Cloud-based Full Homomorphic Encryption Algorithm by Gene Matching

被引:0
|
作者
Li, Pingping [1 ]
Zhang, Feng [2 ]
机构
[1] Zhejiang Tech Inst Econ, Inst Digital Informat Technol, Hangzhou, Peoples R China
[2] Zhejiang Business Coll, Appl Engn Coll, Hangzhou, Peoples R China
来源
关键词
Binary System; Cloud Computing; Full Homomorphic Encryption Algorithm; Gene Matching;
D O I
10.3745/JIPS.03.0199
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To improve the security of gene information and the accuracy of matching, this paper designs a homomorphic encryption algorithm for gene matching based on cloud computing environment. Firstly, the gene sequences of cloud files entered by users are collected, which are converted into binary code by binary function, so that the encrypted text is obviously different from the original text. After that, the binary code of genes in the database is compared with the generated code to complete gene matching. Experimental analysis indicates that when the number of fragments in a 1 GB gene file is 65, the minimum encryption time of the algorithm is 80.13 ms. Aside from that, the gene matching time and energy consumption of this algorithm are the least, which are 85.69 ms and 237.89 J, respectively.
引用
收藏
页码:432 / 441
页数:10
相关论文
共 50 条
  • [21] Homomorphic Encryption for Cluster in Cloud
    Vamshinath, N.
    Ramya, K. Ruth
    Krishna, Sai
    Bhaskar, P. Gopi
    Mwaseba, Geofrey L.
    Kim, Tai-hoon
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (05): : 319 - 324
  • [22] Homomorphic encryption for cluster in cloud
    Department of Computer Science and Engineering, KL University, Vaddeswaram, AP, India
    不详
    [J]. Int. J. Secur. Appl, 5 (319-324):
  • [23] THE MODIFICATION OF RSA ALGORITHM TO ADAPT FULLY HOMOMORPHIC ENCRYPTION ALGORITHM IN CLOUD COMPUTING
    Sha, Peidong
    Zhu, Zhixiang
    [J]. PROCEEDINGS OF 2016 4TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENCE SYSTEMS (IEEE CCIS 2016), 2016, : 388 - 392
  • [24] Secure cloud computing based on threshold homomorphic encryption
    Varnovskiy, N. P.
    Martishin, S. A.
    Khrapchenko, M. V.
    Shokurov, A. V.
    [J]. PROGRAMMING AND COMPUTER SOFTWARE, 2015, 41 (04) : 215 - 218
  • [25] Secure cloud computing based on threshold homomorphic encryption
    N. P. Varnovskiy
    S. A. Martishin
    M. V. Khrapchenko
    A. V. Shokurov
    [J]. Programming and Computer Software, 2015, 41 : 215 - 218
  • [26] Key Exchange Algorithm Based on Homomorphic Encryption
    Krendelev, Sergei
    Kuzmin, Ilya
    [J]. PROCEEDINGS OF THE 2017 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS (FEDCSIS), 2017, : 793 - 795
  • [27] New Fully Homomorphic Encryption Scheme Based On Multistage Partial Homomorphic Encryption Applied In Cloud Computing
    Mahmood, Zainab Hikmat
    Ibrahem, Mahmood Khalel
    [J]. 2018 1ST ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION AND SCIENCES (AICIS 2018), 2018, : 182 - 186
  • [28] An Efficient Homomorphic Medical Image Encryption Algorithm For Cloud Storage Security
    Vengadapurvaja, A. M.
    Nisha, G.
    Aarthy, R.
    Sasikaladevi, N.
    [J]. 7TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING & COMMUNICATIONS (ICACC-2017), 2017, 115 : 643 - 650
  • [29] A Homomorphic Encryption Algorithm for Chaotic Image Coding Data in Cloud Computing
    Jiang, Bin-bin
    [J]. ADVANCED HYBRID INFORMATION PROCESSING, ADHIP 2019, PT I, 2019, 301 : 448 - 457
  • [30] Parallel Speech Encryption Method Based on BGN Homomorphic Encryption in Cloud Computing
    Zhang, Qiu-yu
    Wang, Kai
    [J]. International Journal of Network Security, 2024, 26 (06) : 943 - 956