Proceedings of the 2nd International Conference on ICT for Digital, Smart, and Sustainable Development, ICIDSSD 2020, 27-28 February 2020, Jamia Hamdard, New Delhi, India

Research Article

CryptoSecurity: Applying Homomorphic Security Schemes to Encrypted Data in Cloud Computing

Download423 downloads
  • @INPROCEEDINGS{10.4108/eai.27-2-2020.2303142,
        author={Deepika  Bhatia and Meenu  Dave},
        title={CryptoSecurity: Applying Homomorphic Security Schemes to Encrypted Data in Cloud Computing},
        proceedings={Proceedings of the 2nd International Conference on ICT for Digital, Smart, and Sustainable Development, ICIDSSD 2020, 27-28 February 2020, Jamia Hamdard, New Delhi, India},
        publisher={EAI},
        proceedings_a={ICIDSSD},
        year={2021},
        month={3},
        keywords={cloud homomorphic security encryption asymmetric elliptic curve cryptography},
        doi={10.4108/eai.27-2-2020.2303142}
    }
    
  • Deepika Bhatia
    Meenu Dave
    Year: 2021
    CryptoSecurity: Applying Homomorphic Security Schemes to Encrypted Data in Cloud Computing
    ICIDSSD
    EAI
    DOI: 10.4108/eai.27-2-2020.2303142
Deepika Bhatia1,*, Meenu Dave1
  • 1: Department of Computer Science and Engineering, Jagannath Univeristy Jaipur , India
*Contact email: deepika.bhatia@vips.edu

Abstract

Cloud computing is a platform which can be used for data storage and processing. Users can outsource their data to cloud environment where various operations can be performed on this data. As the data is private, different concerns are there for security and privacy of user’s data over the distributed network. Nowadays, data security is a major concern in higher education. Various techniques are available for mobile devices and used in IOT. Major issue is of data communication arises while using such kind of devices. So the concern arises over the security of data during transfer using public environment. Size and power level available in these small handheld devices is also a major challenge. Mobile environment also creates a big concern over the security of user’s data. The paper focuses on various challenges, issues and various technologies available to secure user’s data. This paper presents a comparative analysis of various homomorphic encryption techniques. The paper presents the analysis of various homomorphic encryption algorithms such as RSA, ElGamal, Paillier, enhanced homomorphic encryption scheme, AHEE, BGV etc. Comparative study of these public key cryptographic techniques is presented in this paper and also it is shown that ECC method is extensively used nowadays by various Governments as it is more secured while exchanging the information in cloud environment. It can also be improved in future scenarios.