Homomorphic Encryption Scheme Based on Elliptic Curve Cryptography for Privacy Protection of Cloud Computing

被引:12
|
作者
Hong, Ming-quan [1 ]
Zhao, Wen-bo [1 ]
Wang, Peng-yu [2 ]
机构
[1] Forecast Ctr, Seismol Bur Fujian Prov, Fuzhou, Peoples R China
[2] HUAFU SECURITIES CO LTD, Dept Informat Technol, Fuzhou, Peoples R China
关键词
Elliptic Curve Cryptography; Privacy Protection; Homomorphic Encryption; Cloud security; GPS data of the earthquake;
D O I
10.1109/BigDataSecurity-HPSC-IDS.2016.51
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing is becoming the main computing model in the future due to its advantages such as high resource utilization rate and save high cost of performance. The public environments is become necessary to secure their storage and transmission against possible attacks such as known-plain-text attack and semantic security. How to ensure the data security and the privacy preserving, however, becomes a huge obstacle to its development. The traditional way to solve Secure Multiparty Computation (SMC) problem is using Trusted Third Party (TTP), however, TTPs are particularly hard to achieve and compute complexity. To protect user's privacy data, the encrypted outsourcing data are generally stored and processed in cloud computing by applying homomorphic encryption. According to above situation, we propose Elliptic Curve Cryptography (ECC) based homomorphic encryption scheme for SMC problem that is dramatically reduced computation and communication cost. It shows that the scheme has advantages in energy consumption, communication consumption and privacy protection through the comparison experiment between ECC based homomorphic encryption and RSA&Paillier encryption algorithm. Further evidence, the scheme of homomorphic encryption scheme based on ECC is applied to the calculation of GPS data of the earthquake and prove it is proved that the scheme is feasible, excellent encryption effect and high security.
引用
收藏
页码:152 / 157
页数:6
相关论文
共 50 条
  • [41] A Privacy Protection Scheme for Verifiable Data Element Circulation Based on Fully Homomorphic Encryption
    Song Jiyuan
    Gao Hongmin
    Ye Keke
    Shen Yushi
    Ma Zhaofeng
    Feng Chengzhi
    China Communications, 2025, 22 (04) : 223 - 235
  • [42] Privacy Protection of Digital Speech Based on Homomorphic Encryption
    Shi, Canghong
    Wang, Hongxia
    Qian, Qing
    Wang, Huan
    CLOUD COMPUTING AND SECURITY, ICCCS 2016, PT I, 2016, 10039 : 365 - 376
  • [43] Privacy Protection of IoT Based on Fully Homomorphic Encryption
    Song, Wei-Tao
    Hu, Bin
    Zhao, Xiu-Feng
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [44] Dynamic searchable encryption with privacy protection for cloud computing
    Ocansey, Selasi Kwame
    Ametepe, Wolali
    Li, Xiao Wei
    Wang, Changda
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (01)
  • [45] Multi-user Fully Homomorphic Encryption Scheme Based on Policy for Cloud Computing
    Li, Taoshen
    Liu, Qing
    Huang, Ruwei
    WEB INFORMATION SYSTEMS AND APPLICATIONS (WISA 2021), 2021, 12999 : 274 - 286
  • [46] Bpf-payment: Fair payment for cloud computing with privacy based on blockchain and homomorphic encryption
    Xiaohua Wu
    Fangjian Yu
    Jing Wang
    Jinpeng Chang
    Xueqi Feng
    Peer-to-Peer Networking and Applications, 2023, 16 : 2649 - 2666
  • [47] Secure cloud computing based on threshold homomorphic encryption
    Varnovskiy, N. P.
    Martishin, S. A.
    Khrapchenko, M. V.
    Shokurov, A. V.
    PROGRAMMING AND COMPUTER SOFTWARE, 2015, 41 (04) : 215 - 218
  • [48] Secure cloud computing based on threshold homomorphic encryption
    N. P. Varnovskiy
    S. A. Martishin
    M. V. Khrapchenko
    A. V. Shokurov
    Programming and Computer Software, 2015, 41 : 215 - 218
  • [49] Bpf-payment: Fair payment for cloud computing with privacy based on blockchain and homomorphic encryption
    Wu, Xiaohua
    Yu, Fangjian
    Wang, Jing
    Chang, Jinpeng
    Feng, Xueqi
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2023, 16 (05) : 2649 - 2666
  • [50] Secured Data Storage Using Deduplication in Cloud Computing Based on Elliptic Curve Cryptography
    Ahamed, N. Niyaz
    Duraipandian, N.
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 41 (01): : 83 - 94