Optimizing Fully Homomorphic Encryption Algorithm using Greedy Approach in Cloud Computing
نویسندگان
چکیده
With the rapid growth of cloud computing, many users store their data and application on the cloud. However, the growth of cloud computing is slowed down by cloud security problem. Hence, cloud computing security becomes the current research focus. To secure the cloud data, encryption is used. Traditional encryption schemes cannot make cloud computing fully safe. Therefore, Fully homomorphic encryption is used to secure the data from exploitation during computation. In this paper, Fully Homomorphic Encryption (FHE) encryption scheme is optimized in which the time complexity and space used by encrypted data is reduced using Greedy approach. Greedy approach is applied to the input data that is tokenized. On this data, greedy approach will find out the max cost data that is to be encrypted first, but with a condition that it may utilize the full capacity of resources. The proposed approach that is Greedy based FHE provides better results as compared to the existing FHE encryption algorithm.
منابع مشابه
SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing
While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called fully homomorphic encryption, yet the overhead is so high that it is not considered a viable s...
متن کاملTwo-tier Architecture to Improve Performance of Fully Homomorphic Encryption Security Mechanism
Although Cloud Computing has performed lots of advancements in improving technology used in various fields, but still there exists many security threats to data and cloud resources which reduces the performance of cloud computing environment. Fully Homomorphic Encryption empowers one of the advanced solutions against cloud security threats. The basic approach of this scheme is to allow arbitrar...
متن کاملTo Enhance Homomorphic Encryption scheme for Key Management and Key Sharing in Cloud Computing
The cloud can offer services to the users at lower cost and services are available at anytime, anywhere, user data security is the main challenge in cloud computing. The data encryption is the best way for providing data security in cloud computing. Fully homomorphic encryption scheme is reliable and secure encryption technique. The main problem with fully disk encryption scheme is key manageme...
متن کاملComparison-based Applications for Fully Homomorphic Encrypted Data
The cloud computing providers need to offer security warranties. As we all know, one of the critical points is the confidentiality and access to customer data which, these days, is migrated and managed in cloud environments. In this sense, one solution is based on encrypting data before its upload in cloud. But this approach sets a limit regarding data processing. In this article we present a p...
متن کاملPractical Applications of Homomorphic Encryption
Homomorphic cryptography has been one of the most interesting topics of mathematics and computer security since Gentry presented the first construction of a fully homomorphic encryption (FHE) scheme in 2009. Since then, a number of different schemes have been found, that follow the approach of bootstrapping a fully homomorphic scheme from a somewhat homomorphic foundation. All existing implemen...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017