Enhanced Database Security Using Homomorphic Encryption

被引:0
|
作者
Roset, Connor [1 ]
Warren, Van [1 ]
Chiang, Chia-Chu [1 ]
机构
[1] Univ Arkansas, Comp Sci, 2801 S Univ Ave, Little Rock, AR 72204 USA
关键词
Cryptography; Database security; Encryption; Fully homomorphic; Homomorphism;
D O I
10.1007/978-981-10-4154-9_44
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
When sensitive data is stored on publicly available areas, privacy of that data becomes a concern. Organizations may wish to move data to public servers so the data is more accessible by their employees or consumers. It is important that this data be encrypted to ensure it remains confidential and secure. When this data is encrypted, it becomes difficult or impossible to perform calculations on a publicly stored database. A solution to this is homomorphic encryption, which allows an unlimited number of computations on encrypted data. This project analyzes an N-tier rotation scheme which allows an unlimited number of addition and subtractions of encrypted data, along with an unlimited number of scalar multiplications and divisions. This scheme is inspired by a combination lock and features multiple levels of security depth. The result of the proposed algorithm is a fast encryption scheme which allows data to be manipulated post encryption.
引用
收藏
页码:377 / 387
页数:11
相关论文
共 50 条
  • [1] Cloud Security Implementation using Homomorphic Encryption
    Syafalni, Infall
    Fadhli, Hamdani
    Utami, Wuri
    Dharma, Gede Satya Adi
    Mulyawan, Rahmat
    Sutisna, Nana
    Adiono, Trio
    [J]. 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION, NETWORKS AND SATELLITE (COMNETSAT), 2020, : 341 - 345
  • [2] Database Security Using Encryption
    Singh, Prabhsimran
    Kaur, Kuljit
    [J]. 2015 1ST INTERNATIONAL CONFERENCE ON FUTURISTIC TRENDS ON COMPUTATIONAL ANALYSIS AND KNOWLEDGE MANAGEMENT (ABLAZE), 2015, : 353 - 358
  • [3] Securing Database Server Using Homomorphic Encryption and Re-encryption
    Greeshma, Sarath
    Jayapriya, R.
    [J]. SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 277 - 289
  • [4] A Secure Database System using Homomorphic Encryption Schemes
    Gahi, Youssef
    Guennoun, Mouhcine
    El-Khatib, Khalil
    [J]. DBKDA 2011: THE THIRD INTERNATIONAL CONFERENCE ON ADVANCES IN DATABASES, KNOWLEDGE, AND DATA APPLICATIONS, 2011, : 54 - 58
  • [5] Homomorphic encryption with CCA security
    Prabhakaran, Manoj
    Rosulek, Mike
    [J]. AUTOMATA, LANGUAGES AND PROGRAMMING, PT 2, PROCEEDINGS, 2008, 5126 : 667 - 678
  • [6] Data Security in Recommendation System Using Homomorphic Encryption
    Soni, Kajol
    Panchal, Gaurang
    [J]. INFORMATION AND COMMUNICATION TECHNOLOGY FOR INTELLIGENT SYSTEMS (ICTIS 2017) - VOL 1, 2018, 83 : 308 - 313
  • [7] Blockchain-Based Federated Learning With Enhanced Privacy and Security Using Homomorphic Encryption and Reputation
    Yang, Ruizhe
    Zhao, Tonghui
    Yu, F. Richard
    Li, Meng
    Zhang, Dajun
    Zhao, Xuehui
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (12): : 21674 - 21688
  • [8] Additively LWE based homomorphic encryption for compact devices with enhanced security
    Challa, Ratnakumari
    Kumari, Gunta Vijaya
    [J]. International Journal of Network Security, 2019, 21 (03) : 378 - 383
  • [9] A database encryption scheme for enhanced security and easy sharing
    Chen, Gang
    Chen, Ke
    Dong, Jinxiang
    [J]. 2006 10TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, PROCEEDINGS, VOLS 1 AND 2, 2006, : 995 - 1000
  • [10] Limits of Provable Security for Homomorphic Encryption
    Bogdanov, Andrej
    Lee, Chin Ho
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2013, PT I, 2013, 8042 : 111 - 128