Browse > Article
http://dx.doi.org/10.3837/tiis.2020.11.015

Enhanced Privacy Preservation of Cloud Data by using ElGamal Elliptic Curve (EGEC) Homomorphic Encryption Scheme  

vedaraj, M. (R.M.D. Engineering College)
Ezhumalai, P. (R.M.D. Engineering College)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.14, no.11, 2020 , pp. 4522-4536 More about this Journal
Abstract
Nowadays, cloud is the fastest emerging technology in the IT industry. We can store and retrieve data from the cloud. The most frequently occurring problems in the cloud are security and privacy preservation of data. For improving its security, secret information must be protected from various illegal accesses. Numerous traditional cryptography algorithms have been used to increase the privacy in preserving cloud data. Still, there are some problems in privacy protection because of its reduced security. Thus, this article proposes an ElGamal Elliptic Curve (EGEC) Homomorphic encryption scheme for safeguarding the confidentiality of data stored in a cloud. The Users who hold a data can encipher the input data using the proposed EGEC encryption scheme. The homomorphic operations are computed on encrypted data. Whenever user sends data access permission requests to the cloud data storage. The Cloud Service Provider (CSP) validates the user access policy and provides the encrypted data to the user. ElGamal Elliptic Curve (EGEC) decryption was used to generate an original input data. The proposed EGEC homomorphic encryption scheme can be tested using different performance metrics such as execution time, encryption time, decryption time, memory usage, encryption throughput, and decryption throughput. However, efficacy of the ElGamal Elliptic Curve (EGEC) Homomorphic Encryption approach is explained by the comparison study of conventional approaches.
Keywords
Homomorphic; Privacy Preservation; Message Encoding; Encryption; Decryption; Message Decoding;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Yong Yu, Man Ho Au, Giuseppe Ateniese, Xinyi Huang, Willy Susilo, Yuanshun Dai, and Geyong Min, " Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage," IEEE Trans.Inf. Forensics Secur, Vol. 12, pp.767-778, 2017.   DOI
2 Jun Tang, Yong Cui, Qi Li, Kui Ren, Jiangchuan Liu, and Rajkumar Buyya "Ensuring security and privacy preservation for cloud data services," ACM Comput. Surv. (CSUR), Vol. 49, No.1, pp.13, 2016.
3 Smaranika Dasgupta, and S.K.Pa, "Design of a polynomial ring based symmetric homomorphic encryption scheme," Perspect. Sci, Vol. 8, pp.692-695, 2016.   DOI
4 Khalid El, Makkaoui Abderrahim, Beni-Hssane, Abdellah Ezzati, Anas El-Ansari, "Fast cloud-RSA scheme for promoting data confidentiality in the cloud computing," Procedia Comput.Sci., Vol.113, pp.33-40, 2017.   DOI
5 Farhad Farokhi, Iman Shames, and Nathan Batterham, "Secure and private cloud-based control using semi-homomorphic encryption," IFAC-Papers Online, Vol. 49, No.22, pp.163-168, 2016.
6 Xuyun Zhang, Wanchun Dou, Jian Pei, Surya Nepal, Chi Yang, Chang Liu, and Jinjun Chen, "Proximity-aware local-recoding anonymization with map reduce for scalable big data privacy preservation in cloud," IEEE Trans. Comput, Vol. 64, pp. 2293-2307, 2015.   DOI
7 Chia-Mu Yu ,Chi-Yuan Chen , and Han-Chieh Chao, "Privacy-Preserving Multikeyword Similarity Search Over Outsourced Cloud Data," IEEE Systems Journal, Vol.11, No.2, pp.385-394, 2017.   DOI
8 Bing Wang, Shucheng Yu, Wenjing Lou, and Y. Thomas Hou, "Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud," in Proc. of INFOCOM, 2014 Proceedings IEEE, pp. 2112-2120, 2014.
9 Kai Fan, Qiong Tian, Junxiong Wang, Hui Li, Yintang Yang, "Privacy Protection Based Access Control Scheme in Cloud-Based Services," IEEE 2017, Vol.14, No. 1, pp.61-71, 2017.
10 Khalil Hariss, Hassan Noura, and Abed Ellatif Samhat, "Fully enhanced homomorphic encryption algorithm of MORE approach for real world applications," J. Inf.Secur. Appl, Vol.34, No.2, pp. 233-242, 2017.
11 Kadam Prasad, Jadhav Poonam, Khupase Gauri, N.C.Thoutan, "Data sharing security and privacy preservation in cloud computing," in Proc. of Green Computing and Internet of Things(ICGCIoT), 2015 International Conference, pp. 1070-1075, 2015.
12 Zhang .X, Chang Liu, Surya Nepal, Chi Yang, and Jinjun Chen, "Privacy preservation over big data in cloud systems," in Proc. of Security, Privacy and Trust in Cloud Systems, Springer, pp. 239-257, 2014.
13 Ryan Hayward and Chia-Chu Chiang, "Parallelizing fully homomorphic encryption for a cloud environment," J. Appl. Res. Technol, Vol. 13, No.2, pp.245-252, 2015.   DOI
14 J. Suganthi, J. Ananthi J, S. Archana, "Privacy preservation and public auditing for cloud data using ASS in multi-cloud," in Proc. of Innovations in Information, Embedded and Communication Systems (ICIIECS), 2015 International Conference, pp. 1-6, 2015.
15 Wei Wang, Lei chen, and Qian Zhang, "Outsourcing high-dimensional healthcare data to cloud with personalized privacy preservation," Computer Networks, Vol.88, pp.136-148, 2015.   DOI
16 Frank Li, Richard Shin, and Vern Paxson, "Exploring privacy preservation in outsourced k-nearest neighbors with multiple data owners," in Proc. of the 2015 ACM Workshop on Cloud Computing Security Workshop, pp. 53-64, 2015.
17 Hong Liu, Huansheng Ning , Qingxu Xiong , and Laurence T. Yang, "Shared authority based privacy-preserving authentication protocol in cloud computing," IEEE Trans. Parallel Distrib. Syst, Vol.26, No.1, pp.241-251, 2015.   DOI
18 Qinghua Shen, Xiaohui Liang, Xuemin Shen, Xiaodong Lin, and Henry Y. Luo, "Exploiting geo-distributed clouds for a e-health monitoring system with minimum service delay and privacy preservation," IEEE J. Biomed. Health Inform, Vol.18, No.2, pp. 430-439, 2014.   DOI
19 Manish M.Potey, A.Dhote, Deepak H, and Sharma, "Homomorphic encryption for security of cloud data," Procedia Comput. Sci, Vol.79, pp.175-181, 2016.   DOI
20 Ning Cao, Cong Wang, Ming Li, Kui Ren, and Wenjing Lou, "Privacy-preserving multi-keyword ranked search over encrypted cloud data," IEEE Trans. Parallel Distrib. Syst, Vol.25, pp.222-233, 2014.   DOI
21 Kaaniche. N, Laurent. M, "Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms," Comput. Commun., Vol. 111, pp.120-141, 2017.   DOI