A Review of Encryption Techniques Used in Cloud Computing

Authors

  • Parth Tandel  Mukesh Patel School of Technology Management and Engineering, Shirpur, Maharashtra, India
  • Abhinav Shubhrant  Mukesh Patel School of Technology Management and Engineering, Shirpur, Maharashtra, India
  • Mayank Sohani  Mukesh Patel School of Technology Management and Engineering, Shirpur, Maharashtra, India

DOI:

https://doi.org/10.32628/CSEIT217250

Keywords:

Cloud Computing, Encryption, Homomorphic Encryption, Fully Homomorphic Encryption, Parallel Computing, Parallel Processing, Partitioning.

Abstract

We can say that we are surrounded by the computing world from every nook and corner. Cloud Computing is deemed as the most fundamentally changing phenomenon happening in Information Technology. But with great perks, comes great challenges as well, especially in the field of data security and privacy protection. The Cloud Service Providers take over chunks of private data from users for providing better functionalities. But for the sake of privacy and protection, this sensitive data should be encrypted and then outsourced to the cloud consoles. Since traditional cloud computing is performed on plaintext, many encryption algorithms were applied in the cloud for security purposes and ‘encrypted’ data was stored in the cloud from then on. This change gives fruition to a new type of encryption technique called Homomorphic Encryption. Primarily, the paper will focus on a subtype of Homomorphic Encryption called Fully Homomorphic Encryption. The objective of the paper is to propose a method to convert the sequentially processing Fully Homomorphic Encryption into parallel processing Fully Homomorphic Encryption using a Parallel Computing concept called Partitioning and thereby producing a better performing Fully Homomorphic Encryption.

References

  1. G. S. Vennela, N. V. Varun, N. Neelima, L. S. Priya and J. Yeswanth, "Performance Analysis of Cryptographic Algorithms for Cloud Security," 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT), Coimbatore, 2018, pp. 273-279, doi: 10.1109/ICICCT.2018.8473148.
  2. A. Hendre and K. P. Joshi, "A Semantic Approach to Cloud Security and Compliance," 2015 IEEE 8thInternational Conference on Cloud Computing, New York, NY, 2015, pp. 1081-1084, doi:10.1109/CLOUD.2015.157.
  3. Z. H. Mahmood and M. K. Ibrahem, "New Fully Homomorphic Encryption Scheme Based on Multistage Partial Homomorphic Encryption Applied in Cloud Computing," 2018 1st Annual International 8 Conference on Information and Sciences (AiCIS), Fallujah, Iraq, 2018, pp. 182-186, doi: 10.1109/AiCIS.2018.00043.
  4. P. Sha and Z. Zhu, "The modification of RSA algorithm to adapt fully homomorphic encryption algorithm in cloud computing," 2016 4th International Conference on Cloud Computing and Intelligence Systems (CCIS), Beijing, 2016, pp. 388-392, doi: 10.1109/CCIS.2016.7790289.
  5. R. S. Patil and P. Biradar, "Secure Parallel Processing on Encrypted Cloud Data Using Fully Homomorphic Encryption," 2018 4th International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT), Mangalore, India, 2018, pp. 242-247, doi: 10.1109/iCATccT44854.2018.9001284.
  6. X. Song and Y. Wang, "Homomorphic cloud computing scheme based on hybrid homomorphic encryption," 2017 3rd IEEE International Conference on Computer and Communications (ICCC), Chengdu, 2017, pp. 2450-2453, doi: 10.1109/CompComm.2017.8322975.
  7. Nazeh Abdul Wahid MD, Ali A, Esparham B, Marwan MD (2018) A Comparison of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish for Guessing Attacks Prevention. J Comp Sci Appl Inform Technol. 3(2): 1-7. DOI: 10.15226/2474-9257/3/2/00132.
  8. Akashdeep Bhardwaj, G.V.B. Subrahmanyam, Vinay Avasthi, Hanumat Sastry, Security Algorithms for Cloud Computing, Procedia Computer Science, Volume 85, 2016, Pages 535-542, ISSN 1877-0509, https://doi.org/10.1016/j.procs.2016.05.215.
  9. Alrubaee, Saif. (2019). Security Algorithms in Cloud Computing- Review Paper. 10.13140/RG.2.2.27320.19200.
  10. Kartit, Zaid & Azougaghe, Ali & Idrissi, H. & El marraki, Mohamed & Mustapha, Hedabou & Belkasmi, Mostafa & Ali, Kartit. (2016). Applying Encryption Algorithm for Data Security in Cloud Storage. 10.1007/978-981-287-990-5_12.
  11. Nasarul Islam.K.V et al, International Journal of Computer Science and Mobile Computing, Vol.6 Issue.7, July- 2017, pg. 90-97, ISSN 2320–088X
  12. Praveen S. Challagidad, Mahantesh N. Birje, Efficient Multi-authority Access Control using Attribute-based Encryption in Cloud Storage, Procedia Computer Science, Volume 167, 2020, Pages 840-849, ISSN 1877-0509, https://doi.org/10.1016/j.procs.2020.03.423.
  13. K. K. Chennam, L. Muddana and R. K. Aluvalu, "Performance analysis of various encryption algorithms for usage in multistage encryption for securing data in cloud," 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), Bangalore, 2017, pp. 2030-2033, doi: 10.1109/RTEICT.2017.8256955.
  14. V. S. Mahalle and A. K. Shahade, "Enhancing the data security in Cloud by implementing hybrid (Rsa & Aes) encryption algorithm," 2014 International Conference on Power, Automation and Communication (INPAC), Amravati, 2014, pp. 146-149, doi: 10.1109/INPAC.2014.6981152.
  15. P. Rewagad and Y. Pawar, "Use of Digital Signature with Diffie Hellman Key Exchange and AES Encryption Algorithm to Enhance Data Security in Cloud Computing," 2013 International Conference on Communication Systems and Network Technologies, Gwalior, 2013, pp. 437-439, doi: 10.1109/CSNT.2013.97.
  16. Pansotra, Er & Singh, Simar Preet. (2015). Cloud Security Algorithms. International Journal of Security and Its Applications. 9. 353-360. 10.14257/ijsia.2015.9.10.32.
  17. D. K. Shukla, V. K. R. Dwivedi and M. C. Trivedi, Encryption algorithm in cloud computing, Materials Today: Proceedings, https:// doi.org/10.1016/j.matpr.2020.07.452
  18. Min Zhao E, Yang Geng, Homomorphic Encryption Technology for Cloud Computing, Procedia Computer Science, Volume 154, 2019, Pages 73-83, ISSN 1877-0509, https://doi.org/10.1016/j.procs.2019.06.012.
  19. P.P., Kumar, P.S., Alphonse, P.J.A., Attribute based encryption in cloud computing: A survey, gap analysis, and future directions, Journal of Network and Computer Applications (2018), doi: 10.1016/j.jnca.2018.02.009.
  20. PanJun Sun, “Security and privacy protection in cloud computing: Discussions and challenges,” Journal of Network and Computer Applications (2020), doi: https://doi.org/10.1016/j.jnca.2020.102642

Downloads

Published

2021-04-30

Issue

Section

Research Articles

How to Cite

[1]
Parth Tandel, Abhinav Shubhrant, Mayank Sohani, " A Review of Encryption Techniques Used in Cloud Computing" International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 7, Issue 2, pp.231-243, March-April-2021. Available at doi : https://doi.org/10.32628/CSEIT217250