Modified Fully Homomorphic Encryption based on Parallel Processing in Cloud Computing

Authors

  • Parth Tandel  Mukesh Patel School of Technology Management and Engineering, Shirpur, Maharashtra, India
  • Abhinav Shubhrant  Mukesh Patel School of Technology Management and Engineering, Shirpur, Maharashtra, India
  • Mayank Sohani  Mukesh Patel School of Technology Management and Engineering, Shirpur, Maharashtra, India

DOI:

https://doi.org/10.32628/CSEIT217252

Keywords:

Cloud Computing, Encryption, Homomorphic Encryption, Fully Homomorphic Encryption, Parallel Computing, Parallel Processing, Partitioning.

Abstract

Cloud Computing is widely regarded as the most radically altering trend in information technology. However, great benefits come with great challenges, especially in the area of data security and privacy protection. Since standard cloud computing uses plaintext, certain encryption algorithms were implemented in the cloud for security reasons, and ‘encrypted' data was then stored in the cloud. Homomorphic Encryption (HE), a modern kind of encryption strategy, is born as a result of this change. Primarily, the paper will focus on implementing a successful Homomorphic Encryption (HE) scheme for polynomials. Furthermore, the objective of the paper is to propose, produce and implement a method to convert the already implemented sequentially processing Homomorphic Encryption into parallel processing Homomorphic Encryption (HE) using a Parallel Processing concept (Partitioning, Assigning, Scheduling, etc) and thereby producing a better performing Homomorphic Encryption (HE) called Fully Homomorphic Encryption (FHE). Fully Homomorphic Encryption (FHE) is an encryption technique that can perform specific analytical operations, functions and methods on normal or encrypted data and can still perform traditional encryption results as performed on plaintext. The three major reasons for implementing Fully Homomorphic Encryption (FHE) are advantages like no involvement of third parties, trade-off elimination between privacy and security and quantum safety.

References

  1. G. S. Vennela, N. V. Varun, N. Neelima, L. S. Priya and J. Yeswanth, "Performance Analysis of Cryptographic Algorithms for Cloud Security," 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT), Coimbatore, 2018, pp. 273-279, doi: 10.1109/ICICCT.2018.8473148.
  2. A. Hendre and K. P. Joshi, "A Semantic Approach to Cloud Security and Compliance," 2015 IEEE 8thInternational Conference on Cloud Computing, New York, NY, 2015, pp. 1081-1084, doi:10.1109/CLOUD.2015.157.
  3. Z. H. Mahmood and M. K. Ibrahem, "New Fully Homomorphic Encryption Scheme Based on Multistage Partial Homomorphic Encryption Applied in Cloud Computing," 2018 1st Annual International 8 Conference on Information and Sciences (AiCIS), Fallujah, Iraq, 2018, pp. 182-186, doi: 10.1109/AiCIS.2018.00043.
  4. P. Sha and Z. Zhu, "The modification of RSA algorithm to adapt fully homomorphic encryption algorithm in cloud computing," 2016 4th International Conference on Cloud Computing and Intelligence Systems (CCIS), Beijing, 2016, pp. 388-392, doi: 10.1109/CCIS.2016.7790289.
  5. R. S. Patil and P. Biradar, "Secure Parallel Processing on Encrypted Cloud Data Using Fully Homomorphic Encryption," 2018 4th International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT), Mangalore, India, 2018, pp. 242-247, doi: 10.1109/iCATccT44854.2018.9001284.
  6. Chen, GL., Sun, GZ., Zhang, YQ. et al. Study on Parallel Computing. J Comput Sci Technol 21, 665–673 (2006). https://doi.org/10.1007/s11390-006-0665-9.
  7. Hsu, Ching-Hsien & Salapura, Valentina. (2014). Network and Parallel Computing. International Journal of Parallel Programming. 44. 10.1007/s10766-014-0345-2.
  8. Navarro, Cristobal & Hitschfeld, Nancy & Mateu, Luis. (2013). A Survey on Parallel Computing and its Applications in Data-Parallel Problems Using GPU Architectures. Communications in Computational Physics. 15. 285-329. 10.4208/cicp.110113.010813a.
  9. Yang Liu, Wanneng Shu and Chrish Zhang. (2016). A Parallel Task Scheduling Optimization Algorithm Based on Clonal Operator in Green Cloud Computing. Journal of Communications Vol. 11, 2016. ISSN: 2315-4462.
  10. Abdel-Karim Al Tamimi, “Performance Analysis of Data Encryption Algorithms” https://www.cse.wustl.edu/~jain/cse567-06/ftp/encryption_perf
  11. D. R. Bharadwaj, A. Bhattacharya and M. Chakkaravarthy, "Cloud Threat Defense – A Threat Protectionand Security Compliance Solution," 2018 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM), Bangalore, India, 2018, pp. 95-99, doi: 10.1109/CCEM.2018.00024.
  12. V. K. Soman and V. Natarajan, "An enhanced hybrid data security algorithm for cloud," 2017 International Conference on Networks & Advances in Computational Technologies (NetACT), Thiruvanthapuram, 2017, pp. 416-419, doi: 10.1109/NETACT.2017.8076807.
  13. Nasarul Islam.K.V, Mohamed Riyas.K.V, “Analysis of Various Encryption Algorithms in Cloud Computing,” International Journal of Computer Science and Mobile Computing, Vol.6 Issue.7, July- 2017, pg. 90-97
  14. Kartit, Zaid & Azougaghe, Ali & Idrissi, H. & El marraki, Mohamed & Mustapha, Hedabou & Belkasmi, Mostafa & Ali, Kartit. (2016). Applying Encryption Algorithm for Data Security in Cloud Storage. 10.1007/978-981-287-990-5_12.
  15. Alrubaee, Saif. (2019). Security Algorithms in Cloud Computing- Review Paper. 10.13140/RG.2.2.27320.19200.
  16. R. Nivedhaa and J. J. Justus, "A Secure Erasure Cloud Storage System Using Advanced Encryption Standard Algorithm and Proxy Re-Encryption," 2018 International Conference on Communication and Signal Processing (ICCSP), Chennai, 2018, pp. 0755-0759, doi: 10.1109/ICCSP.2018.8524257.
  17. K. K. Chennam, L. Muddana and R. K. Aluvalu, "Performance analysis of various encryption algorithms for usage in multistage encryption for securing data in cloud," 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), Bangalore, 2017, pp. 2030-2033, doi: 10.1109/RTEICT.2017.8256955.
  18. V. S. Mahalle and A. K. Shahade, "Enhancing the data security in Cloud by implementing hybrid (Rsa & Aes) encryption algorithm," 2014 International Conference on Power, Automation and Communication (INPAC), Amravati, 2014, pp. 146-149, doi: 10.1109/INPAC.2014.6981152.
  19. P. Rewagad and Y. Pawar, "Use of Digital Signature with Diffie Hellman Key Exchange and AES Encryption Algorithm to Enhance Data Security in Cloud Computing," 2013 International Conference on Communication Systems and Network Technologies, Gwalior, 2013, pp. 437-439, doi: 10.1109/CSNT.2013.97.
  20. X. Song and Y. Wang, "Homomorphic cloud computing scheme based on hybrid homomorphic encryption," 2017 3rd IEEE International Conference on Computer and Communications (ICCC), Chengdu, 2017, pp. 2450-2453, doi: 10.1109/CompComm.2017.8322975.
  21. M. B. Yassein, S. Aljawarneh, E. Qawasmeh, W. Mardini and Y. Khamayseh, "Comprehensive study of symmetric key and asymmetric key encryption algorithms," 2017 International Conference on Engineering and Technology (ICET), Antalya, 2017, pp. 1-7, doi: 10.1109/ICEngTechnol.2017.8308215.
  22. P. Varalakshmi and H. Deventhiran, "Integrity checking for cloud environment using encryption algorithm," 2012 International Conference on Recent Trends in Information Technology, Chennai, Tamil Nadu, 2012, pp. 228-232, doi: 10.1109/ICRTIT.2012.6206833.
  23. A. Azougaghe, Z. Kartit, M. Hedabou, M. Belkasmi and M. El Marraki, "An efficient algorithm for data security in Cloud storage," 2015 15th International Conference on Intelligent Systems Design and Applications (ISDA), Marrakech, 2015, pp. 421-427, doi: 10.1109/ISDA.2015.7489267.

Downloads

Published

2021-04-30

Issue

Section

Research Articles

How to Cite

[1]
Parth Tandel, Abhinav Shubhrant, Mayank Sohani, " Modified Fully Homomorphic Encryption based on Parallel Processing in Cloud Computing" International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 7, Issue 2, pp.250-262, March-April-2021. Available at doi : https://doi.org/10.32628/CSEIT217252