analytics, and intelligence. This paradigm allows Deep Neural Networks (DNNs) made it famous for
faster scalability, lower hardware maintenance costs, processing big, unstructured data sets better than
and better teamwork across locations. Cloud standard machine learning.
computing's efficiency, scalability, and agility make it
important to today's IT architecture. Cloud storage 2. Homomorphic Encryption
can improve data backup, content distribution, and Homomorphic encryption, a complex cryptographic
disaster recovery for businesses [2]. Cloud-hosted approach, permits calculation on encrypted data
ERP and CRM applications are common. Remote without revealing the plaintext [4]. This unique
work, collaboration, and data access from anywhere function lets users instantaneously add and multiply
are all benefits of cloud storage. Many cloud encrypted data, resulting in an encrypted result that
providers also offer advanced analytics solutions to matches the original data's output. Cloud computing,
help companies acquire data insights. With the rise of which processes and stores sensitive data remotely,
cloud computing, data security is more vital. Cloud requires this feature for data privacy. Homomorphic
computing has security vulnerabilities. Cloud data is encryption requires meaningful computations and
susceptible to data breaches, ransomware, and confidentiality. Allowing computations on ciphertexts
unauthorised access [3]. Numerous newspapers have protects sensitive data in untrusted environments.
reported that data breaches that revealed personal Cloud computing is difficult because customers must
information have cost many companies money and trust third-party providers with sensitive data.
reputation. The law and the correct course of action

@ IJTSRD | Unique Paper ID – IJTSRD70464 | Volume – 8 | Issue – 5 | Sep-Oct 2024 Page 940
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
Algorithms Involved
Homomorphic encryption works with several
algorithms, each with its own security and processing
efficiency. FHE uses Learning With Errors (LWE)
and other lattice-based encryption methods because
they withstand quantum attacks. Famous techniques
for partially or completely homomorphic encryption
include integer factorisation and elliptic curve
cryptography.
Figure 1 Homomorphic Encryption (Source:
Self-created) 2.3. Overview of the Encryption and Decryption
Processes
2.1. Types of Homomorphic Encryption Encryption Process
Based on the scope of data manipulations,  The user generates a public/private key pair.
homomorphic encryption has three main types:  The plaintext data is encrypted using the public
Partially Homomorphic Encryption (PHE): This key, resulting in ciphertext.
type adds or multiplies ciphertexts but not both. PHE  The ciphertext is sent to a cloud service or
is used in RSA encryption, which multiplies another party for processing.
encrypted data. PHE provides some security for Computation on Encrypted Data
certain applications, but complicated computations  The cloud service performs the designated
are limited by its constraints [5]. operations on the ciphertext, yielding a new
Somewhat Homomorphic Encryption (SHE): SHE ciphertext that represents the result of the
methods allow limited ciphertext addition and computation.
multiplication. This kind is more flexible than PHE Decryption Process
but limited by the amount of processes before the  The computed ciphertext is sent back to the data
ciphertext gets too noisy to decrypt. SHE schemes owner.
like Brakerski-Gentry-Vaikuntanathan (BGV) allow  The data owner decrypts the ciphertext using the
moderate activities while ensuring security [6]. private key, exposing the end result that matches
Fully Homomorphic Encryption (FHE): FHE is the the plaintext action.
most powerful homomorphic encryption, providing  Thus, homomorphic encryption secures cloud
limitless ciphertext addition and multiplication. data, allowing organisations to use cloud
Secure data analysis, machine learning, and other computing while protecting sensitive data.
applications benefit from this ability to perform Homomorphic encryption research promises to
complex computations on encrypted data [7]. improve efficiency and expand its use in
CraigGentry introduced the first workable FHE healthcare and finance.
technique in 2009, a cryptographic breakthrough. 3. Current State of Cloud Data Security
2.2. Working of Homomorphic Encryption 3.1. Overview of Traditional Encryption
Homomorphic encryption uses numerous ideas and Methods
methods to secure and function encrypted data Cloud encryption protects sensitive data against
processing. unauthorised access. The majority of encryption
techniques are symmetric or asymmetric.
Basic Principles
Encryption: We encrypt plaintext with a public key
first. By converting plaintext to ciphertext, encryption
makes data practically unreadable without the
decryption key.
Computation on Ciphertext: Use ciphertext for
computations without decryption. The methods vary
by homomorphic encryption method, but addition and
multiplication are usually included.
Decryption: When computations are complete, send
the ciphertext to the data owner so they can decode it
Figure 1 Cloud Data Security (Source: Self-
with a private key.
created)

@ IJTSRD | Unique Paper ID – IJTSRD70464 | Volume – 8 | Issue – 5 | Sep-Oct 2024 Page 941
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
Symmetric Encryption: Data is encrypted and damage. Cloud providers prioritise these
decrypted using the same key in symmetric requirements despite operational complexity [11].
encryption. Sender and receiver must share a secret Organisations should protect cloud data with
key to encrypt and decrypt messages. Symmetric access limits and traditional encryption. Due to
algorithms like AES and DES are well-known. the limits of traditional encryption methods,
Symmetric encryption is more efficient at processing especially for encrypted data, homomorphic
large amounts of data quickly and using little encryption is growing in popularity. These
computational power [8]. The issue is distributing and innovations let businesses securely analyse cloud
managing encryption keys safely. A key compromise data and obtain insights. Modern cyberthreats
threatens the entire system. outgrow traditional cloud data encryption.
Asymmetric Encryption: Asymmetric encryption Companies must improve their security to protect
uses public and private keys. Private keys are kept personal data and meet evolving standards.
secret and used for decoding, but public keys can be 4. Benefits of Using Homomorphic Encryption in
used to encrypt data. RSA and ECC are used in Cloud Security
asymmetric encryption [9]. This strategy increases Homomorphic encryption improves cloud data
security by not transmitting the private key. It is security.
slower and less efficient than symmetric encryption,
Homomorphic Encryption (HE) enables encrypted
making it unsuitable for real-time encryption of large
data computations without decryption, improving
volumes of data. In cloud computing, even the
cloud service providers' data privacy, security, and
strongest encryption systems have restrictions. Data
compliance.
decryption before processing is a major issue.
Unaffiliated third parties' cloud-stored private data
may be required.
Safe key management may be hampered by standard
encryption systems, hindering user collaboration and
data interchange.
3.2. Existing Security Challenges
Taking sensitive data to the cloud poses security
issues for businesses.
 Preventing data leaks is cloud providers' primary
priority. Cloud security vulnerabilities allow
thieves to steal critical data. Data leaks can
damage reputation, financial accounts, and legal
status. Cloud data requires improved protection
after high-profile attacks on major organisations. Figures 3 Homomorphic Encryption in Cloud
Security (Source: Self-created)
 Theft of sensitive data by thieves is another
concern. Effective attackers may be able to Data Privacy and Confidentiality
compromise cloud services due to weak Data privacy and processing secrecy are important
authentication [10]. Once in, they might take data benefits of homomorphic encryption. Decrypting
or alter it to compromise data integrity, making sensitive data before computation is typical in
systems more vulnerable to assaults. Businesses conventional cloud systems [12]. Privacy risks arise
should use role-based access limitations and with unencrypted data, especially with third-party
multi-factor authentication to mitigate these cloud providers. To circumvent this, homomorphic
dangers. encryption encrypts data during computation. To
better assess and plan therapy, healthcare
 Integrity determines cloud data reliability. organisations might encrypt sensitive patient data
Corruption or illegal data alterations can disrupt before transferring it to the cloud. Without accessing
operations and cause blunders. Keep extensive medical records, the cloud provider can utilise
audit records and use checksums or hashes to homomorphic encryption to perform machine
discover and fix integrity issues. learning or statistical research on this encrypted data.
 Banking and healthcare have strict data security Only authorised people with the decryption key can
and privacy requirements. Companies handling read the encrypted results provided to the
personal data must obey HIPAA and GDPR. organisation. Healthcare, finance, and government
Infractions can lead to fines and reputation handle sensitive data and require this competence

@ IJTSRD | Unique Paper ID – IJTSRD70464 | Volume – 8 | Issue – 5 | Sep-Oct 2024 Page 942
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
[13]. Data is protected from breaches and privacy computations employ ciphertext. Data breaches are
compliance throughout its processing lifecycle with much less likely when unencrypted data is blocked.
homomorphic encryption. With homomorphic encryption, monitoring and
Secure Computation in the Cloud access controls can be added to reduce unauthorised
Homomorphic encryption revolutionises secure access. Layered security using homomorphic
computing on encrypted data. User trust is needed encryption, strong authentication, and authorisation
because cloud providers manage unencrypted data in can improve data protection [19]. A corporation that
traditional systems [14]. safeguards sensitive data against data breaches is
more trusted by customers, stakeholders, and
Trust can be misplaced, leaving organisations regulatory bodies. Businesses that prioritise data
vulnerable to significant security breaches. Cloud security and deploy cutting-edge encryption are more
providers with homomorphic encryption can handle likely to retain customers and partners.
sensitive data. This secure computation technique
helps organisations use cloud computing's scale and 5. Implementation Challenges and
flexibility without data security concerns. The bank Considerations
can encrypt transaction records before transferring Although difficult, HE can secure cloud data.
them to a cloud provider for analysis. Without Companies using this cutting-edge encryption face
transaction specifics, the cloud service can compute performance, technical complexity, and scalability
and identify fraud patterns. The institution's secrecy concerns. Companies considering homomorphic
prevents unauthorised users from decrypting results. encryption in cloud infrastructures should address
Secure computing gives companies and cloud service these issues.
providers trust by preventing data theft [15]. Performance Issues
Companies use homomorphic encryption to reduce Computer computational cost is a big issue with
risk while outsourcing data analysis and processing to homomorphic encryption. HE encryption and
the cloud. decryption need higher system resources. When
Compliance and Regulatory Benefits encrypting data, modular and lattice-based
HIPAA and the GDPR require organisations to follow calculations might increase processing load. Time-
all data protection rules. Reputational, legal, and sensitive applications cannot use homomorphic
financial consequences may result from inability to encryption due to its computational cost [20]. Big
comply [16]. Homomorphic encryption improves data analytics and machine learning may suffer from
compliance. Company commitment to consumer HE. These jobs require quick huge dataset
privacy and security can be shown by data computations. Decryption, processing, and encryption
encryption. This encryption technique meets data can slow an organization's economic and market
processing, retention, and access requirements. response. Type impacts homomorphic encryption.
Companies must use technology to protect personal Fully Homomorphic Encryption (FHE) has the most
data under GDPR. Homomorphic encryption prevents operational flexibility but the highest computational
data breaches and verifies compliance. HIPAA- overhead [21]. FHE may outperform SHE, although
covered healthcare organisations can protect patient both limit operations. Before using homomorphic
data during processing via homomorphic encryption encryption, companies should assess performance and
[17]. Companies can simplify data exchange operational limits.
agreements with third-party cloud providers using Technical Complexity
homomorphic encryption. Companies are able to Homomorphic encryption in cloud infrastructures is
comply with regulations by regulating the access of technologically challenging. Integrating HE into
sensitive data and the timing of its release. security systems can be difficult for organisations
Reduced Risk of Data Breaches without advanced cryptography skills.
Data breaches are a major cloud risk for enterprises. Old approaches may not work with homomorphic
High-profile incidents show that hackers can attack encryption in cloud architecture [22]. To implement
even the most reliable cloud systems [18]. As more HE, companies may need to alter their data
companies store sensitive data on the cloud, the risk processing systems. This integration may be
of unlawful access and data exfiltration increases. complicated by data storage, access limitations, and
Homomorphic encryption protects encrypted data processing pipeline adjustments.
from cloud provider server compromises. If an To implement efficiently, you must master
attacker breaches cloud computing, they cannot homomorphic encryption, a subfield of advanced
decipher or access the data stored there because all cryptography. Investing in personnel training or

@ IJTSRD | Unique Paper ID – IJTSRD70464 | Volume – 8 | Issue – 5 | Sep-Oct 2024 Page 943
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
higher education experts is not always feasible. Lack sensitive data in Azure without Microsoft or others
of competent staff and readily available resources accessing it. Healthcare and financial companies
may limit homomorphic encryption deployment. utilise this technology to securely evaluate private
To balance security and performance, choose the datasets. Azure's Confidential Computing lets
correct homomorphic encryption algorithm. In order healthcare businesses evaluate patient data in
to identify the most effective algorithm, businesses accordance with HIPAA. Trust in cloud solutions has
must implement multiple evaluations. Algorithms increased as data breaches have decreased. Still,
determine encryption performance. businesses struggle to integrate HE into their
processes and train personnel on the technology.
Scalability Concerns
Scale homomorphic encryption for large datasets and NVIDIA and Secure Machine Learning
high transaction volumes. Scaling HE systems In federated learning, NVIDIA has considered
without sacrificing performance is essential as data homomorphic encryption to secure sensitive data.
grows exponentially. NVIDIA's encrypted data computations enable
sensitive data machine learning model training [26].
Homomorphic encryption generates large ciphertexts. This technology lets banks securely evaluate
Data bloat complicates processing, transit, and transaction data to detect fraud. The findings show
storage [23]. Larger encrypted datasets require more improved data privacy and security, helping
work, which could slow data processing. organisations meet laws. Training models using
Homomorphic encryption computational encrypted input requires updating algorithms and
requirements increase with data. The performance hardware due to performance issues.
cost from HE may be prohibitive for businesses that Analysis of Outcomes
expect their calculations on vast datasets to become The implementation of homomorphic encryption in
more complicated. This issue may require more these case studies has yielded significant benefits,
expensive processing resources or specialised including:
equipment.
 By keeping data encrypted during processing,
Daily workloads vary, and many organisations organizations can protect sensitive information
operate in unexpected environments. Flexible and from unauthorized access and potential breaches.
efficient, homomorphic encryption solutions manage
any workload [24]. Complexity makes this  Organizations can better meet legal and
adaptability difficult in higher education, but it's regulatory requirements, such as GDPR and
essential for data processing enterprises. HIPAA, by ensuring that sensitive data remains
confidential throughout its lifecycle.
6. Case Studies and Real-World Applications
IBM and the Helios Voting System  In systems like Helios, the transparent nature of
IBM's Helios voting system demonstrates HE fosters trust among users, assuring them that
homomorphic encryption. their data is secure and handled appropriately.

Helios, a free, open-source electronic voting system, However, challenges remain that organizations must
lets voters inspect ballots and protect them with navigate:
homomorphic encryption [25]. This system encrypts Computational Overhead: The performance impact
votes before counting data. This method lets election of homomorphic encryption can be significant,
officials calculate final vote totals without seeing leading to increased processing times and the need for
individual votes. Helios' homomorphic encryption more powerful computing resources.
improves voter privacy and confidence in elections.
Technical Complexity: Integrating HE into existing
The mechanism is transparent, allowing electors to systems often requires specialized knowledge and
observe the results and rest assured that their skills, which may necessitate additional training for
decisions will not be disclosed. However, staff or hiring new personnel.
computational cost and cryptography-specific skills
have been detected during implementation, requiring Scalability Issues: As data volumes grow, the
careful preparation and resource distribution. scalability of homomorphic encryption solutions can
become a concern, requiring organizations to develop
Microsoft Azure and Confidential Computing strategies to manage larger datasets efficiently.
Microsoft Azure's Confidential Computing program
uses homomorphic encryption. This initiative's secure 7. Future Trends and Developments
enclaves protect data during processing. Recently developed theory and practice make HE
Homomorphic encryption lets organisations calculate more practical and efficient in many situations. The

@ IJTSRD | Unique Paper ID – IJTSRD70464 | Volume – 8 | Issue – 5 | Sep-Oct 2024 Page 944
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
main focus of HE computational cost researchers is Engineering (IJECE), vol. 11, no. 2, pp. 1771-
algorithm optimisation. Several homomorphic 1779, 2021.
encryption methods use lattice-based cryptography [2] S. A. Khan, R. K. Aggarwal, and S. Kulkarni,
for efficiency and security. Enhancing bootstrapping "Enhanced homomorphic encryption scheme
in FHE expedites and realisticizes encrypted with PSO for encryption of cloud data," in 2019
calculations for practical applications. Hybrid models 5th International Conference on Advanced
that combine homomorphic encryption with other Computing & Communication Systems
cryptographic methods are also rising, providing a (ICACCS), 2019, pp. 395-400.
more balanced approach that addresses each
algorithm's weaknesses. As these advances occur, [3] M. Faiz, N. Fatima, R. Sandhu, M. Kaur, and
homomorphic encryption could dramatically impact V. Narayan, "Improved homomorphic
cloud security. HE could transform cloud data encryption for security in cloud using particle
security and privacy, according to predictions. New swarm optimization," Journal of
legislation and data security concerns may make Pharmaceutical Negative Results, pp. 4761-
homomorphic encryption essential for cloud 4771, 2022.
computing security. [4] A. A. Alqarni, "A secure approach for data
Companies may now access essential data without integration in cloud using Paillier homomorphic
disclosing it, making data management safer and encryption," Journal of Basic and Applied
more private. This functionality helps organisations Sciences, vol. 5, no. 2, pp. 15-21, 2021.
comply with GDPR and HIPAA by showing clients [5] N. Almoysheer, M. Humayun, and N. Z.
their data is secure. With the rise of cloud services, Jhanjhi, "Enhancing cloud data security using
security must be strong. The field of homomorphic multilevel encryption techniques," Turkish
encryption is developing secure multi-party Online Journal of Qualitative Inquiry, vol. 12,
computations that can decrypt encrypted data without no. 3, 2021.
revealing the inputs. As more is comprehended about [6] B. Seth, S. Dalal, and R. Kumar, "Hybrid
homomorphic encryption, it should become feasible homomorphic encryption scheme for secure
for the protection of cloud and internet data. cloud data storage," Recent Advances in
8. Conclusion Computational Intelligence, pp. 71-92, 2019.
Homomorphic encryption revolutionises cloud data [7] F. Thabit, O. Can, S. Alhomdy, G. H. Al-
security. As more companies use cloud services to Gaphari, and S. Jagtap, "A novel effective
store and process data, strong security has always lightweight homomorphic cryptographic
been important. Homomorphic encryption allows algorithm for data security in cloud
calculations on encrypted data, preserving anonymity computing," International Journal of Intelligent
and allowing data analysis. Homomorphic encryption Networks, vol. 3, pp. 16-30, 2022.
improves data privacy, legal compliance, and secure
calculations without exposing sensitive information, [8] S. Mittal, P. Jindal, and K. R. Ramkumar,
according to its analysis. Computing overhead, "Data privacy and system security for banking
technological complexity, and scalability difficulties on clouds using homomorphic encryption," in
may develop during HE implementation. 2021 2nd International Conference for
Organisations must overcome various challenges to Emerging Technology (INCET), 2021, pp. 1-6.
use homomorphic encryption in cloud security. [9] A. Singh and S. Sharma, "Enhancing data
Homomorphic encryption will underpin secure cloud security in cloud using split algorithm, Caesar
computing, making cloud data security brilliant. With cipher, and Vigenere cipher, homomorphism
this innovative technique, organisations may protect encryption scheme," in Emerging Trends in
sensitive data and build trust with clients and Expert Applications and Security: Proceedings
partners. As we move towards a data-driven future, of ICETEAS 2018, Springer Singapore, 2019,
homomorphic encryption in cloud security pp. 157-166.
frameworks will protect data and enable secure, [10] K. A. Kumari, A. Sharma, C. Chakraborty, and
collaborative data-driven decision-making. M. Ananyaa, "Preserving health care data
9. Reference security and privacy using Carmichael's
[1] M. M. S. Altaee and M. Alanezi, "Enhancing theorem-based homomorphic encryption and
cloud computing security by Paillier modified enhanced homomorphic encryption
homomorphic encryption," International schemes in edge computing systems," Big
Journal of Electrical and Computer Data, vol. 10, no. 1, pp. 1-17, 2022.

@ IJTSRD | Unique Paper ID – IJTSRD70464 | Volume – 8 | Issue – 5 | Sep-Oct 2024 Page 945
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
[11] S. J. Mohammed and D. B. Taha, "From cloud [19] A. S. Sawant, "Enhancing encryption in cloud
computing security towards homomorphic computing and reducing energy usage by using
encryption: A comprehensive review," PSO-ALO algorithm to improve homomorphic
TELKOMNIKA (Telecommunication encryption technique," Ph.D. dissertation,
Computing Electronics and Control), vol. 19, Dublin, National College of Ireland, 2022.
no. 4, pp. 1152-1161, 2021.
[20] V. Biksham and D. Vasumathi, "A lightweight
[12] I. Sudha and R. Nedunchelian, "A secure data fully homomorphic encryption scheme for
protection technique for healthcare data in the cloud security," International Journal of
cloud using homomorphic encryption and Jaya– Information and Computer Security, vol. 13,
Whale optimization algorithm," International no. 3-4, pp. 357-371, 2020.
Journal of Modeling, Simulation, and Scientific
[21] G. Prabu Kanna and V. Vasudevan, "A fully
Computing, vol. 10, no. 06, p. 1950040, 2019.
homomorphic–elliptic curve cryptography
[13] C. Rupa, Greeshmanth, and M. A. Shah, based encryption algorithm for ensuring the
"Novel secure data protection scheme using privacy preservation of the cloud data," Cluster
Martino homomorphic encryption," Journal of Computing, vol. 22, no. Suppl 4, pp. 9561-
Cloud Computing, vol. 12, no. 1, p. 47, 2023. 9569, 2019.
[14] S. Ali, S. A. Wadho, A. Yichiet, M. L. Gan, [22] R. Sendhil and A. Amuthan, "A descriptive
and C. K. Lee, "Advancing cloud security: study on homomorphic encryption schemes for
Unveiling the protective potential of enhancing security in fog computing," in 2020
homomorphic secret sharing in secure cloud International Conference on Smart Electronics
computing," Egyptian Informatics Journal, vol. and Communication (ICOSEC), 2020, pp. 738-
27, p. 100519, 2024. 743.
[15] M. U. Sana, Z. Li, F. Javaid, H. B. Liaqat, and [23] Y. Ameur and S. Bouzefrane, "Handling
M. U. Ali, "Enhanced security in cloud security issues by using homomorphic
computing using neural network and encryption in multi-cloud environment,"
encryption," IEEE Access, vol. 9, pp. 145785- Procedia Computer Science, vol. 220, pp. 390-
145799, 2021. 397, 2023.
[16] C. Regueiro, I. Seco, S. De Diego, O. Lage, and [24] P. Thangavel, P. S. A. Mary, M. M.
L. Etxebarria, "Privacy-enhancing distributed RameshKannan, and K. Deiwakumari,
protocol for data aggregation based on "Enhancing data security in multi-cloud
blockchain and homomorphic encryption," settings with homomorphic encryption:
Information Processing & Management, vol. Concepts, uses, and obstacles," Educational
58, no. 6, p. 102745, 2021. Administration: Theory and Practice, vol. 30,
[17] M. A. Hossain and M. A. Al Hasan, no. 4, pp. 7347-7353, 2024.
"Improving cloud data security through hybrid [25] A. Murugesan, B. Saminathan, F. Al‐Turjman,
verification technique based on biometrics and and R. L. Kumar, "Analysis on homomorphic
encryption system," International Journal of technique for data security in fog computing,"
Computers and Applications, vol. 44, no. 5, pp. Transactions on Emerging Telecommunications
455-464, 2022. Technologies, vol. 32, no. 9, p. e3990, 2021.
[18] M. Joseph and G. Mohan, "Design a hybrid [26] P. K. Rani, S. Sathiya, S. Sureshkumar, and B.
optimization and homomorphic encryption for A. Kumar, "Enhancing cloud security with
securing data in a cloud environment," hybrid encryption," in 2022 International
International Journal of Computer Networks Conference on Applied Artificial Intelligence
and Applications (IJCNA), vol. 9, no. 4, pp. and Computing (ICAAIC), 2022, pp. 1445-
387-395, 2022. 1450.

@ IJTSRD | Unique Paper ID – IJTSRD70464 | Volume – 8 | Issue – 5 | Sep-Oct 2024 Page 946

You might also like