Advancing cloud security: Unveiling the protective potential of homomorphic secret sharing in secure cloud computing

被引:0
|
作者
Ali, Sijjad [1 ]
Wadho, Shuaib Ahmed [2 ]
Yichiet, Aun [2 ]
Gan, Ming Lee [2 ]
Lee, Chen Kang [2 ]
机构
[1] Shenzhen Univ, Coll Comp Sci & Software Engn, Shenzhen, Peoples R China
[2] Univ Tunku Abdul Rahman, Fac Informat & Commun Technol, Kampar, Malaysia
关键词
Cloud computing; Security; Data protection; Homomorphic encryption; Undercover sharing techniques; FAULT-TOLERANCE; INFORMATION; ISSUES;
D O I
10.1016/j.eij.2024.100519
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing security and data protection are becoming increasingly critical as its use increases. The research we present demonstrates how undercover sharing techniques and homomorphic encryption can be combined to protect private information in cloud computing scenarios. We create a reliable, private, and confidential computation platform by utilizing this dual approach. Our strategy involves protecting data while dividing it among multiple servers. By using this distribution, the system is less likely to suffer from single points of failure and has a higher security level. To ensure information privacy and security, data encryption restricts access to authorized individuals only. As an additional feature, we employ homomorphic encryption to enable operations on encrypted data without direct access to the originals. By using this feature, sensitive data is protected from disclosure or misuse while being processed. Therefore, original data confidentiality can be preserved when computing on encrypted shares. Several performance tests were conducted to prove our strategy's practicality and effectiveness. Our considerations extended beyond encryption and decryption time and processing overhead. In our research, we demonstrate that our method strikes the right balance between security and computational efficiency.
引用
收藏
页数:15
相关论文
共 50 条
  • [41] Secure Medical Images Sharing over Cloud Computing environment
    Elgamal, Fatma E. -Z. A.
    Hikal, Noha A.
    Abou-Chadi, F. E. Z.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2013, 4 (05) : 130 - 137
  • [42] A Dynamic Secure Group Sharing Framework in Public Cloud Computing
    Xue, Kaiping
    Hong, Peilin
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2014, 2 (04) : 459 - 470
  • [43] A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing
    Li, Ruixuan
    Shen, Chenglin
    He, Heng
    Gu, Xiwu
    Xu, Zhiyong
    Xu, Cheng-Zhong
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2018, 6 (02) : 344 - 357
  • [44] Secure data deduplication using secret sharing schemes over cloud
    Singh, Priyanka
    Agarwal, Nishant
    Raman, Balasubramanian
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 88 : 156 - 167
  • [45] Simple Approach to Realizing Verifiable Secret Sharing for Secure Cloud System
    Iwamura, Keiichi
    Kamal, Ahmad Akmal Aminuddin Mohd
    IEEE ACCESS, 2022, 10 : 76794 - 76804
  • [46] Secure Keyword Search and Data Sharing Mechanism for Cloud Computing
    Ge, Chunpeng
    Susilo, Willy
    Liu, Zhe
    Xia, Jinyue
    Szalachowski, Pawel
    Fang Liming
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (06) : 2787 - 2800
  • [47] A verifiable fully homomorphic encryption scheme to secure big data in cloud computing
    El-Yahyaoui, Ahmed
    Ech-Chrif El Kettani, Mohamed Dafir
    2017 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM), 2017, : 250 - 254
  • [48] Secure Secret Sharing With Adaptive Bandwidth in Distributed Cloud Storage Systems
    Xiong, Hailiang
    Hu, Changwu
    Li, Yujun
    Wang, Guangyuan
    Zhou, Hongchao
    IEEE ACCESS, 2020, 8 : 108148 - 108157
  • [49] Enhanced Secure Sharing of Personal Health Records in Cloud Computing
    Kalaiselvi, R.
    Kousalya, K.
    Varshaa, R.
    Suganya, M.
    GAZI UNIVERSITY JOURNAL OF SCIENCE, 2016, 29 (03): : 583 - 591
  • [50] HOW SECURE IS YOUR CLOUD: CLASSIFICATION OF SECURITY THREATS AND COUNTERMEASURES WITHIN CLOUD COMPUTING?
    Almotiri, Sultan H.
    Al Ghamdi, Mohammed A.
    Saeed, Atif
    Shahid, Muhammad
    Masood, Khalid
    Nagra, Arfan Ali
    Asif, Muhammad
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (08): : 228 - 241