Homomorphic Encryption Scheme Based on Elliptic Curve Cryptography for Privacy Protection of Cloud Computing

被引:12
|
作者
Hong, Ming-quan [1 ]
Zhao, Wen-bo [1 ]
Wang, Peng-yu [2 ]
机构
[1] Forecast Ctr, Seismol Bur Fujian Prov, Fuzhou, Peoples R China
[2] HUAFU SECURITIES CO LTD, Dept Informat Technol, Fuzhou, Peoples R China
关键词
Elliptic Curve Cryptography; Privacy Protection; Homomorphic Encryption; Cloud security; GPS data of the earthquake;
D O I
10.1109/BigDataSecurity-HPSC-IDS.2016.51
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing is becoming the main computing model in the future due to its advantages such as high resource utilization rate and save high cost of performance. The public environments is become necessary to secure their storage and transmission against possible attacks such as known-plain-text attack and semantic security. How to ensure the data security and the privacy preserving, however, becomes a huge obstacle to its development. The traditional way to solve Secure Multiparty Computation (SMC) problem is using Trusted Third Party (TTP), however, TTPs are particularly hard to achieve and compute complexity. To protect user's privacy data, the encrypted outsourcing data are generally stored and processed in cloud computing by applying homomorphic encryption. According to above situation, we propose Elliptic Curve Cryptography (ECC) based homomorphic encryption scheme for SMC problem that is dramatically reduced computation and communication cost. It shows that the scheme has advantages in energy consumption, communication consumption and privacy protection through the comparison experiment between ECC based homomorphic encryption and RSA&Paillier encryption algorithm. Further evidence, the scheme of homomorphic encryption scheme based on ECC is applied to the calculation of GPS data of the earthquake and prove it is proved that the scheme is feasible, excellent encryption effect and high security.
引用
收藏
页码:152 / 157
页数:6
相关论文
共 50 条
  • [21] DPP: Data Privacy-Preserving for Cloud Computing based on Homomorphic Encryption
    Wang, Jing
    Wu, Fengheng
    Zhang, Tingbo
    Wu, Xiaohua
    2022 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY, CYBERC, 2022, : 29 - 32
  • [22] A Novel Asymmetric Hyperchaotic Image Encryption Scheme Based on Elliptic Curve Cryptography
    Liang, Haotian
    Zhang, Guidong
    Hou, Wenjin
    Huang, Pinyi
    Liu, Bo
    Li, Shouliang
    APPLIED SCIENCES-BASEL, 2021, 11 (12):
  • [23] An efficient image encryption scheme for TMIS based on elliptic curve integrated encryption and linear cryptography
    Benssalah, Mustapha
    Rhaskali, Yesser
    Drouiche, Karim
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (02) : 2081 - 2107
  • [24] An efficient image encryption scheme for TMIS based on elliptic curve integrated encryption and linear cryptography
    Mustapha Benssalah
    Yesser Rhaskali
    Karim Drouiche
    Multimedia Tools and Applications, 2021, 80 : 2081 - 2107
  • [25] Elliptic curve ElGamal based homomorphic image encryption scheme for sharing secret images
    Li, Li
    Abd El-Latif, Ahmed A.
    Niu, Xiamu
    SIGNAL PROCESSING, 2012, 92 (04) : 1069 - 1078
  • [26] A Verifiable Fully Homomorphic Encryption Scheme for Cloud Computing Security
    El-Yahyaoui, Ahmed
    Ech-Cherif El Kettani, Mohamed Dafir
    TECHNOLOGIES, 2019, 7 (01):
  • [27] A New Lightweight Homomorphic Encryption Scheme for Mobile Cloud Computing
    Baharon, Mohd Rizuan
    Shi, Qi
    Llewellyn-Jones, David
    CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, : 618 - 625
  • [28] A SIMPLE FULLY HOMOMORPHIC ENCRYPTION SCHEME AVAILABLE IN CLOUD COMPUTING
    Li, Jian
    Song, Danjie
    Chen, Sicong
    Lu, Xiaofeng
    2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS) Vols 1-3, 2012, : 214 - 217
  • [29] Encryption Scheme Based on Hyperelliptic Curve Cryptography
    John, Asha Liza
    Thampi, Sabu M.
    SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 491 - 506
  • [30] An enhanced authentication scheme for Internet of Things and cloud based on elliptic curve cryptography
    Bhuarya, Pallavi
    Chandrakar, Preeti
    Ali, Rifaqat
    Sharaff, Aakanksha
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2021, 34 (10)