Skip to main content
Top

2017 | OriginalPaper | Chapter

Enhanced Database Security Using Homomorphic Encryption

Authors : Connor Røset, Van Warren, Chia-Chu Chiang

Published in: Information Science and Applications 2017

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

When sensitive data is stored on publicly available areas, privacy of that data becomes a concern. Organizations may wish to move data to public servers so the data is more accessible by their employees or consumers. It is important that this data be encrypted to ensure it remains confidential and secure. When this data is encrypted, it becomes difficult or impossible to perform calculations on a publicly stored database. A solution to this is homomorphic encryption, which allows an unlimited number of computations on encrypted data. This project analyzes an N-tier rotation scheme which allows an unlimited number of addition and subtractions of encrypted data, along with an unlimited number of scalar multiplications and divisions. This scheme is inspired by a combination lock and features multiple levels of security depth. The result of the proposed algorithm is a fast encryption scheme which allows data to be manipulated post encryption.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
go back to reference Gentry, C.: A fully homomorphic encryption scheme, Ph.D. Dissertation, Department of Computer Science, Stanford University, September 2009a Gentry, C.: A fully homomorphic encryption scheme, Ph.D. Dissertation, Department of Computer Science, Stanford University, September 2009a
go back to reference Gentry, C.: Fully homomorphic encryption using ideal lattices. In: STOC 2009, Proceedings of the 41st Annual ACM Symposium on Theory of Computing, pp. 169–178 (2009b) Gentry, C.: Fully homomorphic encryption using ideal lattices. In: STOC 2009, Proceedings of the 41st Annual ACM Symposium on Theory of Computing, pp. 169–178 (2009b)
go back to reference Gentry, C., Halevi, S., Smart, N.P.: Homomorphic evaluation of the AES circuit. In: Cryptography ePrint Archives, Report 2012/099 (2012) Gentry, C., Halevi, S., Smart, N.P.: Homomorphic evaluation of the AES circuit. In: Cryptography ePrint Archives, Report 2012/099 (2012)
go back to reference Howard, R: Parallel processing of fully homomorphic encryption for a cloud environment. In: A thesis Submitted to the Graduate School of University of Arkansas at Little Rock, p. 38, May 2013 Howard, R: Parallel processing of fully homomorphic encryption for a cloud environment. In: A thesis Submitted to the Graduate School of University of Arkansas at Little Rock, p. 38, May 2013
go back to reference Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Proceedings of the 18th EUROCRYPT, pp. 223–238, Prague, Czech Republic, May 1999 Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Proceedings of the 18th EUROCRYPT, pp. 223–238, Prague, Czech Republic, May 1999
go back to reference Pfleeger, C., Pfleeger, S.: Security in Computing. Prentice Hall PTR, Upper Saddle River (2006)MATH Pfleeger, C., Pfleeger, S.: Security in Computing. Prentice Hall PTR, Upper Saddle River (2006)MATH
go back to reference Lauter, K., Naehrig, M., Vaikuntanathan, V.: Can homomorphic encryption be practical? In: Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop, pp. 113–124 (2011) Lauter, K., Naehrig, M., Vaikuntanathan, V.: Can homomorphic encryption be practical? In: Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop, pp. 113–124 (2011)
go back to reference Rivest, R.L., Adleman, L., Dertouzos, M.L.: On data banks and privacy homomorphism. Found. Secure Comput. 4(11), 169–180 (1978)MathSciNet Rivest, R.L., Adleman, L., Dertouzos, M.L.: On data banks and privacy homomorphism. Found. Secure Comput. 4(11), 169–180 (1978)MathSciNet
go back to reference Warren, L.V.: AddSubMulDivia: Volume 5 – Homomorphic Shape Encryption, Kindkle edn. Amazon Digital Services LLC, Seattle (2016) Warren, L.V.: AddSubMulDivia: Volume 5 – Homomorphic Shape Encryption, Kindkle edn. Amazon Digital Services LLC, Seattle (2016)
go back to reference Wooldridge, Nivens, Chiang: Securing databases with a combination of encryption and information hiding. Computer Science Department at the University of Arkansas at Little Rock (2016) Wooldridge, Nivens, Chiang: Securing databases with a combination of encryption and information hiding. Computer Science Department at the University of Arkansas at Little Rock (2016)
Metadata
Title
Enhanced Database Security Using Homomorphic Encryption
Authors
Connor Røset
Van Warren
Chia-Chu Chiang
Copyright Year
2017
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-4154-9_44