Internet of Things and Cloud Computing
Volume 4, Issue 2, April 2016, Pages: 13-18
Received: Apr. 6, 2016;
Accepted: Apr. 29, 2016;
Published: May 12, 2016
Views 8115 Downloads 361
Ihsan Jabbar, Department of Computer Science, University of Mustansiriyah, Baghdad, Iraq
Saad Najim, Department of Computer Science, University of Mustansiriyah, Baghdad, Iraq
The concept of cloud computing receiving a great deal of attention both in publication and among users. Cloud computing is the delivery of computing services over the Internet. Cloud services allow individuals and businesses to use software and hardware resources that are managed by cloud providers at remote locations. The distance between the client and the physical location of his data creates a barrier because this data can be accessed by a third party and this would affect the privacy of client’s data. The using of traditional encryption schemes to encrypt the remoted data before sending to the cloud provider has been most widely used technique to bridge this security gab. But, the client will need to provide the private key to the server to decrypt the data before perform the calculations required. Homomorphic encryption allows to perform computations on encrypted data without decryption. This paper deals with the use of homomorphic encryption to encrypt the client’s data in cloud server and also it enables to execute required computations on this encrypted data.
Using Fully Homomorphic Encryption to Secure Cloud Computing, Internet of Things and Cloud Computing.
Vol. 4, No. 2,
2016, pp. 13-18.
P. Mell, T. Grance, “The NIST Definition of Cloud Computing,” National Institute of Standards and Technology, U. S. Department of Commerce, (2011).
K. Lauter, M. Naehrig, V. Vaikuntanathan, “Can Homomorphic Encryption be Practical?”, CCSW' 11, Chicago, llinois, USA, pp. 113–124, (2011).
Craig Gentry, “Fully homomorphic encryption using ideal lattice”, in Proceedings of STOC’09, (2009).
M. van Dijk, C. Gentry, S. Halevi, V. Vaikuntanathan, “Fully homomorphic encryption over the Integers”, in Proceedings of Advances in Cryptology, EUROCRYPT’10, pages 24–43, 2010.
Craig Gentry, “Computing arbitrary functions of encrypted data”, Communications of The ACM, 53(3): 97-105, (2010).
J. Li, D. Song, S. Chen, X. Lu, “A Simple Fully Homomorphic Encryption Scheme Available in Cloud Computing”, In Proceeding of IEEE, (2012).
Baohua Chen, Na Zhao, “Fully Homomorphic Encryption Application in Cloud Computing”, in Wavelet Active Media Technology and Information Processing (ICCWAMTIP), 11th International Computer Conference, (2014).
Yan Zhang, Li Zhou, Yuanfan Peng, Jing Zhang, “A secure Image Retrieval Method Based on Homomorphic Encryption for Cloud Computing”, in proceedings of the 19th International Conference on Digital Signal Processing, (2014).
Ovunc Kocabas, Tolga Soyata, “Utilizing Homomorphic Encryption to Implement Secure and Private Medical Cloud Computing”, in 8th International Conference on Cloud Computing, IEEE, (2015).
Shu Qin Ren, Benjamin Hong Meng Tan, Sivaraman Sundaram, Taining Wang, Yibin Ng,Chang Victor, Khin Mi Mi Aung, “Secure searching on cloud storage enhanced by homomorphic indexing”, Future Generation Computer Systems, Elsevier, (2016).
Maha Tebaa, Said El Haji, “Secure Cloud Computing through Homomorphic Encryption”, International Journal of Advancements in Computing Technology (IJACT), (2013).
Aderemi A. Atayero, Oluwaseyi Feyisetan, “Security Issues in Cloud Computing: The Potentials of Homomorphic Encryption”, Jornal of Emerging Trends in Computing and Information Sciences, (2011).
R. Rivest, I. Adleman, M. Dertouzos, “On Data Banks and Privacy Homomorphisms“, Foundations of Secure Communication, (1978).
S. Goldwasser, S. Micali, “Probabilistic encryption and how to play mental poker keeping secret all partial information”, in Proceedings of 14th Symposium on Theory of Computing, (1982).
Pascal Paillier, “Public-key cryptosystems based on composite degree residuosity classes”, (1999).
D. Boneh, E. Goh, and K. Nissim, “Evaluating 2-DNF formulas on ciphertexts”, in Proceedings of Theory of Cryptography, TCC’05, (2005).
Xing Guangli, Chen Xinmeng, Zhu Ping, Ma Jie, “A method of Homomorphic Encryption”, Wuhan University Journal of Natural Sciences, Vol. 11, No. 1, pp. 181-184, (2006).
R. Rivest, A. Shamir, and L. Adleman., “A Method for Obtaining Digital Signatures and Public Key Cryptosystems”, in Communications of the ACM 21.2, pages 120–126, (1978).
Eyad Saleh, “Processing Over Encrypted Data: Between Theory and Practice”, Proceedings of the 8th Ph. D. Retreat of the HPI Research School on Service-oriented Systems Engineering, (2015).
Brian Hayes, “Alice and Bob in Cipherspace”, American Scientist, Volume 100, (2012)
Jaydip Sen, “Homomorphic encryption: theory & Application”, In Tech, Theory and Practice of Cryptography and Network Security Protocols and Technologies, (2013).
S. Hemalatha, R. Manickachezian, “Perfomance of Ring Based Fully Homomorphic Encryption for securing data in Cloud Computing”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 3, Issue 11, (2014).