Secure cloud computing based on threshold homomorphic encryption

被引:10
|
作者
Varnovskiy, N. P. [1 ]
Martishin, S. A. [2 ]
Khrapchenko, M. V. [2 ]
Shokurov, A. V. [2 ]
机构
[1] Moscow MV Lomonosov State Univ, Informat Secur Inst, Moscow 119333, Russia
[2] Russian Acad Sci, Inst Syst Programming, Moscow 109004, Russia
关键词
Cloud Computing; Authentication Protocol; Private Data; Encrypt Data; Cryptographic Protocol;
D O I
10.1134/S0361768815040088
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We analyze the possibility of implementation of cloud computing over private data that is based on previously proposed threshold fully homomorphic cryptosystems. The main result is a protocol for securer cloud computing over private data in a model with supplementary cryptoservers. As a result, one gets a system that does not require a public key and replaces a sophisticated and costly bootstrapping by a more efficient reencryption protocol run by the cryptoservers.
引用
收藏
页码:215 / 218
页数:4
相关论文
共 50 条
  • [1] Secure cloud computing based on threshold homomorphic encryption
    N. P. Varnovskiy
    S. A. Martishin
    M. V. Khrapchenko
    A. V. Shokurov
    [J]. Programming and Computer Software, 2015, 41 : 215 - 218
  • [2] Making cloud computing more secure: Homomorphic encryption
    Naone, Erica
    [J]. Technology Review, 2011, 114 (03) : 50 - 51
  • [3] Challenges of Using Homomorphic Encryption to Secure Cloud Computing
    El Makkaoui, Khalid
    Ezzati, Abdellah
    Beni Hssane, Abderrahim
    [J]. 2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15), 2015, : 343 - 349
  • [4] Secure and Efficient Similarity Retrieval in Cloud Computing Based on Homomorphic Encryption
    Wang, Na
    Zhou, Wen
    Wang, Jingjing
    Guo, Yifan
    Fu, Junsong
    Liu, Jianwei
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 2454 - 2469
  • [5] A Secure Image Retrieval Method Based on Homomorphic Encryption for Cloud Computing
    Zhang, Yan
    Zhuo, Li
    Peng, Yuanfan
    Zhang, Jing
    [J]. 2014 19TH INTERNATIONAL CONFERENCE ON DIGITAL SIGNAL PROCESSING (DSP), 2014, : 269 - 274
  • [6] A Secure Cloud Computing Architecture Using Homomorphic Encryption
    Benzekki, Kamal
    El Fergougui, Abdeslam
    El Alaoui, Abdelbaki El Belrhiti
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (02) : 293 - 298
  • [7] Secure scheme on mobile multi cloud computing based on homomorphic encryption
    Zkik, Karim
    Orhanou, Ghizlane
    El Hajji, Said
    [J]. 2016 INTERNATIONAL CONFERENCE ON ENGINEERING & MIS (ICEMIS), 2016,
  • [8] Outsourced Secure Face Recognition Based on CKKS Homomorphic Encryption in Cloud Computing
    Liu Jiasen
    Wang Xu An
    Chen Bowei
    Tu Zheng
    Zhao Kaiyang
    [J]. INTERNATIONAL JOURNAL OF MOBILE COMPUTING AND MULTIMEDIA COMMUNICATIONS, 2021, 12 (03) : 27 - 43
  • [9] Homomorphic Cloud Computing Scheme Based on Hybrid Homomorphic Encryption
    Song, Xidan
    Wang, Yulin
    [J]. PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2017, : 2450 - 2453
  • [10] Secure Cloud Computing: Multithreaded Fully Homomorphic Encryption for Legal Metrology
    Oppermann, Alexander
    Yurchenko, Artem
    Esche, Marko
    Seifert, Jean-Pierre
    [J]. INTELLIGENT, SECURE, AND DEPENDABLE SYSTEMS IN DISTRIBUTED AND CLOUD ENVIRONMENTS (ISDDC 2017), 2017, 10618 : 35 - 54