Enhanced Homomorphic Encryption Scheme with Particle Swarm Optimization for Encryption of Cloud Data

Cloud Computing is the decentralized type of architecture which is vulnerable to various type of security attacks. Homomorphic encryption is the encryption scheme to encrypt objects which are used to access data from the cloud server. Homomorphic encryption scheme has major disadvantage of key management and key sharing which reduce its efficiency. Particle swarm optimization algorithms (PSO) are nature-inspired meta-heuristic algorithms that are population dependent known for social behavior of birds and fishes. These concepts are used as an inspiration to build scientific approach for complex problem solving. Depending upon the quality of measure, the solutions are enhanced by the algorithms initiating from a randomly distributed set of particles. By moving the particles around the search space using a set of mathematical expressions, the improvisations are achieved. In this research work, technique of PSO is applied which generate key for the encryption. PSO in is the optimization algorithm used to generate fixed number key for the encryption. PSO based homomorphic algorithm is implemented in MATLAB and simulation results shows that it performs well in terms of execution time, resource utilization. The execution time and resource utilization of PSO based homomorphic algorithm is less as compared to homomorphic algorithm. The result is optimized upto 10% approx in the improved algorithm as compared to existing algorithm.

[1]  Bhupendra Verma,et al.  An efficient proactive artificial immune system based anomaly detection and prevention system , 2016, Expert Syst. Appl..

[2]  Bhupendra Verma,et al.  Immunity inspired cooperative agent based security system , 2018, Int. Arab J. Inf. Technol..

[3]  Rutvij H. Jhaveri,et al.  Survey of Various Homomorphic Encryption algorithms and Schemes , 2014 .

[4]  Said El Hajji,et al.  Secure Cloud Computing through Homomorphic Encryption , 2014, ArXiv.

[5]  Bhupendra Verma,et al.  An Immunity Inspired Anomaly Detection System: A General Framework , 2012, BIC-TA.

[6]  Bhupendra Verma,et al.  Biologically Inspired Computer Security System: The Way Ahead , 2012, SNDS.

[7]  Yulin Wang,et al.  Homomorphic cloud computing scheme based on hybrid homomorphic encryption , 2017, 2017 3rd IEEE International Conference on Computer and Communications (ICCC).

[8]  Vinod Vaikuntanathan,et al.  Can homomorphic encryption be practical? , 2011, CCSW '11.

[9]  Alexander Oppermann,et al.  Secure Cloud Computing: Communication Protocol for Multithreaded Fully Homomorphic Encryption for Remote Data Processing , 2017, 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC).

[10]  Yong Ding,et al.  Policy Based on Homomorphic Encryption and Retrieval Scheme in Cloud Computing , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).

[11]  Debasis Das,et al.  Secure cloud computing algorithm using homomorphic encryption and multi-party computation , 2018, 2018 International Conference on Information Networking (ICOIN).

[12]  R. Kangavalli,et al.  A mixed homomorphic encryption scheme for secure data storage in cloud , 2015, 2015 IEEE International Advance Computing Conference (IACC).