An improved Fully Homomorphic Encryption model based on N-Primes

Cloud computing is the provision of computing services over the internet, which provides unlimited computing capabilities to its users. Cloud Service Providers (CSP) in the distanced places helps the users such as businesses and individuals to use its software and hardware means.  The physical distance between the users and providers allows third parties to be capable of accessing the data which threats the privacy of the users. Thus, its security is the main concern when it comes to transform data from a locally owned storage to cloud storage. Cloud providers are required to save an encrypted version of user’s data on their storage. The traditional encryption schemes have been used for data encryption prior to sending them to the provider. Thought, the secret key has to be provided by the users to the server so as to decrypt the information prior to the requirement of calculations. Therefore, the traditional cryptographic schemes cannot be used to process cloud’s data. After the encryption of the information data are revealed to calculation in clouds, so confidentiality is not guaranteed and this result in difficulty in using cloud. In Homomorphic Encryptions calculation on ciphertext can be performed with no need for decryption.  This paper, develops and designs a new mathematical model to achieve the characteristics of the Fully Homomorphic Encryption. The proposed model’s security depends on the problem of Factorization the integers to their primary numbers. In this paper, instead of dealing with two prime numbers it is expanded to deal with n prime numbers. The security of the presumptive algorithm to be more efficient in front of the security challenges facing cloud computing. What distinguishes this proposed system is that it deals with the explicit text after converting it to the ASCII code instead of converting it to the binary system as it is in the existing systems, thus providing speed in the encryption process and returns the encryption.

[1]  Craig Gentry,et al.  Fully homomorphic encryption using ideal lattices , 2009, STOC '09.

[2]  N. B. Anuar,et al.  The rise of "big data" on cloud computing: Review and open research issues , 2015, Inf. Syst..

[3]  I-Ling Yen,et al.  An Efficient Homomorphic Encryption Protocol for Multi-User Systems , 2012, IACR Cryptol. ePrint Arch..

[4]  ContiMauro,et al.  A Survey on Homomorphic Encryption Schemes , 2018 .

[5]  Andrew Chi-Chih Yao,et al.  Protocols for Secure Computations (Extended Abstract) , 1982, FOCS.

[6]  Dan Boneh,et al.  Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.

[7]  Silvio Micali,et al.  Probabilistic Encryption , 1984, J. Comput. Syst. Sci..

[8]  Kunpeng Wang,et al.  Efficient Leveled (Multi) Identity-Based Fully Homomorphic Encryption Schemes , 2019, IEEE Access.

[9]  Frederik Vercauteren,et al.  Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes , 2010, Public Key Cryptography.

[10]  Said El Hajji,et al.  Secure Cloud Computing through Homomorphic Encryption , 2014, ArXiv.

[11]  Ronald L. Rivest,et al.  ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .

[12]  Chia-Chu Chiang,et al.  Parallelizing fully homomorphic encryption for a cloud environment , 2015 .

[13]  D. Vasumathi,et al.  Homomorphic Encryption Techniques for securing Data in Cloud Computing: A Survey , 2017 .

[14]  Jeremy M. Kaplan,et al.  Cloud-Trust—a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds , 2017, IEEE Transactions on Cloud Computing.

[15]  Joseph H. Silverman,et al.  NTRU: A Ring-Based Public Key Cryptosystem , 1998, ANTS.

[16]  Craig Gentry,et al.  Fully Homomorphic Encryption over the Integers , 2010, EUROCRYPT.

[17]  Jian Li,et al.  A simple fully homomorphic encryption scheme available in cloud computing , 2012, 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems.

[18]  Craig Gentry,et al.  Computing arbitrary functions of encrypted data , 2010, CACM.