Comparative evaluation of fully homomorphic encryption algorithms in cloud environment

被引:2
|
作者
Mittal, Sonam [1 ]
Ramkumar, K. R. [1 ]
机构
[1] Chitkara Univ, Chitkara Inst Engn & Technol, Dept Comp Sci & Engn, Rajpura, Punjab, India
关键词
cloud computing; lattice-based fully homomorphic encryption; integer-based fully homomorphic encryption; fully homomorphic encryption; FHE; learning with errors; LWE; ring learning with errors; RLWE; N-th degree truncated polynomial ring units; NTRU; INTEGERS;
D O I
10.1504/IJESDF.2023.131963
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is an essential component of the service delivery environment in the domain of service computing. It assures a cloud service ecosystem to permit different service providers for participating and provisioning their services for consumers. In the cloud environments, the major component is offering security to the end users, which is ensured with the homomorphic encryption primitives. These approaches focus on minimising the computational burden in terms of clear computation. This paper aims to implement a comparative analysis of privacy preservation in cloud computing using fully homomorphic encryption (FHE) algorithms. A set of algorithms like lattice-based, integer-based, learning with errors (LWE), ring learning with errors (RLWE), and N-th degree truncated polynomial ring units (NTRU) are used for the comparison to make a concluding point regarding those performances. The experimental evaluation demonstrates the efficiency of the diverse frameworks, in terms of both security performance and accuracy, for building a secure analytics cloud-enabled application.
引用
收藏
页码:333 / 347
页数:16
相关论文
共 50 条
  • [41] Design of Novel Hardware Architecture for Fully Homomorphic Encryption Algorithms in FPGA for Real-Time Data in Cloud Computing
    Behera, Sagarika
    Prathuri, Jhansi Rani
    IEEE ACCESS, 2022, 10 : 131406 - 131418
  • [42] Homomorphic encryption for cluster in cloud
    Department of Computer Science and Engineering, KL University, Vaddeswaram, AP, India
    不详
    Int. J. Secur. Appl., 5 (319-324):
  • [43] A verifiable fully homomorphic encryption scheme to secure big data in cloud computing
    El-Yahyaoui, Ahmed
    Ech-Chrif El Kettani, Mohamed Dafir
    2017 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM), 2017, : 250 - 254
  • [44] Making data in cloud secure and usable: fully homomorphic encryption with symmetric keys
    Sharma, Iti
    Gupta, C. P.
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2015, 14 (04) : 379 - 399
  • [45] Privacy Preserving Calculation in Cloud using Fully Homomorphic Encryption with Table Lookup
    Ruixiao Li
    Ishimaki, Yu
    Yamana, Hayato
    2020 5TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA ANALYTICS (IEEE ICBDA 2020), 2020, : 315 - 322
  • [46] On-the-Fly Multiparty Computation on the Cloud via Multikey Fully Homomorphic Encryption
    Lopez-Alt, Adriana
    Tromer, Eran
    Vaikuntanathan, Vinod
    STOC'12: PROCEEDINGS OF THE 2012 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2012, : 1219 - 1234
  • [47] Fully Homomorphic Encryption: An Antidote to Cloud Data Security and Privacy Concerns.
    Jubrin, Abdulahi Monday
    Izegbu, Ikechukwu
    Adebayo, Olawale Surajudeen
    2019 15TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTER AND COMPUTATION (ICECCO), 2019,
  • [48] Secure Parallel Processing on Encrypted Cloud Data Using Fully Homomorphic Encryption
    Patil, Rudragoud S.
    Biradar, Prabhuling
    PROCEEDINGS OF THE 2018 4TH INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT - 2018), 2018, : 242 - 247
  • [49] Cloud-based secure human action recognition with fully homomorphic encryption
    Wang, Ruyan
    Zeng, Qinglin
    Yang, Zhigang
    Zhang, Puning
    JOURNAL OF SUPERCOMPUTING, 2025, 81 (01):
  • [50] Full-Domain Anonymization Algorithm Based on Fully Homomorphic Encryption in the Cloud
    Liu J.-Q.
    Chen F.-H.
    Xu C.-F.
    Guo H.
    Li T.
    Jisuanji Xuebao/Chinese Journal of Computers, 2019, 42 (04): : 837 - 850