A Multi-Key with Partially Homomorphic Encryption Scheme for Low-End Devices Ensuring Data Integrity

被引:1
|
作者
Medileh, Saci [1 ]
Laouid, Abdelkader [1 ]
Hammoudeh, Mohammad [2 ]
Kara, Mostefa [1 ]
Bejaoui, Tarek [3 ]
Eleyan, Amna [4 ]
Al-Khalidi, Mohammed [4 ]
机构
[1] Univ El Oued, LIAP Lab, POB 789, El Oued 39000, Algeria
[2] King Fahd Univ Petr & Minerals KFUPM, Informat & Comp Sci Dept, Acad Belt Rd, Dhahran 31261, Saudi Arabia
[3] Univ Carthage, Comp Engn Dept, Amilcar 1054, Tunisia
[4] Manchester Metropolitan Univ, Dept Comp & Math, Manchester M1 5GD, England
关键词
lightweight cryptography; homomorphic encryption; multi-key encryption; privacy-preserving; cloud data integrity; CRYPTOSYSTEM;
D O I
10.3390/info14050263
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In today's hyperconnected world, the Internet of Things and Cloud Computing complement each other in several areas. Cloud Computing provides IoT systems with an efficient and flexible environment that supports application requirements such as real-time control/monitoring, scalability, fault tolerance, and numerous security services. Hardware and software limitations of IoT devices can be mitigated using the massive on-demand cloud resources. However, IoT cloud-based solutions pose some security and privacy concerns, specifically when an untrusted cloud is used. This calls for strong encryption schemes that allow operations on data in an encrypted format without compromising the encryption. This paper presents an asymmetric multi-key and partially homomorphic encryption scheme. The scheme provides the addition operation by encrypting each decimal digit of the given integer number separately using a special key. In addition, data integrity processes are performed when an untrusted third party performs homomorphic operations on encrypted data. The proposed work considers the most widely known issues like the encrypted data size, slow operations at the hardware level, and high computing costs at the provider level. The size of generated ciphertext is almost equal to the size of the plaintext, and order-preserving is ensured using an asymmetrical encryption version.
引用
收藏
页数:20
相关论文
共 50 条
  • [41] Outsourced Privacy-Preserving kNN Classifier Model Based on Multi-Key Homomorphic Encryption
    Wang, Chen
    Xu, Jian
    Li, Jiarun
    Dong, Yan
    Naik, Nitin
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2023, 37 (02): : 1421 - 1436
  • [42] Privacy-preserving association rule mining via multi-key fully homomorphic encryption
    Jia, Peiheng
    Zhang, Jie
    Zhao, Bowen
    Li, Hongtao
    Liu, Ximeng
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2023, 35 (02) : 641 - 650
  • [43] FogDedupe: A Fog-Centric Deduplication Approach Using Multi-Key Homomorphic Encryption Technique
    Yoosuf, Mohamed Sirajudeen
    Muralidharan, C.
    Shitharth, S.
    Alghamdi, Mohammed
    Maray, Mohammed
    Rabie, Osama Bassam J.
    [J]. JOURNAL OF SENSORS, 2022, 2022
  • [44] Multi-key spatio-temporal chaotic image encryption and retrieval scheme
    Wang, Yu
    Chen, Liquan
    Yu, Kunliang
    Fang, Huiyu
    [J]. NONLINEAR DYNAMICS, 2024, 112 (04) : 3003 - 3025
  • [45] Multi-key spatio-temporal chaotic image encryption and retrieval scheme
    Yu Wang
    Liquan Chen
    Kunliang Yu
    Huiyu Fang
    [J]. Nonlinear Dynamics, 2024, 112 (4) : 3003 - 3025
  • [46] Poster: Control-Flow Integrity in Low-end Embedded Devices
    Jakkamsetti, Sashidhar
    Kim, Youngil
    Searles, Andrew
    Tsudik, Gene
    [J]. PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 3618 - 3620
  • [47] Searchable Public Key Encryption Scheme with Data Integrity Checking
    JunYang
    Li, Shujuan
    [J]. ADVANCES ON BROAD-BAND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, 2017, 2 : 363 - 370
  • [48] Using Merkle's Puzzle for Key agreement with Low-end Devices
    Armknecht, Frederik
    Westhoff, Dirk
    [J]. 2009 IEEE 34TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2009), 2009, : 858 - +
  • [49] Block chain enabled auditing with optimal multi-key homomorphic encryption technique for public cloud computing environment
    Bandaru, Venkata Naga Rani
    Visalakshi, P.
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (22):
  • [50] A Practical Implementation of Medical Privacy-Preserving Federated Learning Using Multi-Key Homomorphic Encryption and Flower Framework
    Walskaar, Ivar
    Tran, Minh Christian
    Catak, Ferhat Ozgur
    [J]. CRYPTOGRAPHY, 2023, 7 (04)