Homomorphic Encryption Algorithm used in Multi-Format Data in Collaborated Healthcare Multi cloud Computing

Authors

  • Mekala Bhaskar  Department of Computer Science and Engineering, Malla Reddy Institute of Engineering & Technology, JNTUH, India
  • Dr. M. Ashok  Department of Computer Science and Engineering, Malla Reddy Institute of Engineering & Technology, JNTUH, India
  • Dr. M. D. A. Hasan  Department of Computer Science and Engineering, Malla Reddy Institute of Engineering & Technology, JNTUH, India

Keywords:

Data security; Cloud computing; Fully Homomorphic encryption; AWS; DynamoDB; public cloud EHR; cloud computing; healthcare; security; privacy, Cloud computing, architecture, challenges, cloud platforms, research issues, Telehealthcare; cloud computing infrastructure; security in healthcare, access control, cloud computing, cloud computing security, data segregation, data security, privacy protection.

Abstract

Now a day's health care data is growing vastly in the world, this health care data has to be stored and managed in proper format by the health care centers. Most of the work has been done in the area of cloud computing and still more work has to be done. But the main issue in multi cloud computing is providing security to the data. My research proposal is more concentrating on security issues and implementation aspects of security problems for multi-format data in healthcare multi cloud computing. The various security issues related to data security, privacy, confidentiality, integrity and authentication needs to be addressed. Most of the health care data cloud service provider stores the data in heterogeneous text format and user need to use their own encryption algorithm to secure their data if required. The data needs to be decrypted whenever it is to be processed. This paper focuses on storing data on the cloud in the encrypted format using fully homomorphic encryption. The data is stored in DynamoDB of Amazon Web Service (AWS) public cloud. User’s computation is performed on encrypted data in public cloud. When results are required they can be downloaded on client machine. In this scenario users data is never stored in heterogeneous text on public cloud.

References

  1. Tebaa, M.; El Hajji, S.; El Ghazi, A., "Homomorphic encryption method applied to Cloud Computing," in Network Security and Systems (JNS2), 2012 National Days of , vol., no., pp.86-89, 20-21 April 2012
  2. Mather, Tim, Subra Kumaraswamy, and Shahed Latif. Cloud security and privacy: an enterprise perspective on risks and compliance. " O'Reilly Media, Inc.", 2009
  3. Samyak Shah, Yash Shah, Janika Kotak, "Somewhat Homomorphic Encryption Technique with its Key Management Protocol”, Dec 14 Volume 2 Issue 12 , International Journal on Recent and Innovation Trends in Computing and Communication (IJRITCC), ISSN: 2321-8169, PP: 4180 - 4183
  4. Ramaiah, Y. Govinda, and G. Vijaya Kumari. "Efficient public key homomorphic encryption over integer plaintexts." Information Security and Intelligence Control (ISIC), 2012 International Conference on. IEEE, 2012.
  5. Gentry, Craig. "Computing arbitrary functions of encrypted data." Communications of the ACM 53.3 (2010): 97-105.
  6. Atayero, Aderemi A., and Oluwaseyi Feyisetan. "Security issues in cloud computing: The potentials of homomorphic encryption." Journal of Emerging Trends in Computing and Information Sciences 2.10 (2011): 546-552.
  7. Catteddu, Daniele, and Giles Hogben. "Cloud computing." Benefits, Risks and Recommendations for Information Security/European Network and Information Security Agency, ENISA (November 2009) (2009).
  8. Deyan Chen; Hong Zhao, "Data Security and Privacy Protection Issues in Cloud Computing," in Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on , vol.1, no., pp.647-651, 23-25 March 2012
  9. Pearson, Siani. "Taking account of privacy when designing cloud computing services." Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing. IEEE Computer Society, 2009.
  10. Rivest, Ronald L., Len Adleman, and Michael L. Dertouzos. "On data banks and privacy homomorphisms." Foundations of secure computation 4.11 (1978): 169-180.
  11. Rivest, Ronald L., Adi Shamir, and Len Adleman. "A method for obtaining digital signatures and public-key cryptosystems." Communications of the ACM 21.2 (1978): 120-126.
  12. A. C. Yao. Protocols for secure computations (extended abstract). In 23rd Annual Symposium on Foundations of Computer Science (FOCS '82), pages 160-164. IEEE, 1982.
  13. Goldwasser, Shafi, and Silvio Micali. "Probabilistic encryption." Journal of computer and system sciences 28.2 (1984): 270-299.
  14. ElGamal, Taher. "A public key cryptosystem and a signature scheme based on discrete logarithms." Advances in cryptology. Springer Berlin Heidelberg, 1985..
  15. Paillier, Pascal. "Public-key cryptosystems based on composite degree residuosity classes." Advances in cryptology—EUROCRYPT’99. Springer Berlin Heidelberg, 1999..
  16. Fontaine, Caroline, and Fabien Galand. "A survey of homomorphic encryption for nonspecialists." EURASIP Journal on Information Security 2007 (2007): 15.
  17. Gentry, Craig. "Fully homomorphic encryption using ideal lattices." STOC. Vol. 9. 2009.
  18. Smart, Nigel P., and Frederik Vercauteren. "Fully homomorphic encryption with relatively small key and ciphertext sizes." Public Key Cryptography–PKC 2010. Springer Berlin Heidelberg, 2010. 420-443.
  19. Van Dijk, Marten, et al. "Fully homomorphic encryption over the integers." Advances in cryptology–EUROCRYPT 2010. Springer Berlin Heidelberg, 2010. 24-43.
  20. Stehlé, Damien, and Ron Steinfeld. "Faster fully homomorphic encryption." Advances in Cryptology-ASIACRYPT 2010. Springer Berlin Heidelberg, 2010. 377-394.

Downloads

Published

2017-12-31

Issue

Section

Research Articles

How to Cite

[1]
Mekala Bhaskar, Dr. M. Ashok, Dr. M. D. A. Hasan, " Homomorphic Encryption Algorithm used in Multi-Format Data in Collaborated Healthcare Multi cloud Computing, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 6, pp.80-84, November-December-2017.