SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3010
HOMOMORPHIC ENCRYPTION SCHEME IN CLOUD COMPUTING FOR
SECURITY AND PRIVACY OF SENSITIVE DATA
Mrs.Soniya Bastwade1, Ms. Neha D.Patil2
1,2Asst. Prof, Dept. of Computer Engg, D.Y. Patil COE, Pune, Maharashtra, India
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract – Nowadays privacy of our own sensitive data
becomes the highest priority for people. Generally, we
offer knowledge security and privacy protection through
encrypted knowledge however at the expense of
usability. Absolutely homomorphic cryptography permits to
perform unlimited chaining of mathematical operations on
encrypted knowledge creating it more secure for a
few legal corporationsand establishments touse it. Encryption
technology can provide data privacy security in cloud
environment, but there are many problems in the process of
access the data which is encrypted, because at the time of
accessing encrypted data there are chances to leak our
sensitive data which can be avoided into homomorphic
encryption techniques.
KeyWords: Cloud Computing, Security, Homomorphic,
Encryption.
1. INTRODUCTION
Cloud computing is revolutionizing several of our
ecosystems, together with aid. Compared with
earlier ways of process information, cloud computing
environments offer vital edges, like the
provision of automatic tools to assemble, connect, tack and
reconfigure virtualized resources on demand.
These build it abundant easier to satisfy structure goals as
organizations will simply deploy cloud services. However,
the shift in paradigm that accompanies theadoptionofcloud
computing is more and more giving rise to security and
privacy concerns regarding aspects of cloud
computing like multi-tenancy, trust, loss of
management and responsibleness [1]. Consequently cloud
platforms that handle sensitive info square
measure needed to deploy technical measures
and structure safeguards to avoid information protection
breakdowns which may end in monumental and
expensive damages. Data privacyincloudcomputing maybe
elementary issue nowadays. Absolutely homomorphic codin
g schemes area unit
extremely counseled for knowledge security in cloud
computing. In fact, confidentiality of smart knowledge will
be preserved although a non-trusted cloudserverprocesses
it; the mystery behind this can
be that absolutely homomorphic coding schemes permit
process encrypted knowledge while not the necessity of a
previous coding. During this paper we have a tendency
to gift a brand
new absolutely homomorphic coding theme from integers.
Our coding theme will be used primarily to
secure smart knowledge in cloud computing.
The planned theme uses an oversized whole number ringas
clear text house and one key for coding and coding,
i.e. it's a isosceles coding theme. Isosceles coding may be
a kind of processed cryptography employing
a singular coding key to colour associate electronic mail.
Its conversion usesa mathematical algorithmicrule together
with a secret key, which ends within the inability to
create sense out of a message. Isosceles coding may be
a two-way algorithmic rule as a result of the
mathematical algorithmic rule is reversed once decrypting
the message together with mistreatment a similar secret
key. Isosceles coding is additionally referred to as private-
key coding and secure-key coding.
LITERATURE REVIEW
Authentication and Authorization
In [6] the authors propose a credential classification and a
framework for analyzing and developing solutions for
credential management that include strategies to evaluate
the complexity of cloud ecosystems. This study identifies a
set of categories relevant for authentication and
authorization for the cloud focusing on infrastructural
organization which include classifications for credentials,
and adapt those categories to the cloud context. The study
also summarizes important factorsthatneedtobetakeninto
consideration when adopting or developing a solution for
authentication and authorization – for example, identifying
the appropriate requirements, categories, services,
deployment models, lifecycle, and entities.
In other work, a design model formulti-factorauthentication
in cloud computing environmentsisproposedin[7],and this
model includes an analysis of the potential security threats
in the proposed model. Another authentication solution is
seen with MiLAMob [8], which provides a SaaS
authentication middleware for mobile consumers of IaaS
cloud applications. MiLAMob is a middleware-layer that
handles the real-time authentication events on behalf of
consumer devices with minimal HTTP traffic. The
middleware currently supports mobile consumptionofdata
on IaaS clouds such as Amazon’s S3.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3011
Identity and Access Management
The important functionalities of identity management
systems for the success of clouds in relation to consumer
satisfaction is discussed in [9]. The authors also present an
authorization system for cloud federation using Shibboleth -
an open source implementation of the security assertion
mark-up language (SAML) for single sign-on with different
cloud providers. This solution demonstrates how
organizations can outsource authentication and
authorization to third party clouds using an identity
management system. Stihler et al. [10] also propose an
integral federatedidentitymanagementforcloudcomputing.
A trust relationship between a given user and SaaS domains
is required so that SaaS users can access the application and
resources that are provided. In a PaaS domain, there is an
interceptor that acts as a proxy to accept the user’s requests
and execute them. The interceptor interacts with the secure
token service (STS), and requests the security token using
the WS-Trust specification.
Confidentiality, Integrity, and Availability
Santos et al. [11] extend the Terra [12] design that enables
users to verify the integrity of VMs in the cloud. The
proposed solution is called the trusted cloud computing
platform (TCCP), and the whole IaaS is considered to be a
single system instead of granular hosts in Terra. In this
approach, all nodes run a trusted virtual machinemonitor to
isolate and protect virtual machines. Users are given access
to cloud servicesthroughthe cloudmanagercomponent.The
external trusted entity (ETE) is another component that
provides a trust coordinator service in ordertokeeptrack of
the trusted VMs in a cluster. The ETE can be used to attest
the security of the VMs. A TCCP guarantees confidentiality
and integrity in data and computation and it also enables
users to attest to the cloud service provider to ensure
whether the services are secure prior to setting up their
VMs. These features are based on the trusted platform
module (TPM) chip. The TPM contains a private
endorsement key that uniquely identifies the TPMandsome
cryptographic functions that cannot be altered.
Security Policy Management
In [13] the authors propose a generic security management
framework allowing providers of cloud data management
systems to define and enforce complex security policies
through a policy managementmodule.Theuseractivities are
stored and monitored for each storage system,andare made
available to the policy management module. Users’ actions
are evaluated by a trust management module based on their
past activities and are grouped as “fair” or “malicious”. An
appropriate architecture for security management which
satisfies the requirements of policy definitions (such as
flexibility, expressiveness,extendibilityandcorrectness)has
been implemented. The authors evaluated the proposed
system on a data management system that is built on data
storage. Takabi et al. [14] introduce policy management as a
service (PMaaS) to provide userswitha unifiedcontrol point
for managing access policies in order to control access to
cloud resources independently of the physical location of
cloud providers. PMaaS is designed specifically to solve the
issue of having multiple access control authorization
mechanisms employed by cloud service providers that
restrict the flexibility of applying custom access control to a
particular service. For this purpose, the PMaaS architecture
includes a policy management service provider that is the
entry point for cloud users to defineandmanagethepolicies.
The cloud service provider imports theuser-definedpolicies
and acts a policy decision point to enforce the user policies.
PROBLEM STATEMENT
Statement 1:
In order to construct secure protocol for electronic
voting. In election schemes, the homomorphic
property provides a tool to obtainthetally giventhe
encrypted votes without decrypting the individual
votes and discovering voters’ identities and their
personal tendency.
Statement 2:
To allow business users to perform multiple
operations over data, stored in cloud data centres,
without need of huge calculations on client’ side.
Statement 3:
Possibly lower expenses, whileensuringcustomer’s
data privacy.
Statement 4:
To avoid the data leakage and provide
confidentiality of sensible data can be preserved
even if a non trusted cloud server processes.
Statement 5:
To allow processing encrypted data without the
need of a prior decryption.
Homomorphic Encryption:
In cloud computing the major concern is about the privacy
risks, because when we are storing data in cloud it will be in
encrypted format and cloud computers knowswhatactually
a client data is. So if the hacker get the data access then he
can see all the data stored by client on cloud. It menace if we
are using simple cloud computing technique to store and
secure our data then there are chances to leak our data and
accessed by any unauthorized person. Following fig.1 .
Shows the functioning of cloud computing.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3012
Fig.1: Cloud computing Technique
In homomorphic encryption cloud computers doesn’t know
about data stored by clients on cloud storage. In this process
we can do the homomorphic operations where we can
decrypt the data without showing the original data even to
cloud computers. So there is no chance to leak our sensitive
data nad cannot be accessed by any other unauthorised
person. Fig 2 shows how homomorphic Encryption works.
Fig 2. Homomorphic Encryption Technique.
EXPECTED OUTCOME
An attack algorithm on the symmetric homomorphic
encryption scheme proposed by Li et al. Our attack can
recover the secret key from two plaintext/cipher text pairs.
The computational complexity of our attack is O (log4p). To
recover the entire secret key in the generated instances in
several seconds when the number of homomorphic
multiplications is greater than 2.
Symmetric algorithm randomizes messages into integers. It
is a noise free and probabilistic FHE scheme from integers, it
can be used for data security in cloud computing. The
security of this algorithm is based on the problem of
factorization of big numbers.
METHODOLOGY TO BE USE
Cloud Computing with Application in private queries to a
search engine, searching over encrypted data, private
information retrieval(PIR), protocol PIR allows him to
retrieve his wanted information’s in a saferwayandwithout
the cloud server being able to determine which element was
selected, protection of mobile agents againstmalicioushosts
by encrypting them, secure protocol for electronic voting,
and also in n traditional approachofadvertisement,a mobile
device sends a user’s location to a provider, who sends
customized ads, such as discount vouchersfor nearby shops,
back to the user.
REFERENCES
[1] R. Rivest, L. Adleman and M. Dertouzos, "On Data Banks
and Privacy Homorphisms," In Foundataions of Secure
Computataion,Academic Press, pp. 169-179, 1978.
[2] C. Gentry, "A fully homomorphic encryption
scheme,"https://crypto.stanford.edu/craig/craig-thesis.pdf,
September 2009.
[3] K. Lauter, M. Naehrig et V. Vaikuntanathan, «Can
homomorphic encryption be practical?,»available
athttps://eprint.iacr.org/2011/405.pdf.
[4] Z. Brakerski et V. Vaikantanathan, “ Efficient Fully
HomomorphicEncryption from (Standard) LWE”, Available
at http://eprint.iacr.org/2011/344.
[5] C. Gentry, S. Halevi et N. Smart, “Fully Homomorphic
Encryption with Polylog Overhead,” available
athttps://eprint.iacr.org/2011/566.pdf.
[6] N. Mimura Gonzalez, M. Torrez Rojas, M. Maciel da Silva,
F. Redigolo, T. Melo de Brito Carvalho, C. Miers, M. Naslund,
and A. Ahmed, “A framework for authentication and
authorization credentials in cloud computing,” in Trust,
Security and Privacy in Computing and Communications
(TrustCom), 2013 12th IEEE International Conference on,
pp. 509–516, July 2013.
[7] R. Banyal, P. Jain, and V. Jain, “Multi-factor authentication
framework for cloud computing,” in Computational
Intelligence, Modelling and Simulation (CIMSim), 2013Fifth
International Conference on, pp. 105–110, Sept 2013.
[8] R. Lomotey and R. Deters, “Saas authentication
middleware for mobile consumers of iaas cloud,” in Services
(SERVICES), 2013 IEEE Ninth World Congress on, pp. 448–
455, June 2013.
[9] M. A. Leandro, T. J. Nascimento, D. R. dos Santos, C. M.
Westphall, and C. B. Westphall, “Multitenancy authorization
system with federated identity for cloud-based
environments using shibboleth,” in Proceedings of the 11th
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3013
International Conference on Networks, ICN 2012,pp.88–93,
2012.
[10] M. Stihler, A. Santin, A. Marcon, and J. Fraga, “Integral
federated identity management for cloud computing,” in
New Technologies, Mobility and Security (NTMS), 2012 5th
International Conference on, pp. 1–5, May 2012.
[11] N. Santos, K. P. Gummadi, and R. Rodrigues, “Towards
trusted cloud computing,” in Proceedings of the 2009
Conference on Hot Topics in Cloud Computing, HotCloud’09,
(Berkeley, CA, USA), USENIX Association, 2009.
[12] T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D.
Boneh, “Terra: A virtual machine-based platform for trusted
computing,” in Proceedings of the Nineteenth ACM
Symposium on OperatingSystemsPrinciples,SOSP’03,(New
York, NY, USA), pp. 193–206, ACM, 2003.
[13] C. Basescu, A. Carpen-Amarie, C. Leordeanu, A. Costan,
and G. Antoniu, “Managing data access on clouds: A generic
framework for enforcing security policies,” in Advanced
InformationNetworkingand Applications(AINA),2011IEEE
International Conference on, pp. 459–466, March 2011.
[14] H. Takabi and J. Joshi, “Policy management as a service:
An approach to manage policy heterogeneity in cloud
computing environment,” in System Science (HICSS), 2012
45th Hawaii International Conference on, pp. 5500–5508,
Jan 2012.

More Related Content

What's hot (19)

PDF
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
IJNSA Journal
 
PDF
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
IJCNCJournal
 
PDF
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Editor IJMTER
 
PDF
A study on security responsibilities and adoption in
eSAT Publishing House
 
PDF
A study on security responsibilities and adoption in cloud
eSAT Journals
 
PDF
Comparison of data security in grid and cloud computing
eSAT Journals
 
PDF
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET Journal
 
PDF
Attribute Based Secure Information Recovery Retrieval System for Decentralize...
IRJET Journal
 
PDF
Cloud Computing Security Issues and Challenges
paperpublications3
 
PDF
Comparison of data security in grid and cloud
eSAT Publishing House
 
PDF
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
IJNSA Journal
 
PDF
Addressing Security Issues and Challenges in Mobile Cloud Computing
Editor IJCATR
 
PDF
489 493
Editor IJARCET
 
PDF
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
idescitation
 
PDF
Trusted computing for infrastructure
Ericsson
 
PDF
Cloud computing security through symmetric cipher model
ijcsit
 
PDF
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET Journal
 
PDF
IRJET - Multitenancy using Cloud Computing Features
IRJET Journal
 
PDF
70 74
Editor IJARCET
 
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
IJNSA Journal
 
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
IJCNCJournal
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Editor IJMTER
 
A study on security responsibilities and adoption in
eSAT Publishing House
 
A study on security responsibilities and adoption in cloud
eSAT Journals
 
Comparison of data security in grid and cloud computing
eSAT Journals
 
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET Journal
 
Attribute Based Secure Information Recovery Retrieval System for Decentralize...
IRJET Journal
 
Cloud Computing Security Issues and Challenges
paperpublications3
 
Comparison of data security in grid and cloud
eSAT Publishing House
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
IJNSA Journal
 
Addressing Security Issues and Challenges in Mobile Cloud Computing
Editor IJCATR
 
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
idescitation
 
Trusted computing for infrastructure
Ericsson
 
Cloud computing security through symmetric cipher model
ijcsit
 
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET Journal
 
IRJET - Multitenancy using Cloud Computing Features
IRJET Journal
 

Similar to IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Privacy of Sensitive Data (20)

PDF
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
IRJET Journal
 
PDF
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET Journal
 
PDF
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURE
cscpconf
 
PDF
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET Journal
 
PDF
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
ijtsrd
 
PDF
IRJET- Cipher Text-Policy Attribute-Based Encryption and with Delegation ...
IRJET Journal
 
PDF
An approach for secured data transmission at client end in cloud computing
IAEME Publication
 
PDF
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...
Patel Dasharathbhai
 
PDF
Shared authority based privacy preserving authentication protocol in cloud co...
Pvrtechnologies Nellore
 
PDF
Security Issues in Cloud Computing - A Review
Eswar Publications
 
PDF
5.[40 44]enhancing security in cloud computing
Alexander Decker
 
PDF
5.[40 44]enhancing security in cloud computing
Alexander Decker
 
PDF
IRJET- Secure Data Protection in Cloud Computing
IRJET Journal
 
PDF
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
IRJET Journal
 
PDF
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
IRJET Journal
 
PDF
To Improve Data Storage Security Levels in the Cloud
rahulmonikasharma
 
PDF
U04503119122
IJERA Editor
 
PDF
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
IRJET Journal
 
PDF
Enforcing multi user access policies in cloud computing
IAEME Publication
 
DOCX
A Novel privacy preserving public auditing for shared data in cloud
JAVVAJI VENKATA RAO
 
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
IRJET Journal
 
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET Journal
 
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURE
cscpconf
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET Journal
 
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
ijtsrd
 
IRJET- Cipher Text-Policy Attribute-Based Encryption and with Delegation ...
IRJET Journal
 
An approach for secured data transmission at client end in cloud computing
IAEME Publication
 
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...
Patel Dasharathbhai
 
Shared authority based privacy preserving authentication protocol in cloud co...
Pvrtechnologies Nellore
 
Security Issues in Cloud Computing - A Review
Eswar Publications
 
5.[40 44]enhancing security in cloud computing
Alexander Decker
 
5.[40 44]enhancing security in cloud computing
Alexander Decker
 
IRJET- Secure Data Protection in Cloud Computing
IRJET Journal
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
IRJET Journal
 
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
IRJET Journal
 
To Improve Data Storage Security Levels in the Cloud
rahulmonikasharma
 
U04503119122
IJERA Editor
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
IRJET Journal
 
Enforcing multi user access policies in cloud computing
IAEME Publication
 
A Novel privacy preserving public auditing for shared data in cloud
JAVVAJI VENKATA RAO
 
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
IRJET Journal
 
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
PDF
Kiona – A Smart Society Automation Project
IRJET Journal
 
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
PDF
Breast Cancer Detection using Computer Vision
IRJET Journal
 
PDF
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
PDF
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
PDF
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
PDF
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
IRJET Journal
 
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
Kiona – A Smart Society Automation Project
IRJET Journal
 
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
Breast Cancer Detection using Computer Vision
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Ad

Recently uploaded (20)

PPTX
Lecture 1 Shell and Tube Heat exchanger-1.pptx
mailforillegalwork
 
PDF
Introduction to Productivity and Quality
মোঃ ফুরকান উদ্দিন জুয়েল
 
PDF
PORTFOLIO Golam Kibria Khan — architect with a passion for thoughtful design...
MasumKhan59
 
PPTX
Hashing Introduction , hash functions and techniques
sailajam21
 
PDF
Ethics and Trustworthy AI in Healthcare – Governing Sensitive Data, Profiling...
AlqualsaDIResearchGr
 
PPTX
Arduino Based Gas Leakage Detector Project
CircuitDigest
 
PPTX
Green Building & Energy Conservation ppt
Sagar Sarangi
 
DOCX
CS-802 (A) BDH Lab manual IPS Academy Indore
thegodhimself05
 
PPTX
美国电子版毕业证南卡罗莱纳大学上州分校水印成绩单USC学费发票定做学位证书编号怎么查
Taqyea
 
PPTX
Worm gear strength and wear calculation as per standard VB Bhandari Databook.
shahveer210504
 
PPTX
Shinkawa Proposal to meet Vibration API670.pptx
AchmadBashori2
 
PPTX
Product Development & DevelopmentLecture02.pptx
zeeshanwazir2
 
PDF
Basic_Concepts_in_Clinical_Biochemistry_2018كيمياء_عملي.pdf
AdelLoin
 
PPTX
Depth First Search Algorithm in 🧠 DFS in Artificial Intelligence (AI)
rafeeqshaik212002
 
PPTX
Solar Thermal Energy System Seminar.pptx
Gpc Purapuza
 
PPTX
Heart Bleed Bug - A case study (Course: Cryptography and Network Security)
Adri Jovin
 
PPTX
GitOps_Repo_Structure for begeinner(Scaffolindg)
DanialHabibi2
 
PDF
GTU Civil Engineering All Semester Syllabus.pdf
Vimal Bhojani
 
PDF
Zilliz Cloud Demo for performance and scale
Zilliz
 
PDF
Unified_Cloud_Comm_Presentation anil singh ppt
anilsingh298751
 
Lecture 1 Shell and Tube Heat exchanger-1.pptx
mailforillegalwork
 
Introduction to Productivity and Quality
মোঃ ফুরকান উদ্দিন জুয়েল
 
PORTFOLIO Golam Kibria Khan — architect with a passion for thoughtful design...
MasumKhan59
 
Hashing Introduction , hash functions and techniques
sailajam21
 
Ethics and Trustworthy AI in Healthcare – Governing Sensitive Data, Profiling...
AlqualsaDIResearchGr
 
Arduino Based Gas Leakage Detector Project
CircuitDigest
 
Green Building & Energy Conservation ppt
Sagar Sarangi
 
CS-802 (A) BDH Lab manual IPS Academy Indore
thegodhimself05
 
美国电子版毕业证南卡罗莱纳大学上州分校水印成绩单USC学费发票定做学位证书编号怎么查
Taqyea
 
Worm gear strength and wear calculation as per standard VB Bhandari Databook.
shahveer210504
 
Shinkawa Proposal to meet Vibration API670.pptx
AchmadBashori2
 
Product Development & DevelopmentLecture02.pptx
zeeshanwazir2
 
Basic_Concepts_in_Clinical_Biochemistry_2018كيمياء_عملي.pdf
AdelLoin
 
Depth First Search Algorithm in 🧠 DFS in Artificial Intelligence (AI)
rafeeqshaik212002
 
Solar Thermal Energy System Seminar.pptx
Gpc Purapuza
 
Heart Bleed Bug - A case study (Course: Cryptography and Network Security)
Adri Jovin
 
GitOps_Repo_Structure for begeinner(Scaffolindg)
DanialHabibi2
 
GTU Civil Engineering All Semester Syllabus.pdf
Vimal Bhojani
 
Zilliz Cloud Demo for performance and scale
Zilliz
 
Unified_Cloud_Comm_Presentation anil singh ppt
anilsingh298751
 

IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Privacy of Sensitive Data

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3010 HOMOMORPHIC ENCRYPTION SCHEME IN CLOUD COMPUTING FOR SECURITY AND PRIVACY OF SENSITIVE DATA Mrs.Soniya Bastwade1, Ms. Neha D.Patil2 1,2Asst. Prof, Dept. of Computer Engg, D.Y. Patil COE, Pune, Maharashtra, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract – Nowadays privacy of our own sensitive data becomes the highest priority for people. Generally, we offer knowledge security and privacy protection through encrypted knowledge however at the expense of usability. Absolutely homomorphic cryptography permits to perform unlimited chaining of mathematical operations on encrypted knowledge creating it more secure for a few legal corporationsand establishments touse it. Encryption technology can provide data privacy security in cloud environment, but there are many problems in the process of access the data which is encrypted, because at the time of accessing encrypted data there are chances to leak our sensitive data which can be avoided into homomorphic encryption techniques. KeyWords: Cloud Computing, Security, Homomorphic, Encryption. 1. INTRODUCTION Cloud computing is revolutionizing several of our ecosystems, together with aid. Compared with earlier ways of process information, cloud computing environments offer vital edges, like the provision of automatic tools to assemble, connect, tack and reconfigure virtualized resources on demand. These build it abundant easier to satisfy structure goals as organizations will simply deploy cloud services. However, the shift in paradigm that accompanies theadoptionofcloud computing is more and more giving rise to security and privacy concerns regarding aspects of cloud computing like multi-tenancy, trust, loss of management and responsibleness [1]. Consequently cloud platforms that handle sensitive info square measure needed to deploy technical measures and structure safeguards to avoid information protection breakdowns which may end in monumental and expensive damages. Data privacyincloudcomputing maybe elementary issue nowadays. Absolutely homomorphic codin g schemes area unit extremely counseled for knowledge security in cloud computing. In fact, confidentiality of smart knowledge will be preserved although a non-trusted cloudserverprocesses it; the mystery behind this can be that absolutely homomorphic coding schemes permit process encrypted knowledge while not the necessity of a previous coding. During this paper we have a tendency to gift a brand new absolutely homomorphic coding theme from integers. Our coding theme will be used primarily to secure smart knowledge in cloud computing. The planned theme uses an oversized whole number ringas clear text house and one key for coding and coding, i.e. it's a isosceles coding theme. Isosceles coding may be a kind of processed cryptography employing a singular coding key to colour associate electronic mail. Its conversion usesa mathematical algorithmicrule together with a secret key, which ends within the inability to create sense out of a message. Isosceles coding may be a two-way algorithmic rule as a result of the mathematical algorithmic rule is reversed once decrypting the message together with mistreatment a similar secret key. Isosceles coding is additionally referred to as private- key coding and secure-key coding. LITERATURE REVIEW Authentication and Authorization In [6] the authors propose a credential classification and a framework for analyzing and developing solutions for credential management that include strategies to evaluate the complexity of cloud ecosystems. This study identifies a set of categories relevant for authentication and authorization for the cloud focusing on infrastructural organization which include classifications for credentials, and adapt those categories to the cloud context. The study also summarizes important factorsthatneedtobetakeninto consideration when adopting or developing a solution for authentication and authorization – for example, identifying the appropriate requirements, categories, services, deployment models, lifecycle, and entities. In other work, a design model formulti-factorauthentication in cloud computing environmentsisproposedin[7],and this model includes an analysis of the potential security threats in the proposed model. Another authentication solution is seen with MiLAMob [8], which provides a SaaS authentication middleware for mobile consumers of IaaS cloud applications. MiLAMob is a middleware-layer that handles the real-time authentication events on behalf of consumer devices with minimal HTTP traffic. The middleware currently supports mobile consumptionofdata on IaaS clouds such as Amazon’s S3.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3011 Identity and Access Management The important functionalities of identity management systems for the success of clouds in relation to consumer satisfaction is discussed in [9]. The authors also present an authorization system for cloud federation using Shibboleth - an open source implementation of the security assertion mark-up language (SAML) for single sign-on with different cloud providers. This solution demonstrates how organizations can outsource authentication and authorization to third party clouds using an identity management system. Stihler et al. [10] also propose an integral federatedidentitymanagementforcloudcomputing. A trust relationship between a given user and SaaS domains is required so that SaaS users can access the application and resources that are provided. In a PaaS domain, there is an interceptor that acts as a proxy to accept the user’s requests and execute them. The interceptor interacts with the secure token service (STS), and requests the security token using the WS-Trust specification. Confidentiality, Integrity, and Availability Santos et al. [11] extend the Terra [12] design that enables users to verify the integrity of VMs in the cloud. The proposed solution is called the trusted cloud computing platform (TCCP), and the whole IaaS is considered to be a single system instead of granular hosts in Terra. In this approach, all nodes run a trusted virtual machinemonitor to isolate and protect virtual machines. Users are given access to cloud servicesthroughthe cloudmanagercomponent.The external trusted entity (ETE) is another component that provides a trust coordinator service in ordertokeeptrack of the trusted VMs in a cluster. The ETE can be used to attest the security of the VMs. A TCCP guarantees confidentiality and integrity in data and computation and it also enables users to attest to the cloud service provider to ensure whether the services are secure prior to setting up their VMs. These features are based on the trusted platform module (TPM) chip. The TPM contains a private endorsement key that uniquely identifies the TPMandsome cryptographic functions that cannot be altered. Security Policy Management In [13] the authors propose a generic security management framework allowing providers of cloud data management systems to define and enforce complex security policies through a policy managementmodule.Theuseractivities are stored and monitored for each storage system,andare made available to the policy management module. Users’ actions are evaluated by a trust management module based on their past activities and are grouped as “fair” or “malicious”. An appropriate architecture for security management which satisfies the requirements of policy definitions (such as flexibility, expressiveness,extendibilityandcorrectness)has been implemented. The authors evaluated the proposed system on a data management system that is built on data storage. Takabi et al. [14] introduce policy management as a service (PMaaS) to provide userswitha unifiedcontrol point for managing access policies in order to control access to cloud resources independently of the physical location of cloud providers. PMaaS is designed specifically to solve the issue of having multiple access control authorization mechanisms employed by cloud service providers that restrict the flexibility of applying custom access control to a particular service. For this purpose, the PMaaS architecture includes a policy management service provider that is the entry point for cloud users to defineandmanagethepolicies. The cloud service provider imports theuser-definedpolicies and acts a policy decision point to enforce the user policies. PROBLEM STATEMENT Statement 1: In order to construct secure protocol for electronic voting. In election schemes, the homomorphic property provides a tool to obtainthetally giventhe encrypted votes without decrypting the individual votes and discovering voters’ identities and their personal tendency. Statement 2: To allow business users to perform multiple operations over data, stored in cloud data centres, without need of huge calculations on client’ side. Statement 3: Possibly lower expenses, whileensuringcustomer’s data privacy. Statement 4: To avoid the data leakage and provide confidentiality of sensible data can be preserved even if a non trusted cloud server processes. Statement 5: To allow processing encrypted data without the need of a prior decryption. Homomorphic Encryption: In cloud computing the major concern is about the privacy risks, because when we are storing data in cloud it will be in encrypted format and cloud computers knowswhatactually a client data is. So if the hacker get the data access then he can see all the data stored by client on cloud. It menace if we are using simple cloud computing technique to store and secure our data then there are chances to leak our data and accessed by any unauthorized person. Following fig.1 . Shows the functioning of cloud computing.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3012 Fig.1: Cloud computing Technique In homomorphic encryption cloud computers doesn’t know about data stored by clients on cloud storage. In this process we can do the homomorphic operations where we can decrypt the data without showing the original data even to cloud computers. So there is no chance to leak our sensitive data nad cannot be accessed by any other unauthorised person. Fig 2 shows how homomorphic Encryption works. Fig 2. Homomorphic Encryption Technique. EXPECTED OUTCOME An attack algorithm on the symmetric homomorphic encryption scheme proposed by Li et al. Our attack can recover the secret key from two plaintext/cipher text pairs. The computational complexity of our attack is O (log4p). To recover the entire secret key in the generated instances in several seconds when the number of homomorphic multiplications is greater than 2. Symmetric algorithm randomizes messages into integers. It is a noise free and probabilistic FHE scheme from integers, it can be used for data security in cloud computing. The security of this algorithm is based on the problem of factorization of big numbers. METHODOLOGY TO BE USE Cloud Computing with Application in private queries to a search engine, searching over encrypted data, private information retrieval(PIR), protocol PIR allows him to retrieve his wanted information’s in a saferwayandwithout the cloud server being able to determine which element was selected, protection of mobile agents againstmalicioushosts by encrypting them, secure protocol for electronic voting, and also in n traditional approachofadvertisement,a mobile device sends a user’s location to a provider, who sends customized ads, such as discount vouchersfor nearby shops, back to the user. REFERENCES [1] R. Rivest, L. Adleman and M. Dertouzos, "On Data Banks and Privacy Homorphisms," In Foundataions of Secure Computataion,Academic Press, pp. 169-179, 1978. [2] C. Gentry, "A fully homomorphic encryption scheme,"https://crypto.stanford.edu/craig/craig-thesis.pdf, September 2009. [3] K. Lauter, M. Naehrig et V. Vaikuntanathan, «Can homomorphic encryption be practical?,»available athttps://eprint.iacr.org/2011/405.pdf. [4] Z. Brakerski et V. Vaikantanathan, “ Efficient Fully HomomorphicEncryption from (Standard) LWE”, Available at http://eprint.iacr.org/2011/344. [5] C. Gentry, S. Halevi et N. Smart, “Fully Homomorphic Encryption with Polylog Overhead,” available athttps://eprint.iacr.org/2011/566.pdf. [6] N. Mimura Gonzalez, M. Torrez Rojas, M. Maciel da Silva, F. Redigolo, T. Melo de Brito Carvalho, C. Miers, M. Naslund, and A. Ahmed, “A framework for authentication and authorization credentials in cloud computing,” in Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on, pp. 509–516, July 2013. [7] R. Banyal, P. Jain, and V. Jain, “Multi-factor authentication framework for cloud computing,” in Computational Intelligence, Modelling and Simulation (CIMSim), 2013Fifth International Conference on, pp. 105–110, Sept 2013. [8] R. Lomotey and R. Deters, “Saas authentication middleware for mobile consumers of iaas cloud,” in Services (SERVICES), 2013 IEEE Ninth World Congress on, pp. 448– 455, June 2013. [9] M. A. Leandro, T. J. Nascimento, D. R. dos Santos, C. M. Westphall, and C. B. Westphall, “Multitenancy authorization system with federated identity for cloud-based environments using shibboleth,” in Proceedings of the 11th
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3013 International Conference on Networks, ICN 2012,pp.88–93, 2012. [10] M. Stihler, A. Santin, A. Marcon, and J. Fraga, “Integral federated identity management for cloud computing,” in New Technologies, Mobility and Security (NTMS), 2012 5th International Conference on, pp. 1–5, May 2012. [11] N. Santos, K. P. Gummadi, and R. Rodrigues, “Towards trusted cloud computing,” in Proceedings of the 2009 Conference on Hot Topics in Cloud Computing, HotCloud’09, (Berkeley, CA, USA), USENIX Association, 2009. [12] T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh, “Terra: A virtual machine-based platform for trusted computing,” in Proceedings of the Nineteenth ACM Symposium on OperatingSystemsPrinciples,SOSP’03,(New York, NY, USA), pp. 193–206, ACM, 2003. [13] C. Basescu, A. Carpen-Amarie, C. Leordeanu, A. Costan, and G. Antoniu, “Managing data access on clouds: A generic framework for enforcing security policies,” in Advanced InformationNetworkingand Applications(AINA),2011IEEE International Conference on, pp. 459–466, March 2011. [14] H. Takabi and J. Joshi, “Policy management as a service: An approach to manage policy heterogeneity in cloud computing environment,” in System Science (HICSS), 2012 45th Hawaii International Conference on, pp. 5500–5508, Jan 2012.