Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Cloud Data Security using Homomorphic Encryption

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2018
Authors:
Sohit Simon Mecwan, Khusboo Sawant
10.5120/ijca2018916341

Sohit Simon Mecwan and Khusboo Sawant. Cloud Data Security using Homomorphic Encryption. International Journal of Computer Applications 180(16):7-12, February 2018. BibTeX

@article{10.5120/ijca2018916341,
	author = {Sohit Simon Mecwan and Khusboo Sawant},
	title = {Cloud Data Security using Homomorphic Encryption},
	journal = {International Journal of Computer Applications},
	issue_date = {February 2018},
	volume = {180},
	number = {16},
	month = {Feb},
	year = {2018},
	issn = {0975-8887},
	pages = {7-12},
	numpages = {6},
	url = {http://www.ijcaonline.org/archives/volume180/number16/29014-2018916341},
	doi = {10.5120/ijca2018916341},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

The security is primary need of any data storage system. In this work the cloud data storage and their security is the key area of investigation. The cloud data is always mobile by nature because the cloud infrastructure providers are host or move their data from one storage to another for reducing maintains cost of server. In this context the security and privacy of data is key concern or service provider and data owner. In order to keep secure data on cloud the cloud service providers to encrypt the data over server in cryptographic format. The cryptography is effective manner of security because it requires some key to recover the original data. But the key management policies and key generation techniques are key factor of deciding the security depth of any cryptographic cloud. The proposed work favors the Homomorphic key cryptographic technique for securing the data on cloud. Therefore the Paillier algorithm is proposed for implementing with the cloud. The Paillier algorithm is an asymmetric key encryption technique which first generates the pubic key and private key for securing the data. But the technique is not much suitable for the text data cryptography therefore the data is converted in two equivalent numerical value and the cryptographic operation is performed. After encryption the data is preserved on file on cloud storage. The security of the proposed cryptographic technique is demonstrated using the three applications i.e. file upload, download and the sharing of files among the cloud server users. The implementation of the proposed secure cloud hosting is performed on JAVA technology. After implementation the performance of the algorithm is computed in terms of time consumption, memory consumption, and server response time. The results demonstrate the proposed technique is acceptable for data hosting on cloud.

References

  1. Ding, Manish M Potey, C. A. Dhote, and Deepak H. Sharma, "Homomorphic Encryption for Security of Cloud Data", Procedia Computer Science 79 (2016): pp. 175-181.
  2. Sookhak, Mehdi, et al. "Dynamic remote data auditing for securing big data storage in cloud computing." Information Sciences 380 (2017): 101-116.
  3. Aarti P Pimpalkar and H.A. Hingoliwala, ‘A Secure Cloud Storage System with Secure Data Forwarding’, “International Journal of Scientific & Engineering Research”, Volume 4, Issue 6, June-2013, page no- 3002-3010
  4. Jinesh varia,” AWS Cloud Security Best Practices”, “White Paper”, November 2013
  5. Luit Infotech Private Limited, “What is Cloud Computing”, available online at: http://www.luitinfotech.com/kc/what-is-cloud-computing.pdf
  6. B. Grobauer, T. Walloschek, and E. Stöcker, “Understanding Cloud Computing Vulnerabilities”. 2011 IEEE Security and Privacy, pp. 50-57.
  7. S. Zhang, S. F. Zhang, X. B. Chen, and X. Z. Huo, “Cloud Computing Research and Development Trend,” In Proceedings of the 2010 Second International Conference on Future Networks (ICFN '10). IEEE Computer Society, Washington, DC, USA, pp. 93-970
  8. J. F. Yang and Z. B. Chen, “Cloud Computing Research and Security Issues,” 2010 IEEE International Conference on Computational Intelligence and Software Engineering (CiSE), Wuhan pp. 1-3, Dec. 2010.
  9. Kaufman, Lori M., "Data security in the world of cloud computing", IEEE Security & Privacy 7, no. 4 (2009).
  10. Pradip Lamsal, “Understanding Trust and Security”, Department of Computer Science University of Helsinki, Finland, 20th of October 2001
  11. V. Abricksen, “A Survey on Cloud Computing and Cloud Security Issues”, International Journal of Engineering Research and Applications (IJERA), , International Conference on Humming Bird (01st March 2014).
  12. Mohammad Asadullah and R. K. Choudhary, “Data Outsourcing Security Issues and Introduction of DOSaaS in Cloud Computing”, International Journal of Computer Applications (IJCA), PP. 40-45, Volume 85 – No 18, January 2014.
  13. Protect Data Privacy, http://www- 01.ibm.com/software/data/optim/protect-data-privacy/.
  14. Data Encryption, Post note, Online: http://www.parliament.uk/documents/post/postpn270.pdf [Accessed on 25 October 17].

Keywords

Cloud Computing, Homomorphic Encryption, Security, Cloud Storage, Cryptography, Cipher-text, and plaintext