This website uses cookies to ensure you have the best experience.

# Ensuring Data Security Using Homomorphic Encryption In Cloud Computing

1302 words - 5 pages

Homomorphic Encryption allows access to highly scalable, inexpensive, on-demand computing resources that can execute the code and store the data that are provided to them. This aspect, known as data outsourced computation is very attractive, as it alleviates most of the burden on IT services from the consumer. Nevertheless, the adoption of data outsourced computation by business has a major obstacle, since the data owner does not want to allow the un trusted cloud provider to have access to the data being outsourced. Merely encrypting the data prior to storing it on the cloud is not a viable solution, since encrypted data cannot be further manipulated. This means that if the data owner would like to search for particular information, then the data would need to be retrieved and decrypted a very costly operation, which limits the usability of the cloud to merely be used as a data storage centre.
Homomorphic Encryption systems are used to perform operations on encrypted data without knowing the private key (without decryption), the client is the only holder of the secret key. When we decrypt the result of any operation, it is the same as if we had carried out the calculation on the raw data.
Definition: An encryption is homomorphic, if: from Enc(a) and Enc(b) it is possible to compute Enc(f (a, b)), where f can be: +, ×, ⊕ and without using the private key.
For plaintexts P1 and P2 and corresponding ciphertext C1 and C2, a homomorphic encryption scheme permits meaningful computation of P1 Θ P2 from C1 and C2 without revealing P1 or P2.The cryptosystem is additive or multiplicative homomorphic depending upon the operation Θ which can be addition or multiplication.
A homomorphic encryption scheme consists of the following four algorithms:
KeyGen (λ):
 Input-the security parameter λ.
 Output-a tuple (sk, pk) consisting of the secret key sk and public key pk .
Encrypt ( pk,π ):
 Input-a public key pk and a plaintext π .
 Output-ciphertext Ψ.
Decrypt (sk, Ψ):
 Input-a secret key sk and a ciphertext Ψ.
 Output-the corresponding plaintext π .
Evaluate (pk ,C ,Ψ ):
 Input-a public key , a circuit with inputs and a set Ψ of ciphertext ,Ψ1 . . . . . Ψt
Output-a ciphertext Ψ.
Therefore, a homomorphic encryption scheme consists of all algorithms of a conventional public key encryption scheme and an extra one. The correctness-condition for the conventional part of a homomorphic encryption scheme is identical to that of a (non-homomorphic) public key encryption scheme.

Additive homomorphic encryption is implemented by Paillier Cryptosystem. The Paillier cryptosystem, named after and invented by Pascal Paillier in 1999, is a probabilistic asymmetric algorithm for public key cryptography. The problem of computing n-th residue classes is believed to be computationally difficult. The decisional composite residuosity assumption is the intractability hypothesis upon which this...

## Find Another Essay On Ensuring Data Security Using Homomorphic Encryption in Cloud Computing

### Analysis of Cloud Computing Security

1549 words - 7 pages good number of benefits for its clients however it raises some security problems which may slow down its slow. Understanding what liability exist in cloud computing will help the organization to make the shift towards the cloud. Traditional data hosting, web applications and virtualization have been looked over, but some of solutions are offered are immature. Multiple clients can share a physical server by using virtualization is one of the major

### Access Control and Data Updation with AT-PRE: Attribute Time Based Proxy Re-Encryption for Shared Data in Cloud

2111 words - 9 pages We consider a cloud computing environment consisting of a cloud service provider (CSP), a data owner, and many users [few with read and few with both read/write permission]. The CSP maintains cloud infrastructures, which pool the bandwidth, storage space, and CPU power of many cloud servers to provide 24/7 services. The CSP mainly provides two services: data storage and re-encryption. After obtaining the encrypted data from the data owner, the

### Adoption of Cloud Computing relating to Data Storage

2267 words - 9 pages varies when more data is stored; this model gives flexibility but also can be seen as a marketing ploy to increase the sales of cloud data storage. As the user base increases prices may raise however as cloud computing and data storage is in its infancy it may be worth holding back to allow technical issues such as security, back up procedures and compliance to be resolved. Another key driving force of cloud data storage is the ability to use

830 words - 3 pages The Advantages and Disadvantages of using Cloud computing ServiceThe "cloud" refers to the Internet; it is usually hosted on more then one server in multiple locations, normally neither the public nor the businesses know where the information is located. Many consumers are turning to the cloud to store and retrieve their data from any computer in the world. They are using this service to store their software, conduct, documents, other personal

### Cloud Computing Virtualization – A Threat to Security of the System

2040 words - 9 pages The main aim of this paper is to study the concept of cloud computing through virtualization, how security is compromised in cloud computing and how we can secure the system from security breach in case of virtualization. Keywords: cloud computing, Hypervisor, Virtual machine, Virtualization Security. 1. INTRODUCTION Cloud computing is a model for enabling convenient, on demand network access to a shared pool of configurable computing

### the identification and analysis of information system in the business enterprise at each management level, the suitability of information system for the chosen firm, the security of the information...

3968 words - 16 pages Media has the maximum level of security at every level of management and in each of the information system they use. Employee and customer records must be kept secured so that no one can access it. Example: T-Mobile customers' private details were sold to a rival firm. So, in this case security of data is very important. (www.16) (Laudon, K. Pg. 434-442) CLOUD COMPUTING: Cloud computing is a general term for anything that

### Cloud Computing in Libraries

1595 words - 7 pages definition for cloud computing can be given as an emerging computer paradigm where data and services reside in massively scalable data centers in the cloud and can be accessed from any connected devices over the internet. In other word, it is the practice of using a network of remote servers hosted on the internet to store, manage and process data rather than a local server or a personal computer. Cloud computing is a way of providing various

### Cloud Computing in Healthcare

866 words - 4 pages doctor and medical officers that do not have pay on site hardware as well as storage services in order to maintain their records. The cloud computing services often require less technical support and maintenance as compared to the traditional data storage system (Wager, 63). This is an important area as it helps greatly to reduce the costs associated with storing important medical records. They can be accessed at any time and at any place and

### Cloud Computing in Small Organization

1918 words - 8 pages development of the internet in 90’s companies began to connect their own personal networks to internet to get new information and share business data with other companies. Modern solutions With huge growth and spread of using internet in recent past, this evolution brought us new approaches to deal with IT. First time we hear about cloud computing. Cloud computing is based combination of cheap servers that are part of one system which acts like

### Security in The Cloud

1724 words - 7 pages Rahul Shah Paper #1 Digital Hardware Basics Security in the cloud Hackers have gotten there way into every technological gadget out there. Something simple as browsing the web can give hackers information about the people’s data. Before Cloud computing, hackers were stealing data from the physical hard drive by implementing a virus that would open a back door and send the data straight to the hacker’s server. As security measure

### Cloud Computing Strategies in Improving Education

1081 words - 4 pages database in order to manipulate the data and get the benefits from that illegal activities. In the other hand, the threat of cloud computing in Malaysia higher education institution is lead to data loss and leakage. It is because, when applying the cloud computing, the risk of that is sometime whenever the internet down or the desktop PC has been infected by the viruses, the failure of stored data will happen. Besides that, the link that provide

## Similar Essays

### Using Data Encryption For Security In Cloud Computing

2098 words - 8 pages will analyze cloud computing and the issues it faces from a security standpoint. The main focus for this paper will be on how data encryption can help safeguard information being stored in the cloud. Data encryption is a key component in security for cloud computing and is often used when secure information is being transmitted. Keywords: cloud, security, data encryption Using Data Encryption for Security in Cloud Computing Today

### Cloud Computing Security Essay

1573 words - 6 pages . Encryption is one mitigation method used to ensure security in cloud computing. According to Krutz and Vines (2010), encryption involves coding of the data stored in the computing cloud such that hackers cannot gain access to the data. Data encryption seems to be the most effective method of ensuring security in computing (Krutz and Vines, 2010). However, it is of paramount importance to note that encrypted data is usually difficult to search or

### Security: Cloud Computing Essay

1554 words - 6 pages : 1) Using single cloud service provider. 2) Using multiple cloud service providers. The drawback of single cloud service provider is that it can be easily hacked by any attacker. In multiple cloud service provider model gives better security and availability of user private data. Fig 1: Cloud Computing Architecture Example Data integrity and privacy of the data are the most critical issues in cloud storage. For that reason

### Cloud Security Computing Essay

1737 words - 7 pages . Consequently, the major user concerns regarding cloud computing include its security. Some of the security concerns in cloud computing include data magnetization or remanence, data provenance, data lineage, data multitenancy, data processing, data-at-rest, and data-in-transit. Data-in-transit must undergo the encryption process to maintain confidentiality while data-at-rest can be compromised if it is not deciphered (Rittinghouse and Ransome