Skip to main content

2024 | OriginalPaper | Buchkapitel

Implementation of Homomorphic Encryption Schemes in Fog Computing

verfasst von : Shraiyash Pandey, Bharat Bhushan, Alaa Ali Hameed, Akhtar Jamil, Aayush Juyal

Erschienen in: Computing, Internet of Things and Data Analytics

Verlag: Springer Nature Switzerland

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In today's date, fog computing is on the rise due to its characteristics. Its ability to provide smart devices with close-by computing capabilities offers a drastic reduction in cloud traffic and more efficient data transfer. However, data security in fog computing devices is a major concern. Homomorphic Encryption (HME) Scheme is a technique that protects private data from various threats, and to improve efficiency and reduce time, it offers modification of original data after encryption without decrypting it. In this paper, we explore the various homomorphic encryption schemes that can be implemented in fog computing to protect the data and provide data security. We present a detailed architecture and various characteristics of fog computing to better visualize the use of homomorphic encryption in different areas. Further, we present the applications of homomorphic encryption in different sectors and discuss future research directions.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Varshney, M., Bhushan, B., Haque, A.K.M.B.: Big Data Analytics and Data Mining for Healthcare Informatics (HCI). In: Kumar, R., Sharma, R., Pattnaik, P.K. (eds.) Multimedia Technologies in the Internet of Things Environment, Volume 3. Studies in Big Data, vol 108. Springer, Singapore (2022). https://doi.org/10.1007/978-981-19-0924-5_11 Varshney, M., Bhushan, B., Haque, A.K.M.B.: Big Data Analytics and Data Mining for Healthcare Informatics (HCI). In: Kumar, R., Sharma, R., Pattnaik, P.K. (eds.) Multimedia Technologies in the Internet of Things Environment, Volume 3. Studies in Big Data, vol 108. Springer, Singapore (2022). https://​doi.​org/​10.​1007/​978-981-19-0924-5_​11
3.
5.
Zurück zum Zitat Coron, J.S., Lepoint, T., Tibouchi, M.: Practical multilinear maps over the integers. In: Annual Cryptology Conference, pp. 476–493. Springer, Berlin, Heidelberg (2013, August) Coron, J.S., Lepoint, T., Tibouchi, M.: Practical multilinear maps over the integers. In: Annual Cryptology Conference, pp. 476–493. Springer, Berlin, Heidelberg (2013, August)
6.
Zurück zum Zitat Rivest, R.L., Adleman, L., Dertouzos, M.L.: On data banks and privacy homomorphisms. Foundations of Secure Computation 4(11), 169–180 (1978)MathSciNet Rivest, R.L., Adleman, L., Dertouzos, M.L.: On data banks and privacy homomorphisms. Foundations of Secure Computation 4(11), 169–180 (1978)MathSciNet
7.
Zurück zum Zitat ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31(4), 469–472 (1985)MathSciNetCrossRef ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31(4), 469–472 (1985)MathSciNetCrossRef
8.
Zurück zum Zitat Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. Eurocrypt 99, 223–238 (1999, May) Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. Eurocrypt 99, 223–238 (1999, May)
10.
Zurück zum Zitat Liu, C., Xiang, F., Wang, P., Sun, Z.: A review of issues and challenges in fog computing environment. In: 2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), pp. 232–237. Fukuoka, Japan (2019). https://doi.org/10.1109/DASC/PiCom/CBDCom/CyberSciTech.2019.00050. Liu, C., Xiang, F., Wang, P., Sun, Z.: A review of issues and challenges in fog computing environment. In: 2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), pp. 232–237. Fukuoka, Japan (2019). https://​doi.​org/​10.​1109/​DASC/​PiCom/​CBDCom/​CyberSciTech.​2019.​00050.
11.
Zurück zum Zitat Zhang, Y., et al.: Privacy-preserving data aggregation against false data injection attacks in fog computing. Sensors 18(8), 2659 (2018)CrossRef Zhang, Y., et al.: Privacy-preserving data aggregation against false data injection attacks in fog computing. Sensors 18(8), 2659 (2018)CrossRef
12.
Zurück zum Zitat Stallings, W.: Cryptography and network security: principles and practice, international edition: principles and practice. Pearson Higher Ed (2014) Stallings, W.: Cryptography and network security: principles and practice, international edition: principles and practice. Pearson Higher Ed (2014)
13.
Zurück zum Zitat Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proceedings of the forty-first annual ACM symposium on Theory of computing, pp. 169–178 (2009, May) Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proceedings of the forty-first annual ACM symposium on Theory of computing, pp. 169–178 (2009, May)
14.
Zurück zum Zitat Lyubashevsky, V., Peikert, C., Regev, O.: On ideal lattices and learning with errors over rings. J. ACM (JACM) 60(6), 1–35 (2013)MathSciNetCrossRef Lyubashevsky, V., Peikert, C., Regev, O.: On ideal lattices and learning with errors over rings. J. ACM (JACM) 60(6), 1–35 (2013)MathSciNetCrossRef
15.
Zurück zum Zitat Fau, S., Sirdey, R., Fontaine, C., Aguilar-Melchor, C., Gogniat, G.: Towards practical program execution over fully homomorphic encryption schemes. In: 2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, pp. 284–290. IEEE (2013, October) Fau, S., Sirdey, R., Fontaine, C., Aguilar-Melchor, C., Gogniat, G.: Towards practical program execution over fully homomorphic encryption schemes. In: 2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, pp. 284–290. IEEE (2013, October)
16.
Zurück zum Zitat Abdalla, S., Hassan, M.S., Landolsi, T., Abu-Rukba, R.: On the performance of fog-cloud computing for real-time surveillance applications. In: 2020 International Conference on Communications, Signal Processing, and their Applications (ICCSPA), pp. 1–4. Sharjah, United Arab Emirates (2021). https://doi.org/10.1109/ICCSPA49915.2021.9385745 Abdalla, S., Hassan, M.S., Landolsi, T., Abu-Rukba, R.: On the performance of fog-cloud computing for real-time surveillance applications. In: 2020 International Conference on Communications, Signal Processing, and their Applications (ICCSPA), pp. 1–4. Sharjah, United Arab Emirates (2021). https://​doi.​org/​10.​1109/​ICCSPA49915.​2021.​9385745
17.
19.
Zurück zum Zitat Bhushan, B., Kadam, K., Parashar, R., Kumar, S., Thakur, A.K.: Leveraging blockchain technology in sustainable supply chain management and logistics. In: Muthu, S.S. (ed.) Blockchain Technologies for Sustainability. Environmental Footprints and Eco-design of Products and Processes. Springer, Singapore (2022). https://doi.org/10.1007/978-981-16-6301-7_9 Bhushan, B., Kadam, K., Parashar, R., Kumar, S., Thakur, A.K.: Leveraging blockchain technology in sustainable supply chain management and logistics. In: Muthu, S.S. (ed.) Blockchain Technologies for Sustainability. Environmental Footprints and Eco-design of Products and Processes. Springer, Singapore (2022). https://​doi.​org/​10.​1007/​978-981-16-6301-7_​9
Metadaten
Titel
Implementation of Homomorphic Encryption Schemes in Fog Computing
verfasst von
Shraiyash Pandey
Bharat Bhushan
Alaa Ali Hameed
Akhtar Jamil
Aayush Juyal
Copyright-Jahr
2024
DOI
https://doi.org/10.1007/978-3-031-53717-2_42

Premium Partner