Skip to main content

A Protected Cloud Computation Algorithm Using Homomorphic Encryption for Preserving Data Integrity

  • Conference paper
  • First Online:
Recent Findings in Intelligent Computing Techniques

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 707))

Abstract

Cloud computing is growing very rapidly because it can drastically cut down the costs of hosting data, is highly scalable, and increases the number crunching capacity manifold, and it is also a revolutionary concept. Cloud computing delivers us from this handicap and de-couples the need for computing resources to be present on site to access them. Thus, it democratizes access to computing and storage. The data on the cloud may be safe while computing, but the security of data while a transfer is not ensured en route. Our aim is to build a fully homomorphic encryption method that supports mathematical operations in addition to being efficient, quick, and utilizing minimum resources. Now, once we have a fully homomorphic encryption, the problem becomes to ensure how the user can know for sure that whether the operation on encrypted data achieved is correct or not.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Ghorbel, A., Ghorbel, M., Jmaiel, M.: Privacy in cloud computing environments: a survey and research challenges. J. Supercomput. 1–38 (2017)

    Google Scholar 

  2. Tebaa, M., Hajji, S.E.: From single to multi-clouds computing privacy and fault tolerance. IERI Procedia 10, 112–118 (2014)

    Article  Google Scholar 

  3. Tebaa, M., El Hajji, S., El Ghazi, A.: Homomorphic encryption applied to the cloud computing security. Proc. World Congr. Eng. 1, 4–6 (2012)

    Google Scholar 

  4. Tebaa, M., Hajji, S.E.: Secure cloud computing through homomorphic encryption (2014). arXiv:1409.0829

  5. El Makkaoui, K., Ezzati, A., Hssane, A.B.: Challenges of using homomorphic encryption to secure cloud computing. In: 2015 IEEE International Conference on Cloud Technologies and Applications (CloudTech), pp. 1–7 (2015)

    Google Scholar 

  6. Atayero, A.A., Feyisetan, O.: Security issues in cloud computing: the potentials of homomorphic encryption. J. Emerg. Trends Comput. Inf. Sci. 2(10), 546–552 (2011)

    Google Scholar 

  7. Smart, N.P., Vercauteren, F.: Fully homomorphic encryption with relatively small key and ciphertext sizes. In: International Workshop on Public Key Cryptography, pp. 420–443. Springer, Berlin, Heidelberg (2010)

    Chapter  Google Scholar 

  8. Bouti, A., Keller, J.: Towards practical homomorphic encryption in cloud computing. In: IEEE Fourth Symposium on Network Cloud Computing and Applications (NCCA), pp. 67–74 (2015)

    Google Scholar 

  9. Naehrig, M., Lauter, K., and Vaikuntanathan, V.: Can homomorphic encryption be practical? In: Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop, pp. 113–124 (2011)

    Google Scholar 

  10. Coron, J. S., Mandal, A., Naccache, D., Tibouchi, M.: Fully homomorphic encryption over the integers with shorter public keys. In: Annual Cryptology Conference, pp. 487–504. Springer, Berlin, Heidelberg (2011)

    Chapter  Google Scholar 

  11. Van Dijk, M., Gentry, C., Halevi, S., Vaikuntanathan, V.: Fully homomorphic encryption over the integers. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 24–43. Springer, Berlin, Heidelberg (2010)

    Google Scholar 

  12. Gentry, C., Sahai, A., Waters, B.: Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based. In: Advances in Cryptology CRYPTO, pp. 75–92. Springer, Berlin, Heidelberg (2013)

    Chapter  Google Scholar 

Download references

Acknowledgements

We are thankful to NIIT University for providing research laboratory facility and funding support to carry out this research work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Prakhar Awasthi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Awasthi, P., Mittal, S., Mukherjee, S., Limbasiya, T. (2019). A Protected Cloud Computation Algorithm Using Homomorphic Encryption for Preserving Data Integrity. In: Sa, P., Bakshi, S., Hatzilygeroudis, I., Sahoo, M. (eds) Recent Findings in Intelligent Computing Techniques . Advances in Intelligent Systems and Computing, vol 707. Springer, Singapore. https://doi.org/10.1007/978-981-10-8639-7_53

Download citation

Publish with us

Policies and ethics