Advancing cloud security: Unveiling the protective potential of homomorphic secret sharing in secure cloud computing

被引:0
|
作者
Ali, Sijjad [1 ]
Wadho, Shuaib Ahmed [2 ]
Yichiet, Aun [2 ]
Gan, Ming Lee [2 ]
Lee, Chen Kang [2 ]
机构
[1] Shenzhen Univ, Coll Comp Sci & Software Engn, Shenzhen, Peoples R China
[2] Univ Tunku Abdul Rahman, Fac Informat & Commun Technol, Kampar, Malaysia
关键词
Cloud computing; Security; Data protection; Homomorphic encryption; Undercover sharing techniques; FAULT-TOLERANCE; INFORMATION; ISSUES;
D O I
10.1016/j.eij.2024.100519
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing security and data protection are becoming increasingly critical as its use increases. The research we present demonstrates how undercover sharing techniques and homomorphic encryption can be combined to protect private information in cloud computing scenarios. We create a reliable, private, and confidential computation platform by utilizing this dual approach. Our strategy involves protecting data while dividing it among multiple servers. By using this distribution, the system is less likely to suffer from single points of failure and has a higher security level. To ensure information privacy and security, data encryption restricts access to authorized individuals only. As an additional feature, we employ homomorphic encryption to enable operations on encrypted data without direct access to the originals. By using this feature, sensitive data is protected from disclosure or misuse while being processed. Therefore, original data confidentiality can be preserved when computing on encrypted shares. Several performance tests were conducted to prove our strategy's practicality and effectiveness. Our considerations extended beyond encryption and decryption time and processing overhead. In our research, we demonstrate that our method strikes the right balance between security and computational efficiency.
引用
收藏
页数:15
相关论文
共 50 条
  • [31] Secure and Efficient Similarity Retrieval in Cloud Computing Based on Homomorphic Encryption
    Wang, Na
    Zhou, Wen
    Wang, Jingjing
    Guo, Yifan
    Fu, Junsong
    Liu, Jianwei
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 2454 - 2469
  • [32] A Secure Image Retrieval Method Based on Homomorphic Encryption for Cloud Computing
    Zhang, Yan
    Zhuo, Li
    Peng, Yuanfan
    Zhang, Jing
    2014 19TH INTERNATIONAL CONFERENCE ON DIGITAL SIGNAL PROCESSING (DSP), 2014, : 269 - 274
  • [33] Secure scheme on mobile multi cloud computing based on homomorphic encryption
    Zkik, Karim
    Orhanou, Ghizlane
    El Hajji, Said
    2016 INTERNATIONAL CONFERENCE ON ENGINEERING & MIS (ICEMIS), 2016,
  • [34] Advancing Cloud Computing
    Bojanova, Irena
    Dimitrov, Vladimir
    Corno, Fulvio
    IT PROFESSIONAL, 2014, 16 (06) : 16 - 17
  • [35] Cloud Computing Security in Multi-clouds using Shamir's Secret Sharing Scheme
    Pundkar, Sumedh N.
    Shekokar, Narendra
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 392 - 395
  • [36] Dynamic Secure Interconnection for Security Enhancement in Cloud Computing
    He, L.
    Huang, F.
    Zhang, J.
    Liu, B.
    Chen, C.
    Zhang, Z.
    Yang, Y.
    Lu, W.
    INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2016, 11 (03) : 348 - 357
  • [37] Review of Data Security Frameworks for Secure Cloud Computing
    Umrigar, Kunaal
    Mathew, Rejo
    PROCEEDING OF THE INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS, BIG DATA AND IOT (ICCBI-2018), 2020, 31 : 933 - 941
  • [38] Secure Map Reduce Data Transmission Mechanism in Cloud Computing Using Threshold Secret Sharing Scheme
    Lin, Hua Yi
    Yang, Che-Yu
    Hsieh, Meng-Yen
    SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING: THEORY AND PRACTICE, VOL 2, 2012, 115 : 761 - +
  • [39] Data Sharing Security and Privacy Preservation in Cloud Computing
    Prasad, Kadam
    Poonam, Jadhav
    Gauri, Khupase
    Thoutam, N. C.
    2015 INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT), 2015, : 1070 - 1075
  • [40] Cloud Computing: Cloud Security to Trusted Cloud
    Wu Jiyi
    Shen Qianli
    Zhang Jianlin
    Xie Qi
    NEW TRENDS AND APPLICATIONS OF COMPUTER-AIDED MATERIAL AND ENGINEERING, 2011, 186 : 596 - 600