Shifted Adaption Homomorphism Encryption for Mobile and Cloud Learning

Abstract Mobile learning when stored in a cloud server allows contents to be gathered and accessed using mobile devices connected with the cloud. The present problems of limited computing capacity and small space for storage in mobile phones has inspired the blend of mobile learning and cloud computing. This paper primarily focuses on Homomorphic Encryption to achieve privacy over encoded data or search the encrypted information, which is the current research area of majority of the knowledge experts. In this paper, we suggest Shifted Adaption Homomorphism Encryption (SAHE), which is regarded as the better option for all the current research going on. SAHE implements the smallest public key of 32 bit and is able to encrypt integer and real numbers. A major issue in this field of research is difficulty in protecting user's questions, which is addressed by conceiving a public key encryption technique which is based on the reversed index. Our schema preserves search efficiency using inverted index, by solving one time only search drawback encountered in earlier research works. This method is appropriate for mobile learning since the suggested algorithm will not use the mobile memory or power.

[1]  Chris Peikert,et al.  On Ideal Lattices and Learning with Errors over Rings , 2010, EUROCRYPT.

[2]  Vinod Vaikuntanathan,et al.  Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages , 2011, CRYPTO.

[3]  Ron Steinfeld,et al.  Faster Fully Homomorphic Encryption , 2010, ASIACRYPT.

[4]  Tolga Soyata,et al.  Medical Data Analytics in the Cloud Using Homomorphic Encryption , 2016 .

[5]  Craig Gentry,et al.  Homomorphic Evaluation of the AES Circuit , 2012, IACR Cryptol. ePrint Arch..

[6]  Craig Gentry,et al.  Computing arbitrary functions of encrypted data , 2010, CACM.

[7]  Dan Boneh,et al.  Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.

[8]  Shadi Aljawarneh,et al.  A resource-efficient encryption algorithm for multimedia big data , 2017, Multimedia Tools and Applications.

[9]  Craig Gentry,et al.  A fully homomorphic encryption scheme , 2009 .

[10]  Vinod Vaikuntanathan,et al.  Efficient Fully Homomorphic Encryption from (Standard) LWE , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.

[11]  Sheng Zhong,et al.  Privacy-Preserving Backpropagation Neural Network Learning , 2009, IEEE Transactions on Neural Networks.

[12]  Shadi Aljawarneh,et al.  Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model , 2017, J. Comput. Sci..

[13]  Craig Gentry,et al.  Fully Homomorphic Encryption without Bootstrapping , 2011, IACR Cryptol. ePrint Arch..

[14]  Craig Gentry,et al.  Fully Homomorphic Encryption with Polylog Overhead , 2012, EUROCRYPT.

[15]  Craig A. Knoblock,et al.  Retrieving and Integrating Data from Multiple Information Sources , 1993, Int. J. Cooperative Inf. Syst..

[16]  Craig Gentry,et al.  Fully homomorphic encryption using ideal lattices , 2009, STOC '09.