Comparative evaluation of fully homomorphic encryption algorithms in cloud environment

被引:2
|
作者
Mittal, Sonam [1 ]
Ramkumar, K. R. [1 ]
机构
[1] Chitkara Univ, Chitkara Inst Engn & Technol, Dept Comp Sci & Engn, Rajpura, Punjab, India
关键词
cloud computing; lattice-based fully homomorphic encryption; integer-based fully homomorphic encryption; fully homomorphic encryption; FHE; learning with errors; LWE; ring learning with errors; RLWE; N-th degree truncated polynomial ring units; NTRU; INTEGERS;
D O I
10.1504/IJESDF.2023.131963
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is an essential component of the service delivery environment in the domain of service computing. It assures a cloud service ecosystem to permit different service providers for participating and provisioning their services for consumers. In the cloud environments, the major component is offering security to the end users, which is ensured with the homomorphic encryption primitives. These approaches focus on minimising the computational burden in terms of clear computation. This paper aims to implement a comparative analysis of privacy preservation in cloud computing using fully homomorphic encryption (FHE) algorithms. A set of algorithms like lattice-based, integer-based, learning with errors (LWE), ring learning with errors (RLWE), and N-th degree truncated polynomial ring units (NTRU) are used for the comparison to make a concluding point regarding those performances. The experimental evaluation demonstrates the efficiency of the diverse frameworks, in terms of both security performance and accuracy, for building a secure analytics cloud-enabled application.
引用
收藏
页码:333 / 347
页数:16
相关论文
共 50 条
  • [31] Translating Algorithms to Handle Fully Homomorphic Encrypted Data on the Cloud
    Chatterjee, Ayantika
    Sengupta, Indranil
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2018, 6 (01) : 287 - 300
  • [32] On Extension of Evaluation Algorithms in Keyed-Homomorphic Encryption
    Shinoki, Hirotomo
    Nuida, Koji
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2022, 2022, 13504 : 189 - 207
  • [33] Fully Homomorphic Encryption for Mathematicians
    Silverberg, Alice
    WOMEN IN NUMBERS 2: RESEARCH DIRECTIONS IN NUMBER THEORY, 2013, 606 : 111 - 123
  • [34] On Extension of Evaluation Algorithms in Keyed-Homomorphic Encryption
    Shinoki, Hirotomo
    Nuida, Koji
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2024, E107A (03) : 218 - 233
  • [35] Privacy-preserving genome-wide association studies on cloud environment using fully homomorphic encryption
    Wen-Jie Lu
    Yoshiji Yamada
    Jun Sakuma
    BMC Medical Informatics and Decision Making, 15
  • [36] Privacy-preserving genome-wide association studies on cloud environment using fully homomorphic encryption
    Lu, Wen-Jie
    Yamada, Yoshiji
    Sakuma, Jun
    BMC MEDICAL INFORMATICS AND DECISION MAKING, 2015, 15
  • [37] A Comparative Assessment of Homomorphic Encryption Algorithms Applied to Biometric Information
    Crihan, Georgiana
    Craciun, Marian
    Dumitriu, Luminita
    INVENTIONS, 2023, 8 (04)
  • [38] A Comparative Study between Modern Encryption Algorithms based On Cloud Computing Environment
    Mohammad, Omer K. Jasim
    Abbas, Safia
    EI-Horbaty, El-Sayed M.
    Salem, Abdel-Badeeh M.
    2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 531 - 535
  • [39] Evaluation of the Complexity of Fully Homomorphic Encryption Schemes in Implementations of Programs
    Chakarov, Dimitar
    Papazov, Yavor
    COMPUTER SYSTEMS AND TECHNOLOGIES, 2019, : 62 - 67
  • [40] Homomorphic Encryption for Cluster in Cloud
    Vamshinath, N.
    Ramya, K. Ruth
    Krishna, Sai
    Bhaskar, P. Gopi
    Mwaseba, Geofrey L.
    Kim, Tai-hoon
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (05): : 319 - 324