Using Fully Homomorphic Encryption to Secure Cloud Computing

The concept of cloud computing receiving a great deal of attention both in publication and among users. Cloud computing is the delivery of computing services over the Internet. Cloud services allow individuals and businesses to use software and hardware resources that are managed by cloud providers at remote locations. The distance between the client and the physical location of his data creates a barrier because this data can be accessed by a third party and this would affect the privacy of client’s data. The using of traditional encryption schemes to encrypt the remoted data before sending to the cloud provider has been most widely used technique to bridge this security gab. But, the client will need to provide the private key to the server to decrypt the data before perform the calculations required. Homomorphic encryption allows to perform computations on encrypted data without decryption. This paper deals with the use of homomorphic encryption to encrypt the client’s data in cloud server and also it enables to execute required computations on this encrypted data.

[1]  Aderemi A. Atayero,et al.  Security Issues in Cloud Computing: The Potentials of Homomorphic Encryption , 2011 .

[2]  Craig Gentry,et al.  Fully homomorphic encryption using ideal lattices , 2009, STOC '09.

[3]  S. Hemalatha,et al.  Performance of Ring Based Fully Homomorphic Encryption for securing data in Cloud Computing , 2014 .

[4]  Cheng Xin-meng,et al.  A method of homomorphic encryption , 2008, Wuhan University Journal of Natural Sciences.

[5]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[6]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[7]  Silvio Micali,et al.  Probabilistic encryption & how to play mental poker keeping secret all partial information , 1982, STOC '82.

[8]  Yan Zhang,et al.  A secure image retrieval method based on homomorphic encryption for cloud computing , 2014, 2014 19th International Conference on Digital Signal Processing.

[9]  Jaydip Sen,et al.  Homomorphic Encryption — Theory and Application , 2013 .

[10]  Victor I. Chang,et al.  Secure searching on cloud storage enhanced by homomorphic indexing , 2016, Future Gener. Comput. Syst..

[11]  Jian Li,et al.  A simple fully homomorphic encryption scheme available in cloud computing , 2012, 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems.

[12]  Na Zhao,et al.  Fully homomorphic encryption application in cloud computing , 2014, 2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP).

[13]  Craig Gentry,et al.  Fully Homomorphic Encryption over the Integers , 2010, EUROCRYPT.

[14]  Dan Boneh,et al.  Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.

[15]  Vinod Vaikuntanathan,et al.  Can homomorphic encryption be practical? , 2011, CCSW '11.

[16]  Ronald L. Rivest,et al.  ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .

[17]  Craig Gentry,et al.  Computing arbitrary functions of encrypted data , 2010, CACM.

[18]  Tolga Soyata,et al.  Utilizing Homomorphic Encryption to Implement Secure and Private Medical Cloud Computing , 2015, 2015 IEEE 8th International Conference on Cloud Computing.

[19]  Said El Hajji,et al.  Secure Cloud Computing through Homomorphic Encryption , 2014, ArXiv.

[20]  Brian Hayes Alice and Bob in Cipherspace , 2012 .

[21]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[22]  Christoph Meinel,et al.  Processing Over Encrypted Data: Between Theory and Practice , 2016, SGMD.