A Comparative Study of Homomorphic and Searchable Encryption Schemes for Cloud Computing

نویسندگان

  • B. T. Prasanna
  • C. B. Akki
چکیده

Cloud computing is a popular distributed network and utility model based technology. Since in cloud the data is outsourced to third parties, the protection of confidentiality and privacy of user data becomes important. Different methods for securing the data in cloud have been proposed by researchers including but not limited to Oblivious RAM, Searchable Encryption, Functional Encryption, Homomorphic Encryption etc. This paper focuses on Searchable and Homomorphic Encryption methods. Finally, a comparative study of these two efficient cloud cryptographic methods has been carried out and given here. KeywordsCloud Computing; Security; Homomorphic Encryption; Searchable Encryption I. SECURITY IN CLOUD COMPUTING Cloud Computing is a distributed network meant for providing service by cloud provider to the consumers on rental basis [1]. Owners of data store their data in cloud which therefore need to be secured. By storing data in encrypted form, one can maintain the confidentiality and privacy of data in cloud. Many cryptographic methods have been devised to address the issue of confidentiality and privacy of owner’s data in cloud. An in-depth survey has been done on cloud related security issues, challenges and cryptographic algorithms by Prasanna and Akki [2]. Among them homomorphic and searchable encryption methods are most popular, where one can perform computation and search on ciphertext without disclosing plaintext. The authors focus more on these two techniques in this paper. The paper is organized as follows: Section 2 discusses criteria’s used for developing Homomorphic Encryption methods. The section also briefs some of the known Fully Homomorphic Encryption methods and their corresponding technologies used. Section 3 focuses on related work on Searchable Encryption methods and different criteria’s used to categorize them. Section 4 compares different known cloud cryptographic methods using efficiency and security as parameters. Section 5 concludes with an utter need of efficient cryptographic methods like Searchable Encryption for further study and research. II. HOMOMORPHIC ENCRYPTION In cloud, the primary concern is of maintaining both confidentiality and privacy of owner’s data from untrusted users. The concept of homomorphism introduced in 1978, by Rivest et al [3], can be used for securing the data stored in cloud from unauthorized users. Two messages m1 and m2 are encrypted by using any known encryption method E with public or private key pk, where C1 and C2 are their corresponding ciphertexts (i.e. C1= Epk (m1) and C2= Epk (m2)). The HE scheme performs computation like addition, multiplication etc. between C1 and C2 without decryption. The obtained result is also in encrypted form. The general architecture of the HE scheme is shown in figure 1.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing

While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called fully homomorphic encryption, yet the overhead is so high that it is not considered a viable s...

متن کامل

Browse searchable encryption schemes: Classification, methods and recent developments

With the advent of cloud computing, data owners tend to submit their data to cloud servers and allow users to access data when needed. However, outsourcing sensitive data will lead to privacy issues. Encrypting data before outsourcing solves privacy issues, but in this case, we will lose the ability to search the data. Searchable encryption (SE) schemes have been proposed to achieve this featur...

متن کامل

Fuzzy retrieval of encrypted data by multi-purpose data-structures

The growing amount of information that has arisen from emerging technologies has caused organizations to face challenges in maintaining and managing their information. Expanding hardware, human resources, outsourcing data management, and maintenance an external organization in the form of cloud storage services, are two common approaches to overcome these challenges; The first approach costs of...

متن کامل

DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation

Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...

متن کامل

MuSE: Multimodal Searchable Encryption for Cloud Applications

In this paper we tackle the practical challenges of searching encrypted multimodal data (i.e. data containing multiple media formats), stored in public cloud servers, with minimal information leakage. To this end we propose MuSE, a Multimodal Searchable Encryption scheme that, by combining only standard cryptographic primitives and symmetric-key block ciphers, allows cloud-backed applications t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1505.03263  شماره 

صفحات  -

تاریخ انتشار 2015