Advancing cloud security: Unveiling the protective potential of homomorphic secret sharing in secure cloud computing

被引:0
|
作者
Ali, Sijjad [1 ]
Wadho, Shuaib Ahmed [2 ]
Yichiet, Aun [2 ]
Gan, Ming Lee [2 ]
Lee, Chen Kang [2 ]
机构
[1] Shenzhen Univ, Coll Comp Sci & Software Engn, Shenzhen, Peoples R China
[2] Univ Tunku Abdul Rahman, Fac Informat & Commun Technol, Kampar, Malaysia
关键词
Cloud computing; Security; Data protection; Homomorphic encryption; Undercover sharing techniques; FAULT-TOLERANCE; INFORMATION; ISSUES;
D O I
10.1016/j.eij.2024.100519
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing security and data protection are becoming increasingly critical as its use increases. The research we present demonstrates how undercover sharing techniques and homomorphic encryption can be combined to protect private information in cloud computing scenarios. We create a reliable, private, and confidential computation platform by utilizing this dual approach. Our strategy involves protecting data while dividing it among multiple servers. By using this distribution, the system is less likely to suffer from single points of failure and has a higher security level. To ensure information privacy and security, data encryption restricts access to authorized individuals only. As an additional feature, we employ homomorphic encryption to enable operations on encrypted data without direct access to the originals. By using this feature, sensitive data is protected from disclosure or misuse while being processed. Therefore, original data confidentiality can be preserved when computing on encrypted shares. Several performance tests were conducted to prove our strategy's practicality and effectiveness. Our considerations extended beyond encryption and decryption time and processing overhead. In our research, we demonstrate that our method strikes the right balance between security and computational efficiency.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] Secure Secret Sharing in the Cloud
    Chang, Ching-Chun
    Li, Chang-Tsun
    2017 IEEE INTERNATIONAL SYMPOSIUM ON MULTIMEDIA (ISM), 2017, : 358 - 361
  • [2] Secure cloud computing using homomorphic construction
    Swathi V.
    Vani M.P.
    International Journal of Cloud Computing, 2019, 8 (04): : 354 - 370
  • [3] Security Enhancement in Cloud Environment using Secure Secret Key Sharing
    Chhabra, Sakshi
    Singh, Ashutosh Kumar
    JOURNAL OF COMMUNICATIONS SOFTWARE AND SYSTEMS, 2020, 16 (04) : 296 - 307
  • [4] Protecting Data Privacy and Security for Cloud Computing Based on Secret Sharing
    Yang, Ching-Nung
    Lai, Jia-Bin
    2013 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2013, : 259 - 266
  • [5] Homomorphic Encryption for Data Security in Cloud Computing
    Chauhan, Kamal Kumar
    Sanger, Amit K. S.
    Verma, Ajai
    2015 14TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY (ICIT 2015), 2015, : 206 - 209
  • [6] Secure Sharing of Data in Cloud Computing
    Tiwari, Deepnarayan
    Gangadharan, G. R.
    SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 24 - 35
  • [7] Secure sharing with cryptography in cloud computing
    Chachapara, Kajal
    Bhadlawala, Sunny
    2013 4TH NIRMA UNIVERSITY INTERNATIONAL CONFERENCE ON ENGINEERING (NUICONE 2013), 2013,
  • [8] On the Security of Secure Keyword Search and Data Sharing Mechanism for Cloud Computing
    Li, Cong
    Feng, Xinyu
    Shen, Qingni
    Wu, Zhonghai
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 4306 - 4308
  • [9] Secure and Effective Key Management Using Secret Sharing Schemes in Cloud Computing
    Fatima, Shahin
    Ahmad, Shish
    INTERNATIONAL JOURNAL OF E-COLLABORATION, 2020, 16 (01) : 1 - 15
  • [10] A Secure Mutual Authentication Protocol for Cloud Computing using Secret Sharing and Steganography
    Sarvabhatla, Mrudula
    Giri, M.
    Vorugunti, Chandra Sekhar
    2014 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING IN EMERGING MARKETS (CCEM), 2014, : 9 - 16