Cloud based service provider are at its top of its services for various applications, as their services are very much reachable from anywhere anytime in current days. It is responsibility of the company that the Cloud storage is owned and maintained by themselves keeping the data available and accessible, and the physical environment protected and running. Could storage provider seem to be uncertain of confidentiality in many cases, as we need to limit ourselves on trust to a third party. Keeping our sensitive data ready to access any time anywhere with preventing any information leakage is a challenging task. Cryptography in this scenario plays an important role, providing security for information to protect valuable information resources on intranets, Internet and the cloud. In addition, Homomorphic cryptosystem is a form of Cryptography where some specific computation can be performed over the cipher text producing a resultant cipher text which, when decrypted, equals the result of operations carry out on the plaintext. With help of this unique property of homomorphism cryptography we proposed a system to keep sensitive information in encrypted form in the cloud storage/service provider and used those data as whenever we require. The scheme proposed here is designed for a secure online voting system on Android platform and voted information is encrypted and stored those in the cloud.
[1]
Craig Gentry,et al.
A fully homomorphic encryption scheme
,
2009
.
[2]
Shiguo Lian,et al.
Multimedia Content Encryption: Techniques and Applications
,
2008
.
[3]
M.I. Aziz,et al.
Introduction to Cryptography
,
2002,
2005 International Conference on Microelectronics.
[4]
Silvio Micali,et al.
Why and how to establish a private code on a public network
,
1982,
23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[5]
Doerte K. Rappe.
Homomorphic cryptosystems and their applications
,
2005,
IACR Cryptol. ePrint Arch..
[6]
Ronald L. Rivest,et al.
ON DATA BANKS AND PRIVACY HOMOMORPHISMS
,
1978
.
[7]
Said El Hajji,et al.
Homomorphic Encryption Applied to the Cloud Computing Security
,
2012
.
[8]
Pascal Paillier,et al.
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
,
1999,
EUROCRYPT.
[9]
Dan Boneh,et al.
Evaluating 2-DNF Formulas on Ciphertexts
,
2005,
TCC.
[10]
Javier Herranz,et al.
Additively Homomorphic Encryption with d-Operand Multiplications
,
2010,
IACR Cryptol. ePrint Arch..