CFP last date
20 August 2024
Call for Paper
September Edition
IJCA solicits high quality original research papers for the upcoming September edition of the journal. The last date of research paper submission is 20 August 2024

Submit your paper
Know more
Reseach Article

A Hybrid of two Homomorphic Encryption Schemes for Cloud Enterprise Resource Planning (ERP) Data

by Arnold Mashud Abukari, Edem Kwedzo Bankas, Mohammed Muniru Iddrisu
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 183 - Number 38
Year of Publication: 2021
Authors: Arnold Mashud Abukari, Edem Kwedzo Bankas, Mohammed Muniru Iddrisu

Arnold Mashud Abukari, Edem Kwedzo Bankas, Mohammed Muniru Iddrisu . A Hybrid of two Homomorphic Encryption Schemes for Cloud Enterprise Resource Planning (ERP) Data. International Journal of Computer Applications. 183, 38 ( Nov 2021), 1-7. DOI=10.5120/ijca2021921789

@article{ 10.5120/ijca2021921789,
author = { Arnold Mashud Abukari, Edem Kwedzo Bankas, Mohammed Muniru Iddrisu },
title = { A Hybrid of two Homomorphic Encryption Schemes for Cloud Enterprise Resource Planning (ERP) Data },
journal = { International Journal of Computer Applications },
issue_date = { Nov 2021 },
volume = { 183 },
number = { 38 },
month = { Nov },
year = { 2021 },
issn = { 0975-8887 },
pages = { 1-7 },
numpages = {9},
url = { },
doi = { 10.5120/ijca2021921789 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Journal Article
%1 2024-02-07T01:18:58.664601+05:30
%A Arnold Mashud Abukari
%A Edem Kwedzo Bankas
%A Mohammed Muniru Iddrisu
%T A Hybrid of two Homomorphic Encryption Schemes for Cloud Enterprise Resource Planning (ERP) Data
%J International Journal of Computer Applications
%@ 0975-8887
%V 183
%N 38
%P 1-7
%D 2021
%I Foundation of Computer Science (FCS), NY, USA

Data confidentiality and privacy has been one of the major challenges in cloud Enterprise Resource Planning (ERP) deployment. There are different techniques to help provide enhanced security and data confidentiality. In this paper, a hybrid of two different Homomorphic encryption schemes is proposed to further enhance security and data confidentiality of ERP data. The Paillier and RSA Cryptosystems are modified and applied to form a two-layer encryption scheme. A successful implementation of the proposed hybrid of two homomorphic encryption scheme without sharing keys with the cloud is realised. The security of the Cloud ERP Data is enhanced by the modification of the Paillier Cryptosystem with the introduction of a new parameter gf to the Paillier Cryptosystem. The scheme also introduced a random parameter rg to help generate the value of gf . The simulation results reveals that the proposed scheme achieved improvement in the encryption time, decryption time and better throughput when compared with other schemes. The proposed scheme achieved six (6) percent improvement on encryption time,about thirty-two (32) percent improvement in decryption time as well as seven (7) percent improvement on throughput.

  1. Gantz, J. and Reinsel, D. (2011). Extracting value from chaos. Framingham, MA: International Data Corporation. Retrievedfrom value-from-chaos-ar.pdf (Archived by WebCite® at
  2. Abukari, A.M. and Bankas, E.K. and Iddrisu, M.M. (2020). A Secured Video Conferencing System Architecture using A Hybrid of Two Homomorphic Encryption Schemes: A Case of Zoom. International Journal of Engineering and Technical Research. 9. 237.
  3. Blaze,M., Bleumer,G. and Strauss,M. (1998). ?Divertible protocols and atomic proxy cryptography,? in International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 1998, pp. 127?144.
  4. Ateniese,G., Fu,K., Green,M., and Hohenberger,S. (2006). ?Improved proxy re-encryption schemes with applications to secure distributed storage,? ACM Transactions on Information and System Security (TISSEC), vol. 9, no. 1, pp. 1?30.
  5. Green, M. and Ateniese,G. (2007). ?Identity-based proxy re-encryption,? in Applied cryptography and network security. Springer, pp. 288?306.
  6. Baek, J., Safavi-Naini, R. and Susilo,W. (2005). ?Certificateless public key encryption without pairing,? in International Conference on Information Security. Springer, pp. 134?148.
  7. Deng,R. H., Weng,J, Liu,S., and Chen,K. (2008). ?Chosenciphertext secure proxy re-encryption without pairings,? in International Conference on Cryptology and Network Security. Springer, pp. 1?17.
  8. Bellafqira,R., Coatrieux,G., Bouslimi,D., Gw enol e Quellec and Cozic, M. (2017). Sharing Data Homomorphically Encrypted with Different Encryption Keys.arXiv:1706.01756v1 [cs.CR].
  9. Paillier, Pascal (1999). ”Public-Key Cryptosystems Based on Composite Degree Residuosity Classes”. EUROCRYPT. Springer. pp. 223–238. doi:10.1007/3-540-48910-X-16.
  10. Khalid El, M., Abdellah, E. and Abderrahim, B.H.(2015). ”Challenges of using homomorphic encryption to secure cloud computing”, in International Conference on Cloud Technologies and Applications(CloudTech), Marrakech, Morocco.
  11. Usha, D. and Subbulakshmi,M. (2018). Double Layer Encryption Algorithm Key Cryptography for Secure Data Sharing in Cloud. International Journal of Scientific and Engineering Research, 9(5). Retrieved july 2019
  12. Barker, E. and Roginsky, A. (2019), Transitioning the Use of Cryptographic Algorithms and Key Lengths, Special Publication (NIST SP), National Institute of Standards and Technology, Gaithersburg, MD, [online], 131Ar2 (Accessed November 18, 2021)
  13. Bill, M and John, S. (2020). Move fast and roll your own crypto. Retrieved from roll-your-own-crypto-a-quick-look-at-the-confidentiality-ofzoom- meetings/.
  14. Cezar, P., Mihai, T. and Cristian, L. (2016). ”Homomorphic Encryption Based on Group Algebras and Goldwasser-Micali Scheme” in Innovative Security Solutions for Information Technology and Communications, Bucharest, Romania, pp. 149-166.
  15. Fouad, H. (2014). Design and Implementation of Video Conferencing Cloud-based Network using VoIP for Remote Health Monitoring in Telemedicine System. International Journal of Computer Informatics and Technological Engineering IJCITE, INDIA. 1.
  16. Frost, A. and Sullivan.(2006). Delivering on the Promise of Easy to Use, Secure, and Inexpensive Video Conferencing in and IP Environment. Palo Alto, CA 94303-3331, USA.
  17. Gal, O. (2020). The Facts Around Zoom and Encryption for Meetings/Webinars. Retrieved from for-meetings-webinars/.
  18. Grabot, B., Mayere, A. and Bazet, I.(2008). ERP Systems and Organisational Change, London: Springer London. Available at: 1[Accessed September 1, 2017]
  19. Guo, S., Xu, H.: (2015) A secure delegation scheme of large polynomial computation in multi-party cloud. International Journal of Grid and Utility Computing, 6(2), pp.1-7.
  20. Han,J.,Susilo,W. and Mu,Y. (2013). ?Identity-based data storage in cloud computing,? Future Generation Computer Systems, vol. 29, no. 3, pp. 673?681.
  21. Hodge, R. (2020). Zoom security issues: Zoom buys security company, aims for end-to-end encryption. CNET. Retrieved from company-aims-for-end-to-end-encryption/.
  22. Honeyman,P. (1998). Secure Videoconferencing. USENIX Security Sysposium, San Antonio, texas.
  23. ITU-T (2003). Security in Telecommunications and Information Technology. International Telecommunication Union.
  24. Lazar, I. (2019). The Rise of Cloud Video Conferencing in Financial Services. Retrieved from in-financial-services/
  25. Liang,X., Lu,R., Lin,X. and Shen,X. S. (2010). ?Ciphertext policy attribute based encryption with efficient revocation?, Technical Report, University of Waterloo.
  26. Liang,X., Cao,Z., Lin,H., and Shao,J. (2009). ?Attribute based proxy re-encryption with delegating capabilities,? in Proceedings of the 4th International Symposium on Information, Computer, and Communications Security. ACM, pp. 276?286.
  27. Marklow, A. and Todd, F.(2014). ”A first Course in Abstract Algebra: Rings, Groups, and Fields”, 3rd edn. CRC Press, Taylor and francis Group.
  28. Rabah, K. (2006). Implementing Secure RSA Cryptosystem Using Your Own Cryptographic JCE Provider. Journal of Applied sciences, 6(3); 482-510.
  30. Singh, S., Preet and Maini, Raman. (2011). ?Comparison of Data Encryption Algorithms?, International Journal of Computer Science and Communication, vol. 2, No. 1, pp. 125-127.
  31. Statt, N. (2020, April 5). Google bans its employees from using Zoom over security concerns. The Verge. Retrieved from risks-hangouts-meet
  32. Tim, C. and Ben, J .(2004). Security Guide for H.323 Videoconferencing. The JNT Association, No. GD/VTA/009.
  33. Wakefield, J., (2020). Zoom boss apologises for security issues and promises fixes. BBC, [online] Available at: ¡¿ [Accessed 15 May 2020].
  34. Whittaker, Z. (2020). york-city-schools/. Tech Crunch. Retrieved from
  35. Xu,P., Jiao,T., Wu,Q., Wang,W. and Jin,H. (2016). ?Conditional identity-based broadcast proxy re-encryption and its application to cloud email,? IEEE Transactions on Computers, vol. 65, no. 1, pp. 66?79.
Index Terms

Computer Science
Information Sciences


Proxy Re-encryption Double-layer Encryption Cloud ERP Cloud Computing Paillier Cryptosystem RSA Cryptosystem Cryptosystem