Novel secure data protection scheme using Martino homomorphic encryption

被引:13
|
作者
Rupa, Ch. [1 ]
Greeshmanth
Shah, Mohd Asif [2 ,3 ,4 ]
机构
[1] VR Siddhartha Engn Coll, Dept Comp Sci & Engn, Vijayawada, Andhra Prades, India
[2] Kabridahar Univ, Kabridahar, Somali, Ethiopia
[3] Woxsen Univ, Sch Business, Hyderabad 502345, Telangana, India
[4] Lovely Profess Univ, Div Res & Dev, Phagwara 144001, Punjab, India
关键词
Cloud; Data; Homomorphic Encryption; Matrix rotations; ASCII; Avalanche effect; Cryptanalysis; IMAGE ENCRYPTION; IOT;
D O I
10.1186/s13677-023-00425-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Globally, data maintenance and its security are vital tasks due to the rapid development of advanced technologies. Users now utilise Cloud computing technique and security techniques to preserve their data securely from intruders and hackers. Even yet, because of the technology's rapid advancement and inherent insecurity, attackers are conducting assaults on the cloud data. Hence, a homomorphic encryption technique was proposed based on Matrix Transformations with shifts, rotations, and transpositions of Binary converted ASCII values of each character in the plain text. For both encryption and decryption, symmetric cryptography employs the same secret key. The "avalanche effect" is a desirable feature of symmetric encryption in which two distinct keys generate separate cipher texts for the same message. As there are different conditions for the key, it helps to achieve this effect in this technique. The suggested algorithm's cryptanalysis reveals that it is more powerful than the existing encryption methods and resistant to a variety of attacks. So that an attacker cannot easily predict a plaintext through a statistical analysis.
引用
收藏
页数:12
相关论文
共 50 条
  • [1] Novel secure data protection scheme using Martino homomorphic encryption
    Ch. Rupa
    Mohd Asif Greeshmanth
    Journal of Cloud Computing, 12
  • [2] Circular Secure Homomorphic Encryption Scheme
    Zhao X.
    Fu Y.
    Song W.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2020, 57 (10): : 2117 - 2124
  • [3] A Mixed Homomorphic Encryption Scheme for Secure Data Storage in Cloud
    Kangavalli, R.
    Vagdevi, S.
    2015 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2015, : 1062 - 1066
  • [4] The Data Protection of MapReduce Using Homomorphic Encryption
    Chen, Xu
    Huang, Qiming
    PROCEEDINGS OF 2013 IEEE 4TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2012, : 419 - 421
  • [5] Secure Tensor Decomposition Using Fully Homomorphic Encryption Scheme
    Kuang, Liwei
    Yang, Laurence T.
    Feng, Jun
    Dong, Mianxiong
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2018, 6 (03) : 868 - 878
  • [6] Secure State Estimation Using Hybrid Homomorphic Encryption Scheme
    Zhang, Zhenyong
    Cheng, Peng
    Wu, Junfeng
    Chen, Jiming
    IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2021, 29 (04) : 1704 - 1720
  • [7] Secure Data Mining in Cloud using Homomorphic Encryption
    Mittal, Deepti
    Kaur, Damandeep
    Aggarwal, Ashish
    2014 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING IN EMERGING MARKETS (CCEM), 2014, : 155 - 160
  • [8] A Secure Multiparty Quantum Homomorphic Encryption Scheme
    Zhang, Jing-Wen
    Chen, Xiu-Bo
    Xu, Gang
    Li, Heng-Ji
    Wang, Ya-Lan
    Miao, Li-Hua
    Yang, Yi-Xian
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 73 (02): : 2835 - 2848
  • [9] A verifiable fully homomorphic encryption scheme to secure big data in cloud computing
    El-Yahyaoui, Ahmed
    Ech-Chrif El Kettani, Mohamed Dafir
    2017 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM), 2017, : 250 - 254
  • [10] A secure data fitting scheme based on CKKS homomorphic encryption for medical IoT
    Su, Yunxuan
    Xu An Wang
    Du, Weidong
    Ge, Yu
    Zhao, Kaiyang
    Lv, Ming
    JOURNAL OF HIGH SPEED NETWORKS, 2023, 29 (01) : 41 - 56