Skip to main content

Enhanced Homomorphic Encryption Scheme with Particle Swarm Optimization for Encryption of Cloud Data

  • Conference paper
  • First Online:
Hybrid Intelligent Systems (HIS 2019)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1179))

Included in the following conference series:

  • 560 Accesses

Abstract

Cloud Computing is the decentralized type of architecture which is vulnerable to various type of security attacks. Homomorphic encryption is the encryption scheme to encrypt objects which are used to access data from the cloud server. Homomorphic encryption scheme has major disadvantage of key management and key sharing which reduce its efficiency. Particle swarm optimization algorithms (PSO) are nature-inspired meta-heuristic algorithms that are population dependent known for social behavior of birds and fishes. These concepts are used as an inspiration to build scientific approach for complex problem solving. Depending upon the quality of measure, the solutions are enhanced by the algorithms initiating from a randomly distributed set of particles. By moving the particles around the search space using a set of mathematical expressions, the improvisations are achieved. In this research work, technique of PSO is applied which generate key for the encryption. PSO in is the optimization algorithm used to generate fixed number key for the encryption. PSO based homomorphic algorithm is implemented in MATLAB and simulation results shows that it performs well in terms of execution time, resource utilization. The execution time and resource utilization of PSO based homomorphic algorithm is less as compared to homomorphic algorithm. The result is optimized upto 10% approx in the improved algorithm as compared to existing algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Kanagavalli, R., Vagdevi, S.: A mixed homomorphic encryption scheme for secure data storage in cloud. In: IEEE Intenational Advanced Computing Conference IACC2015, pp 1062–1066 (2015)

    Google Scholar 

  2. Lauter, K., Nachirg, M., Vaikuntanathan, V.: Can homomorphic encryption be pratical? In: CCSW 2011, Chicago, Illinois, USA, pp. 113–124 (2011)

    Google Scholar 

  3. Tebaa, M., Elhajii, S.: Secure cloud computing through homomorphic encryption. Int. J. Adv. Comput. Technol. 5(16), 29–38 (2013)

    Google Scholar 

  4. Parmar, P.V.: Survey of various homomorphic encryption algorithms and schemes. Int. J. Comput. Appl. (0975–8887) 91(8), 26-32 (2014)

    Google Scholar 

  5. Song, X., Wang, Y.: Homomorphic cloud computing scheme based on hybrid homomorphic encryption, In: 3rd IEEE International Conference on Computer and Communications, pp 2450–2453 (2017)

    Google Scholar 

  6. Oppermann, A., Toro, G.,F., Seifert, J.: Secure cloud computing: communication protocol for multithreaded fully homomorphic encryption for remote data processing. In: IEEE International Symposium on Parallel & Distributed Processing with Applications, pp. 503–510 (2017)

    Google Scholar 

  7. Das, D.: Secure cloud computing algorithm using homomorphic encryption and multi-party computation. In: International Conference on Information Networking (ICOIN), pp. 391–396 (2018)

    Google Scholar 

  8. Ding, Y., Li, X.: Policy based on homomorphic encryption and retrieval scheme in cloud computing. In: IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), pp. 568–571 (2017)

    Google Scholar 

  9. Saurabh, P., Verma, B.: An efficient proactive artificial immune system based anomaly detection and prevention system. Expert Syst. Appl. 60, 311–320 (2016)

    Article  Google Scholar 

  10. Saurabh, P., Verma, B., Sharma, S.: An immunity inspired anomaly detection system: a general framework. In: Proceedings of Seventh International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA 2012). AISC, vol. 202, pp. 417–428. Springer (2012)

    Google Scholar 

  11. Saurabh, P., Verma, B., Sharma, S.: Biologically Inspired computer security system: the way ahead. In: Recent Trends in Computer Networks and Distributed Systems Security, Communications in Computer and Information Science, vol. 335, pp. 474–484. Springer (2011)

    Google Scholar 

  12. Saurabh, P., Verma, B.: Immunity inspired cooperative agent based security system. Int. Arab J. Inf. Technol. 15(2), 289–295 (2018)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Abhishek Mukherjee or Praneet Saurabh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mukherjee, A., Bisen, D., Saurabh, P., Kane, L. (2021). Enhanced Homomorphic Encryption Scheme with Particle Swarm Optimization for Encryption of Cloud Data. In: Abraham, A., Shandilya, S., Garcia-Hernandez, L., Varela, M. (eds) Hybrid Intelligent Systems. HIS 2019. Advances in Intelligent Systems and Computing, vol 1179. Springer, Cham. https://doi.org/10.1007/978-3-030-49336-3_29

Download citation

Publish with us

Policies and ethics