A New Lightweight Homomorphic Encryption Scheme for Mobile Cloud Computing

被引:20
|
作者
Baharon, Mohd Rizuan [1 ]
Shi, Qi [1 ]
Llewellyn-Jones, David [1 ]
机构
[1] Liverpool John Moores Univ, Sch Comp & Math Sci, Liverpool, Merseyside, England
关键词
Cloud Computing; Mobile Cloud Computing; Data Storing and Processing; Homomorphic Encryption;
D O I
10.1109/CIT/IUCC/DASC/PICOM.2015.88
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The emerging technology of mobile devices allows mobile users to access a wide range of applications through the Internet connection. As such applications demand extensive computational power, it poses a challenge to the devices with limited computation power, memory, storage and energy. However, such a challenge could be overcome by cloud computing as the cloud offers virtually unlimited dynamic resources for computation, storage and service provision. Nevertheless, mobile users are still reluctant to adopt this technology as moving private data to the cloud with no physical and limited digital control by themselves raises security concerns to their data. Encryption using the primitive encryption schemes is unsuitable for use in cloud environments, as data need to be decrypted first before they can be processed, resulting in the data being exposed to the cloud. Moreover, although homomorphic encryption is believed to be one of the potential solutions to allowing arbitrary computation on encrypted data, its efficiency is still an obstacle for its implementation. Thus, this paper will deeply look at efficiency issues and propose a new Lightweight Homomorphic Encryption (LHE) scheme which minimizes the use of computation power at encryption and key generation. The key contribution of this work is to have a lightweight scheme with improved efficiency, while enabling homomorphism under both addition and multiplication.
引用
收藏
页码:618 / 625
页数:8
相关论文
共 50 条
  • [41] A Secure and Lightweight Data Access Control Scheme for Mobile Cloud Computing
    Jin, Yu
    Tian, Chuan
    He, Heng
    Wang, Fan
    [J]. PROCEEDINGS 2015 IEEE FIFTH INTERNATIONAL CONFERENCE ON BIG DATA AND CLOUD COMPUTING BDCLOUD 2015, 2015, : 172 - 179
  • [42] Storage and Communication Security in Cloud Computing Using a Homomorphic Encryption Scheme Based Weil Pairing
    Dogan, Demet Cidem
    Altindis, Huseyin
    [J]. ELEKTRONIKA IR ELEKTROTECHNIKA, 2020, 26 (01) : 78 - 83
  • [43] A new definition of homomorphic signature for identity management in mobile cloud computing
    Wang, Zhiwei
    Sur, Guozi
    Chen, Danwei
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2014, 80 (03) : 546 - 553
  • [44] Parallel Speech Encryption Method Based on BGN Homomorphic Encryption in Cloud Computing
    Zhang, Qiu-yu
    Wang, Kai
    [J]. International Journal of Network Security, 2024, 26 (06): : 943 - 956
  • [45] Homomorphic Encryption in the Cloud
    Hrestak, Darko
    Picek, Stjepan
    [J]. 2014 37TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2014, : 1400 - 1404
  • [46] Homomorphic Proxy Re-Encryption and Multiparty Cloud Computing
    Liu, Shu-Guang
    Zhang, Wei
    [J]. INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 222 - 225
  • [47] Securing the Cloud with Reconfigurable Computing: An FPGA Accelerator for Homomorphic Encryption
    Cilardo, Alessandro
    Argenziano, Domenico
    [J]. PROCEEDINGS OF THE 2016 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2016, : 1622 - 1627
  • [48] A cloud computing security solution based on fully homomorphic encryption
    Zhao, Feng
    Li, Chao
    Liu, Chun Feng
    [J]. 2014 16TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2014, : 485 - 488
  • [49] Incremental proxy re-encryption scheme for mobile cloud computing environment
    Khan, Abdul Nasir
    Kiah, M. L. Mat
    Madani, Sajjad A.
    Ali, Mazhar
    Khan, Atta Ur Rehman
    Shamshirband, Shahaboddin
    [J]. JOURNAL OF SUPERCOMPUTING, 2014, 68 (02): : 624 - 651
  • [50] Incremental proxy re-encryption scheme for mobile cloud computing environment
    Abdul Nasir Khan
    M. L. Mat Kiah
    Sajjad A. Madani
    Mazhar Ali
    Atta ur Rehman Khan
    Shahaboddin Shamshirband
    [J]. The Journal of Supercomputing, 2014, 68 : 624 - 651