Skip to main content
Top
Published in: Cluster Computing 2/2017

29-03-2017

Secure and efficient online data storage and sharing over cloud environment using probabilistic with homomorphic encryption

Authors: N. Jayapandian, A. M. J. Md. Zubair Rahman

Published in: Cluster Computing | Issue 2/2017

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Cloud computing is one of the great tasks in the business world nowadays, which provides shared processing resources. In cloud area network, security is the main challenge faced by cloud providers and their customers. The advantage of cloud computing includes reduced cost, re-provisioning of resources etc. The cloud network makes use of standard encryption method to secure documents while storing in online. In this paper, we have depicted two efficient encryption algorithms that meet security demand in cloud. Probabilistic encryption, one of these algorithms may be used to produce randomness of text encryption. With this algorithm, if the same message is encrypted twice it should yield different secret coded texts on both calculations. Another crucial algorithm is homomorphic encryption, is a cryptographic method to define the sample system and to provide a software implementation. In order to maintain quality of service (QoS) and improve customer satisfaction, we are going to propose an efficient algorithm which combines the characteristics of both probabilistic and homomorphic encryption techniques, to provide high level of security. Our proposed scheme will yield better encryption techniques reduce security attacks, increased throughput and improve the QoS.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Glenn, R., Kent, S.: The NULL Encryption Algorithm and Its Use with IPsec. NIST and BBN Corp. (1998) Glenn, R., Kent, S.: The NULL Encryption Algorithm and Its Use with IPsec. NIST and BBN Corp. (1998)
2.
go back to reference Luna, J., Abdallah, C.T., Heileman, G.L.: Probabilistic optimization of resource distribution and encryption for data storage in the cloud. IEEE Trans. Cloud Comput. 6(1), 1–13. doi:10.1109/TCC.2016.2543728 Luna, J., Abdallah, C.T., Heileman, G.L.: Probabilistic optimization of resource distribution and encryption for data storage in the cloud. IEEE Trans. Cloud Comput. 6(1), 1–13. doi:10.​1109/​TCC.​2016.​2543728
3.
go back to reference Park, N.: Secure data access control scheme using type-based re-encryption in cloud environment. In: Semantic Methods for Knowledge Management and Communication, pp. 319–327. Springer, Berlin (2011) Park, N.: Secure data access control scheme using type-based re-encryption in cloud environment. In: Semantic Methods for Knowledge Management and Communication, pp. 319–327. Springer, Berlin (2011)
4.
go back to reference Bendlin, R., Damgård, I., Orlandi, C., Zakarias, S.: Semi-homomorphic encryption and multiparty computation.’ In: Advances in Cryptology–EUROCRYPT 2011, pp. 169–188. Springer, Berlin (2011) Bendlin, R., Damgård, I., Orlandi, C., Zakarias, S.: Semi-homomorphic encryption and multiparty computation.’ In: Advances in Cryptology–EUROCRYPT 2011, pp. 169–188. Springer, Berlin (2011)
5.
go back to reference Fontaine, C., Galand, F.: A survey of homomorphic encryption for nonspecialists. EURASIP J. Inf. Secur. 2007, 15 (2007) Fontaine, C., Galand, F.: A survey of homomorphic encryption for nonspecialists. EURASIP J. Inf. Secur. 2007, 15 (2007)
6.
go back to reference Van Dijk, M., Gentry, C., Halevi, S., Vaikuntanathan, V.: Fully homomorphic encryption over the integers. In: Advances in Cryptology—EUROCRYPT 2010, pp. 24–43. Springer, Berlin (2010) Van Dijk, M., Gentry, C., Halevi, S., Vaikuntanathan, V.: Fully homomorphic encryption over the integers. In: Advances in Cryptology—EUROCRYPT 2010, pp. 24–43. Springer, Berlin (2010)
7.
go back to reference Koo, D., Hur, J., Yoon, H.: Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage. Comput. Electr. Eng. 39(1), 34–46 (2013)CrossRef Koo, D., Hur, J., Yoon, H.: Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage. Comput. Electr. Eng. 39(1), 34–46 (2013)CrossRef
8.
go back to reference De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Pelosi, G., Samarati, P.: Encryption-based policy enforcement for cloud storage. In: 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops (ICDCSW), pp. 42–51. IEEE (2010) De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Pelosi, G., Samarati, P.: Encryption-based policy enforcement for cloud storage. In: 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops (ICDCSW), pp. 42–51. IEEE (2010)
9.
go back to reference Micciancio, D.: A first glimpse of cryptography’s holy grail. Commun. ACM 5(3), 96–97 (2010)CrossRef Micciancio, D.: A first glimpse of cryptography’s holy grail. Commun. ACM 5(3), 96–97 (2010)CrossRef
10.
go back to reference Rivest, R., Scribe Ledlie: Lecture Notes 15: Voting, Homomorphic Encryption (2002) Rivest, R., Scribe Ledlie: Lecture Notes 15: Voting, Homomorphic Encryption (2002)
11.
go back to reference Gong, L., Li, S., Mao, Q., Wang, D., Dou, J.: A homomorphic encryption scheme with adaptive chosen ciphertext security but without random oracle. Theor. Comput. Sci. 609, 253–261 (2016)MathSciNetCrossRefMATH Gong, L., Li, S., Mao, Q., Wang, D., Dou, J.: A homomorphic encryption scheme with adaptive chosen ciphertext security but without random oracle. Theor. Comput. Sci. 609, 253–261 (2016)MathSciNetCrossRefMATH
12.
go back to reference Pasupuleti, S.K., Ramalingam, S., Buyya, R.: An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing. J. Netw. Comput. Appl. 64, 12–22 (2016)CrossRef Pasupuleti, S.K., Ramalingam, S., Buyya, R.: An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing. J. Netw. Comput. Appl. 64, 12–22 (2016)CrossRef
13.
go back to reference Delfs, H., Knebl, H.: Symmetric-key encryption. In: Introduction to Cryptography, pp. 11–31. Springer, Berlin (2007) Delfs, H., Knebl, H.: Symmetric-key encryption. In: Introduction to Cryptography, pp. 11–31. Springer, Berlin (2007)
14.
go back to reference Mullen, G.L., Mummert, C.: Finite Fields and Applications. Student Mathematical Library, vol. 41, pp. 19–20. American Mathematical Society, Providence (2007) Mullen, G.L., Mummert, C.: Finite Fields and Applications. Student Mathematical Library, vol. 41, pp. 19–20. American Mathematical Society, Providence (2007)
15.
go back to reference Paar, C., Pelzl, J.: Understanding Cryptography: A Textbook for Students and Practitioners. Springer, New York (2009)MATH Paar, C., Pelzl, J.: Understanding Cryptography: A Textbook for Students and Practitioners. Springer, New York (2009)MATH
16.
go back to reference Daemen, J., Rijmen, V.: AES proposal: Rijndael (1999) Daemen, J., Rijmen, V.: AES proposal: Rijndael (1999)
17.
go back to reference Schwartz, J.: US selects a new encryption technique. N. Y. Times 3 (2000) Schwartz, J.: US selects a new encryption technique. N. Y. Times 3 (2000)
18.
go back to reference Westlund, H.B.: NIST reports measurable success of Advanced Encryption Standard. J. Res. Natl Inst. Stand. Technol. 1, 56–57 (2002) Westlund, H.B.: NIST reports measurable success of Advanced Encryption Standard. J. Res. Natl Inst. Stand. Technol. 1, 56–57 (2002)
19.
go back to reference Katz, J., Yung, M.: Unforgeable encryption and chosen ciphertext secure modes of operation. In: International Workshop on Fast Software Encryption, pp. 284–299. Springer, Berlin (2000) Katz, J., Yung, M.: Unforgeable encryption and chosen ciphertext secure modes of operation. In: International Workshop on Fast Software Encryption, pp. 284–299. Springer, Berlin (2000)
20.
go back to reference Baldi, M., Bianchi, M., Chiaraluce, F., Rosenthal, J., Schipani, D.: Enhanced public key security for the McEliece cryptosystem. J. Cryptol. 29(1), 1–27 (2016)MathSciNetCrossRefMATH Baldi, M., Bianchi, M., Chiaraluce, F., Rosenthal, J., Schipani, D.: Enhanced public key security for the McEliece cryptosystem. J. Cryptol. 29(1), 1–27 (2016)MathSciNetCrossRefMATH
21.
go back to reference Lee, C.-C., Chung, P.-S., Hwang, M.-S.: A survey on attribute-based encryption schemes of access control in cloud environments. IJ Netw. Secur. 15(4), 231–240 (2013) Lee, C.-C., Chung, P.-S., Hwang, M.-S.: A survey on attribute-based encryption schemes of access control in cloud environments. IJ Netw. Secur. 15(4), 231–240 (2013)
Metadata
Title
Secure and efficient online data storage and sharing over cloud environment using probabilistic with homomorphic encryption
Authors
N. Jayapandian
A. M. J. Md. Zubair Rahman
Publication date
29-03-2017
Publisher
Springer US
Published in
Cluster Computing / Issue 2/2017
Print ISSN: 1386-7857
Electronic ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-017-0809-4

Other articles of this Issue 2/2017

Cluster Computing 2/2017 Go to the issue

Premium Partner