Optimizing Fully Homomorphic Encryption Algorithm using Greedy Approach in Cloud Computing

نویسندگان

  • Kirandeep Kaur
  • Jyotsna Sengupta
چکیده

With the rapid growth of cloud computing, many users store their data and application on the cloud. However, the growth of cloud computing is slowed down by cloud security problem. Hence, cloud computing security becomes the current research focus. To secure the cloud data, encryption is used. Traditional encryption schemes cannot make cloud computing fully safe. Therefore, Fully homomorphic encryption is used to secure the data from exploitation during computation. In this paper, Fully Homomorphic Encryption (FHE) encryption scheme is optimized in which the time complexity and space used by encrypted data is reduced using Greedy approach. Greedy approach is applied to the input data that is tokenized. On this data, greedy approach will find out the max cost data that is to be encrypted first, but with a condition that it may utilize the full capacity of resources. The proposed approach that is Greedy based FHE provides better results as compared to the existing FHE encryption algorithm.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing

While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called fully homomorphic encryption, yet the overhead is so high that it is not considered a viable s...

متن کامل

Two-tier Architecture to Improve Performance of Fully Homomorphic Encryption Security Mechanism

Although Cloud Computing has performed lots of advancements in improving technology used in various fields, but still there exists many security threats to data and cloud resources which reduces the performance of cloud computing environment. Fully Homomorphic Encryption empowers one of the advanced solutions against cloud security threats. The basic approach of this scheme is to allow arbitrar...

متن کامل

To Enhance Homomorphic Encryption scheme for Key Management and Key Sharing in Cloud Computing

The cloud can offer services to the users at lower cost and services are available at anytime, anywhere, user data security is the main challenge in cloud computing. The data encryption is the best way for providing data security in cloud computing. Fully homomorphic encryption scheme is reliable and secure encryption technique. The main problem with fully disk encryption scheme is key manageme...

متن کامل

Comparison-based Applications for Fully Homomorphic Encrypted Data

The cloud computing providers need to offer security warranties. As we all know, one of the critical points is the confidentiality and access to customer data which, these days, is migrated and managed in cloud environments. In this sense, one solution is based on encrypting data before its upload in cloud. But this approach sets a limit regarding data processing. In this article we present a p...

متن کامل

Practical Applications of Homomorphic Encryption

Homomorphic cryptography has been one of the most interesting topics of mathematics and computer security since Gentry presented the first construction of a fully homomorphic encryption (FHE) scheme in 2009. Since then, a number of different schemes have been found, that follow the approach of bootstrapping a fully homomorphic scheme from a somewhat homomorphic foundation. All existing implemen...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017