Cloud-based Full Homomorphic Encryption Algorithm by Gene Matching

被引:0
|
作者
Li, Pingping [1 ]
Zhang, Feng [2 ]
机构
[1] Zhejiang Tech Inst Econ, Inst Digital Informat Technol, Hangzhou, Peoples R China
[2] Zhejiang Business Coll, Appl Engn Coll, Hangzhou, Peoples R China
来源
关键词
Binary System; Cloud Computing; Full Homomorphic Encryption Algorithm; Gene Matching;
D O I
10.3745/JIPS.03.0199
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To improve the security of gene information and the accuracy of matching, this paper designs a homomorphic encryption algorithm for gene matching based on cloud computing environment. Firstly, the gene sequences of cloud files entered by users are collected, which are converted into binary code by binary function, so that the encrypted text is obviously different from the original text. After that, the binary code of genes in the database is compared with the generated code to complete gene matching. Experimental analysis indicates that when the number of fragments in a 1 GB gene file is 65, the minimum encryption time of the algorithm is 80.13 ms. Aside from that, the gene matching time and energy consumption of this algorithm are the least, which are 85.69 ms and 237.89 J, respectively.
引用
收藏
页码:432 / 441
页数:10
相关论文
共 50 条
  • [31] Homomorphic Encryption Technology for Cloud Computing
    Zhao, Min E.
    Geng, Yang
    [J]. PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE OF INFORMATION AND COMMUNICATION TECHNOLOGY [ICICT-2019], 2019, 154 : 73 - 83
  • [32] Policy Based on Homomorphic Encryption and Retrieval Scheme in Cloud Computing
    Ding, Yong
    Li, Xiumin
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 568 - 571
  • [33] Hybrid Homomorphic Encryption for Cloud Privacy
    Bensitel, Yasmina
    Rahal, Romadi
    [J]. Networked Systems, NETYS 2016, 2016, 9944 : 380 - 380
  • [34] Dual Homomorphic Encryption for Cloud Computing
    Wang, Huai-Xi
    Shu, Ni-Na
    Li, Yong-Xiang
    Wang, Chen
    [J]. INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND COMMUNICATION ENGINEERING (CSCE 2015), 2015, : 838 - 842
  • [35] Homomorphic Encryption for Security of Cloud Data
    Potey, Manish M.
    Dhote, C. A.
    Sharma, Deepak H.
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND VIRTUALIZATION (ICCCV) 2016, 2016, 79 : 175 - 181
  • [36] Cloud Storage Protection Scheme Based on Fully Homomorphic Encryption
    Mohammed, Mohammed A.
    Abed, Fadhil S.
    [J]. ARO-THE SCIENTIFIC JOURNAL OF KOYA UNIVERSITY, 2020, 8 (02): : 40 - 47
  • [37] Homomorphic Encryption Based Data Storage and Query Algorithm
    Di, Chunyun
    Cao, Chenlei
    Zhang, Ru
    Liu, Jianyi
    [J]. ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1582 - 1589
  • [38] Ciphertext Retrieval Technology of Homomorphic Encryption Based on Cloud Pretreatment
    Gong, Changqing
    Xiao, Yun
    Li, Mengfei
    Han, Shoufei
    Lin, Na
    Guo, Zhenzhou
    [J]. NEURAL INFORMATION PROCESSING, ICONIP 2017, PT V, 2017, 10638 : 741 - 751
  • [39] SECURITY STRUCTURE OF CLOUD STORAGE BASED ON HOMOMORPHIC ENCRYPTION SCHEME
    Li, Jian
    Chen, Sicong
    Song, Danjie
    [J]. 2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS) Vols 1-3, 2012, : 224 - 227
  • [40] A cloud computing security solution based on fully homomorphic encryption
    Zhao, Feng
    Li, Chao
    Liu, Chun Feng
    [J]. 2014 16TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2014, : 485 - 488