Towards Converging Fully Homomorphic Batch Encryption with Data Integrity Assurance in Cloud Setting

被引:0
|
作者
Hariharasitaraman, S. [1 ]
Balakannan, S. P. [1 ]
机构
[1] Kalasalingam Acad Res & Educ, Dept Informat Technol, Krishnankoil, Tamil Nadu, India
关键词
Fully homomorphic encryption; Public auditing; Integrity verification; Probabilistic query; Outsourced data;
D O I
10.1007/978-3-030-24643-3_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In encryption scheme setting, users who possess the right key can authorize to do computation with the data. In particular, cloud storage users lose their rights in terms of integrity on data, even after they ends up metered service from a CSP(Cloud Storage service provider), There is a possibility of dishonest computation over an old data by CSP also. Fully homomorphic encryption scheme address the problem of possessing the data in untrusted servers. In this proposed work, authors bring in a fully Homomorphic Batch Encryption Scheme using Integers with Shorter public key (HBEIS) converged with integrity verification process in a cloud setting. Any third-party auditor can do random audit on the encrypted data for assuring the correctness of data without possessing the original data. In our experimental set up, HBEIS scheme ensures optimal space and linear computational complexity.
引用
收藏
页码:31 / 40
页数:10
相关论文
共 50 条
  • [31] Secure Computation over Cloud using Fully Homomorphic Encryption
    Bilakanti, Anusha
    Anjana, N. B.
    Divya, A.
    Divya, K.
    Chakraborty, Nilotpal
    Patra, G. K.
    [J]. PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2016, : 633 - 636
  • [32] Homomorphic Encryption versus Searchable Encryption for Data Retrieval on Cloud
    Bulbul, Busranur
    Bahtiyar, Serif
    Altilar, Deniz Turgay
    [J]. 2020 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2020, : 187 - 192
  • [33] A SIMPLE FULLY HOMOMORPHIC ENCRYPTION SCHEME AVAILABLE IN CLOUD COMPUTING
    Li, Jian
    Song, Danjie
    Chen, Sicong
    Lu, Xiaofeng
    [J]. 2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS) Vols 1-3, 2012, : 214 - 217
  • [34] A cloud computing security solution based on fully homomorphic encryption
    Zhao, Feng
    Li, Chao
    Liu, Chun Feng
    [J]. 2014 16TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2014, : 485 - 488
  • [35] An Improved Fully Homomorphic Encryption Scheme under the Cloud Environment
    Wu, Zuowei
    Li, Taoshen
    [J]. 12TH CHINESE CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK AND SOCIAL COMPUTING (CHINESECSCW 2017), 2017, : 251 - 252
  • [36] Design and Realization of a Fully Homomorphic Encryption Algorithm for Cloud Applications
    Hariss, Khalil
    Noura, Hassan
    Samhat, Abed Ellatif
    Chamoun, Maroun
    [J]. RISKS AND SECURITY OF INTERNET AND SYSTEMS, CRISIS 2017, 2018, 10694 : 127 - 139
  • [37] Comparative evaluation of fully homomorphic encryption algorithms in cloud environment
    Mittal, Sonam
    Ramkumar, K. R.
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2023, 15 (04) : 333 - 347
  • [38] Double Batch for RLWE-Based Leveled Fully Homomorphic Encryption
    CHEN Hu
    HU Yupu
    LIAN Zhizhu
    [J]. Chinese Journal of Electronics, 2015, 24 (03) : 661 - 666
  • [39] Double Batch for RLWE-Based Leveled Fully Homomorphic Encryption
    Chen Hu
    Hu Yupu
    Lian Zhizhu
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2015, 24 (03) : 661 - 666
  • [40] Cloud Storage Third-party Data Security Scheme Based on Fully Homomorphic Encryption
    Chen, Junjian
    [J]. 2016 INTERNATIONAL CONFERENCE ON NETWORK AND INFORMATION SYSTEMS FOR COMPUTERS (ICNISC), 2016, : 155 - 159