Homomorphic Encryption For Secure Data Analysis A Hybrid Approach Using PKCS1 OAEP Padding
Homomorphic Encryption For Secure Data Analysis A Hybrid Approach Using PKCS1 OAEP Padding
C. R. Kavitha
Department of Computer Science and
Engineering, Amrita School of
Computing, Amrita Vishwa
Vidyapeetham, Bengaluru, India
[email protected]
Abstract—In today's data-driven world, striking a balance encryption underscore its significance in advancing a
between data utility and privacy is paramount. Homomorphic responsible and secure data analytics landscape. One notable
encryption, a revolutionary cryptographic technique, facilitates approach involves the application of Partial Ho mo morphic
computations on encrypted data without decryption. This study Encryption (PHE), featuring a dual-layered encryption
addresses the growing demand for secu re data analysis, paradigm and user-generated keys to bolster the privacy and
emphasizing the seamless integration of homomorphic integrity of medical data [1].
encryption in connecting robust data analysis with essential
privacy safeguards. Serving as a vital component in this context, In the rapidly evolving landscape of secure cloud
this cutting-edge technique proves pivotal in fostering a secure, computing, various cryptographic frameworks have been
privacy-centric approach to data analytics. The outcomes proposed to safeguard sensitive data and uphold privacy
underscore its significance, representing a substantial stride standards. Extending the scope, a secure cloud-based e-
towards the evolution of a conscientious and responsible data- voting system leverages Fully Ho mo morphic Encryption
driven ecosystem. The achieved results signal progress in with Chinese Remainder Theorem (FHECRT) to encrypt and
harmonizing data utility and privacy, enhancing overall security process votes, ensuring privacy and minimizing tampering
and ethical data practices without compromising analytical risks, alongside a comparative analysis with other
capabilities. homomorphic encryption algorithms [2]. Investigating the
Keywords— AES Encryption, Cloud Security, Homomorphic intersection of security and the Internet of Things (IoT), a
Encryption, Privacy Preservation, RSA Encryption, Secure Data study explores the feasibility of implementing homo morphic
Analytics encryption on IoT devices, scrutinizing resource
consumption, and offering optimization guidelines using
SEA L and HElib libraries on the Raspberry Pi 4 platform
I. INT RODUCT ION [3].
Addressing the challenges of security in IoT
In the era of pervasive data utilization, homo morphic environments, another research endeavor proposes a hybrid
encryption emerges as a transformative cryptographic data aggregation scheme utilizing symmetric encryption
paradigm, allowing computations on encrypted data without (Advanced Encryption Standard (AES), Triple Data
the need for decryption. This groundbreaking technique Encryption Standard (DES)) and ho mo morphic encryption,
addresses the pivotal challenge of balancing data utility and aiming to elevate security, accuracy, and reduce latency
privacy in this data-driven world. Ho mo morphic encryption while prioritizing privacy [4]. In the realm of hybrid
ensures that sensitive information remains confidential encryption models, a co mprehensive study introduces and
during computational processes, fostering a secure and implements four models that combine AES and Blowfish for
privacy-centric approach to data analysis. Its importance lies input encryption, coupled with Rivest, Shamir, Adleman
in mitigating the inherent trade-off between data accessibility (RSA) and Elliptic Curve Cryptography (ECC) for key
and protection, providing a means to extract valuable insights exchange. The performance and randomness of these models
without compromising confidentiality. Applications of are meticulously evaluated using various metrics [5].
homomorphic encryption span various domains, including Additionally, a co mparative analysis investigates the
healthcare, finance, and secure cloud computing. In efficiency of symmetric (A ES, DES, Caesar Cipher, Stream
healthcare, for instance, it enables collaborative research on Cipher) and asymmetric (Diffie -Hellman, RSA)
encrypted patient data, preserving individual privacy. In cryptographic algorithms, with a particular focus on file and
finance, it allows secure computation on encrypted financial image encryption, providing valuable insights into
transactions. The versatile applications of homomorphic processing time and CPU usage [6]. This diverse spectrum of
research underscores the multifaceted nature of Arithmetic Circuit Ho mo morphic Encryption (ACHE),
cryptographic solutions in securing cloud-based systems and comparing it with Elliptic Curve Diffie Hellman (ECDH)
IoT environments. and analyzing factors such as latency, key generation,
encryption, and CPU usage. Evaluating key and ciphertext
The proposed model stands out by ensuring a secure data sizes, [14] assesses Paillier, ElGamal, ASHE, and Sy mmetric
import process from service seekers. Upon importing, the
for secure cloud computing, with a specific emphasis on low-
data is promptly encrypted within the data lake, a pivotal step memory devices. In a novel application, [15] proposes using
in safeguarding confidentiality, integrity, and accountability.
Homo morphic Encryption with GPS to enhance location
The stringent measures implemented cut off download
privacy for VIPs in real-t ime, encrypting and sharing journey
permissions for all parties—1st, 2nd, and 3rd, assuring that details confidentially. Furthermore, [16] introduces DPP, a
once uploaded, raw data remains inaccessible.
homomorphic encryption-based scheme for secure cloud
The major contributions of this study are: computing, ensuring data privacy in asynchronous
transactions.
This model is poised to revolutionize how
Multinational Corporations (MNCs) handle Identifying vulnerabilities, [17] demonstrates known
proprietary information, guaranteeing its safety plaintext attacks on the Omar and Abed homo morphic
and accessibility from any location, at any time. encryption scheme. In the realm of b lockchain privacy, [18]
introduces a strategy utilizing homo morphic encryption for
Notably, the proposed approach integrates data secure data sharing, addressing privacy concerns, and
visualization and analysis directly within the enhancing accuracy and efficiency in data transmission. For
data lake, eliminating the need for data plaintext encryption in homo morphic encryption, suggests
movement, copying, or sharing among different an improved paradigm, outsourcing computation to a
entities. delegated proxy to alleviate the co mputational burden on
The strategic design of the study ensures that lightweight terminals in stream data applications.
sensitive information remains within the secure Additionally, [19] proposes a privacy-preserving logistic
enclave of the data lake, min imizing potential regression scheme based on leveled fully ho mo morphic
vulnerabilities and fort ifying overall data encryption (CKKS) and trusted hardware, enabling efficient
security. model training on encrypted data while preserving data
privacy.
Section II offers an essential overview of homo morphic
encryption, including a review of relevant prior research. Presenting an innovative privacy-preserving logistic
Section III presents an in-depth analysis of the dataset, regression scheme, [20] leverages trusted hardware and
including its orig in and detailed description. Section IV is Leveled FHE for encrypted computations, offloading
dedicated to the research methodology employed. Section V bootstrapping and non-linear activation functions to trusted
elaborates on the findings and provides a discussion on the hardware for enhanced efficiency and accuracy.
implications of the results. Lastly, Section VI concludes the Acknowledging the challenges of current homomorphic
paper, offering a summary and highlighting potential encryption, [21] proposes harnessing hardware like FPGAs
avenues for future research in this field. to turbocharge computations, paving the way for faster,
privacy-preserving cloud computing. [22] contributes to the
literature by reviewing existing homo morphic encryption
protocols for secure cloud data processing, proposing a new
II. RELAT ED WORK protocol with security analysis and experiments, and
emphasizing the need for mo re practical schemes for real-
In this retrospective analysis, classical homo morphic world cloud applications.
encryption algorithms, including RSA, El-Gamal, and Enhancing the first identity-based fully ho mo morphic
Paillier, are scrutinized, emphasizing their properties and encryption (IBFHE) scheme by leveraging improved noise
evolution towards achieving fully homo morphic encryption analysis methods and novel trapdoors, and introduces an
[8]. In a unique approach, [9] co mbines ITU-T X.690 Basic efficient mu lti-identity fully homo morphic encryption
Encoding Rule with Arithmetic Circuit Ho mo morphic (MIFHE) scheme using a masking approach, enabling
Encryption for secure computation of integer expressions, homomorphic evaluation of ciphertexts under different
delving into addition, subtraction, and multiplication across identities [24].
nodes, and providing insights into protocol design and
latency analysis. Addressing the panorama of fully The study critiques a symmetric Fu lly Ho mo morphic
homomorphic encryption schemes, [11] conducts a thorough Encryption (FHE) scheme based on Euler's theorem,
analysis and comparison, encompassing lattice-based, exposing a vulnerability allowing secret key recovery,
integer-based, ring learning with error, and elliptic curve proposes an improved scheme based on the approximate
cryptography-based schemes, discussing their properties, greatest common divisor (A GCD) problem, and assesses
security, efficiency, and potential improvements. various attacks, including those introduced in the paper [25].
Furthermore, [12] introduces a modification to Keyed
A distinctive aspect of this research study lies in its
Homo morphic-Public Key Encryption (KH-PKE) to enhance
commit ment to data security and privacy. Unlike existing
security in cloud-based machine learning scenarios, ensuring
studies, the methodology ensures that once uploaded, the raw
that only authorized users, specifically the client, can encrypt
data remains inaccessible even to the first party. This
and decrypt data.
emphasis on robust data protection constitutes a novel
Shifting focus to post-quantum security, [13] imp lements contribution, fortifying the integrity of this research and
Super singular Isogeny Diffie Hellman Key Exchange in setting a precedent for a more secure approach to data
data. It adds an additional security layer by making the RSA RSA and AES algorithms in a hybrid approach effectively
encryption process more resilient against various transformed the dataset into a secure, encrypted format. This
cryptographic attacks and vulnerabilities typically associated method was crucial in maintaining the confidentiality of
with simpler padding schemes. sensitive information during storage and transmission. In the
decryption phase, the employment of PKCS1_ OAEP
B. Data Decryption padding with RSA decryption proved efficient and secure in
retrieving the orig inal data structure. Maintaining the
The decryption phase is essential for ensuring that integrity of decrypted data is vital for trustworthy and
authorized entities can securely access and utilize the reliable secure data analysis.
sensitive informat ion. It involves reversing the encryption
steps to yield a dataset that mirrors the original data's A distinctive feature of this model is its focus on secure
structure and content. data import and in-lake analysis, eliminating the need for
data movement and sharing among different entities and
The process begins with the extraction of the RSA enhancing the overall security framework. Th is approach is
private key, created during the RSA key pair setup and saved particularly beneficial for scenarios requiring high data
for later use. The decrypted AES key and IV are obtained by privacy, reducing the risk of data breaches and unauthorized
decrypting the corresponding components of the encrypted access. The model's practical implications are notably
message using the RSA private key. An AES cipher is then evident in the context of multinational corporations (MNCs).
constructed using the decrypted AES key and IV. It offers a novel solution for handling proprietary
information, ensuring safety, accessibility, and secure
The AES decryption step decrypts the encrypted data
analysis fro m any location. This global applicability
using the AES cipher, followed by the removal of any
highlights the model's versatility and potential to
padding introduced during encryption. This ensures the
revolutionize data handling practices across various sectors.
accurate retrieval of the original data and maintains the
integrity of the data during retrieval. To conclude with, the results from this Ho mo morphic
Encryption model signify a substantial advancement in
In this study, PKCS1_OAEP padding is also used in RSA
harmonizing data utility with privacy. It reinforces the
decryption, enhancing the security of the decrypted data by
development of a conscientious and responsible data-driven
preventing various cryptographic attacks. This randomized
ecosystem where data security and privacy are integral to
padding mechanism further strengthens the RSA algorithm,
analytical capabilities. This balance is crucial in the current
making it more resistant to potential vulnerabilit ies and
era of extensive data utilization, underscoring the importance
ensuring a secure and reliable decryption process.
and impact of this study in the realm of secure data analysis.