CFP last date
20 May 2024
Reseach Article

Privacy Management in Cloud by making use of Homomorphic Functions

by S. G. Sutar, G. A. Patil
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 37 - Number 2
Year of Publication: 2012
Authors: S. G. Sutar, G. A. Patil
10.5120/4579-6498

S. G. Sutar, G. A. Patil . Privacy Management in Cloud by making use of Homomorphic Functions. International Journal of Computer Applications. 37, 2 ( January 2012), 13-16. DOI=10.5120/4579-6498

@article{ 10.5120/4579-6498,
author = { S. G. Sutar, G. A. Patil },
title = { Privacy Management in Cloud by making use of Homomorphic Functions },
journal = { International Journal of Computer Applications },
issue_date = { January 2012 },
volume = { 37 },
number = { 2 },
month = { January },
year = { 2012 },
issn = { 0975-8887 },
pages = { 13-16 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume37/number2/4579-6498/ },
doi = { 10.5120/4579-6498 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:23:47.084928+05:30
%A S. G. Sutar
%A G. A. Patil
%T Privacy Management in Cloud by making use of Homomorphic Functions
%J International Journal of Computer Applications
%@ 0975-8887
%V 37
%N 2
%P 13-16
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is new era, attracting peoples for different services providing in cost effective manner. Privacy management is one of the critical issues in cloud when these services accessed through untrusted service provider or third party. There is risk with sending personal information to such parties. We proposed a strong privacy preserving scheme for processing of personal information at untrusted service provider or third party end in the cloud. With making use of homomorphic encryption function on personal information, the proposed scheme maintains confidentiality of personal information sent by the cloud users to untrusted service provider or third party. While registering to a cloud, the personal information sent by cloud user is encrypted by making use of homomorphic function. cloud server receives this information in encrypted form and decrypts it by using homomorphic decryption function. The personal information of cloud user is stored at cloud server database and general information is created like registration ID. When it requires to access the services from untrusted service provider or third party, it need to login to cloud through such parties. In this, first, information sent by cloud user is encrypted using a homomorphic function and sent to the untrusted service provider or third party along with its general information. The service provider receives the encrypted information and request to cloud server for personal information by providing the received general information. Cloud server encrypts the personal information related to received general information using another homomorphic function and sends it to the untrusted service provider or third party. Now, untrusted service provider or third party compares the personal information received from both, client and server in encrypted form. Moreover, the proposed scheme condenses computation at cloud server by eliminating process of authentication. Theoretical analysis and simulative evolution demonstrate the soundness and effectiveness of the proposed privacy management scheme in cloud computing.

References
  1. Michael Armbrust, Armando Fox, Rean Griffith, Anthony D. Joseph, Randy Katz, Andy Konwinski, Guntio Lee, David Patterson, Ariel Rabkin, Ion Stoica, and MateiZaharia, ”Above the clouds : A berkely view of cloud computing”, UC Berkely Reliable Adaptive Distributed Systems laboratory, February 10, 2009
  2. Train Anddrei, “Cloud Computing Challenges and related security issues”, a project report, 2009
  3. Saini Pearson, “Taking Account of privacy when designing cloud computing services”, in proceeding of ICSE-cloud 09, Vancouver, 2009.
  4. WassimItani, AymanKayssi, Ali Chehab, “Privacy as a Service: Privacy- Aware data Storage and processing in Cloud Computing Architectures”, IEEE international conference on Dependable, Automatic and secure computing, 2009.
  5. J. P. trembly, R Manohar,”Discrete Mathematical Structures with Applications to Computer Science”, book.
  6. P. Paillier, “Public-key Cryptosystems Based on Composite Degree Residuocity Classes”, Proc. Of EUROCRYPT’99, LNCS,vol 1592, pp.223-238, 1999.
  7. http://www.schneier.com/blog/archives/2009/07/homomorphic_enc.html
  8. Michael Miller, “Cloud Computing: Web-Based Applications That Change the Way You Work and Collaborate Online”, book.
  9. Anthony T. Velte, Toby J. Velte, Robert Elsenpeter, “Cloud Computing:A Practical Approach”.
  10. Paillier cryptosystem, available at: http://en.wikipedia.org/wiki/paillier_crptoststem
Index Terms

Computer Science
Information Sciences

Keywords

Cloud computing Homomorphic encryption Privacy management Third party in cloud