Novel secure data protection scheme using Martino homomorphic encryption

被引:13
|
作者
Rupa, Ch. [1 ]
Greeshmanth
Shah, Mohd Asif [2 ,3 ,4 ]
机构
[1] VR Siddhartha Engn Coll, Dept Comp Sci & Engn, Vijayawada, Andhra Prades, India
[2] Kabridahar Univ, Kabridahar, Somali, Ethiopia
[3] Woxsen Univ, Sch Business, Hyderabad 502345, Telangana, India
[4] Lovely Profess Univ, Div Res & Dev, Phagwara 144001, Punjab, India
关键词
Cloud; Data; Homomorphic Encryption; Matrix rotations; ASCII; Avalanche effect; Cryptanalysis; IMAGE ENCRYPTION; IOT;
D O I
10.1186/s13677-023-00425-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Globally, data maintenance and its security are vital tasks due to the rapid development of advanced technologies. Users now utilise Cloud computing technique and security techniques to preserve their data securely from intruders and hackers. Even yet, because of the technology's rapid advancement and inherent insecurity, attackers are conducting assaults on the cloud data. Hence, a homomorphic encryption technique was proposed based on Matrix Transformations with shifts, rotations, and transpositions of Binary converted ASCII values of each character in the plain text. For both encryption and decryption, symmetric cryptography employs the same secret key. The "avalanche effect" is a desirable feature of symmetric encryption in which two distinct keys generate separate cipher texts for the same message. As there are different conditions for the key, it helps to achieve this effect in this technique. The suggested algorithm's cryptanalysis reveals that it is more powerful than the existing encryption methods and resistant to a variety of attacks. So that an attacker cannot easily predict a plaintext through a statistical analysis.
引用
收藏
页数:12
相关论文
共 50 条
  • [21] Secure KNN Classification Scheme Based on Homomorphic Encryption for Cyberspace
    Liu, Jiasen
    Wang, Chao
    Tu, Zheng
    Wang, Xu An
    Lin, Chuan
    Li, Zhihu
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [22] Secure searching of biomarkers through hybrid homomorphic encryption scheme
    Kim, Miran
    Song, Yongsoo
    Cheon, Jung Hee
    BMC MEDICAL GENOMICS, 2017, 10
  • [23] A homomorphic encryption-based secure electronic voting scheme
    Huszti, Andrea
    PUBLICATIONES MATHEMATICAE-DEBRECEN, 2011, 79 (3-4): : 479 - 496
  • [24] Secure Sum Computation Using Homomorphic Encryption
    Sheikh, Rashid
    Mishra, Durgesh Kumar
    DATA SCIENCE AND BIG DATA ANALYTICS, 2019, 16 : 357 - 363
  • [25] Secure genotype imputation using homomorphic encryption
    Zhou, Junwei
    Lei, Botian
    Lang, Huile
    Panaousis, Emmanouil
    Liang, Kaitai
    Xiang, Jianwen
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 72
  • [26] Secure searching of biomarkers through hybrid homomorphic encryption scheme
    Miran Kim
    Yongsoo Song
    Jung Hee Cheon
    BMC Medical Genomics, 10
  • [27] Secure Multiparty Computation via Fully Homomorphic Encryption Scheme
    Han, Jing-Li
    Wang, Zhao-Li
    Shi, Ya-Qing
    Wang, Mei-Juan
    Dong, Hui
    2018 EIGHTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2018), 2018, : 250 - 253
  • [28] A novel method of fully homomorphic encryption scheme
    Mittal, Sonam
    Suntheya, A. K.
    Anbunathan, R.
    Ashokkumar, N.
    INTERNATIONAL JOURNAL OF COMPUTING SCIENCE AND MATHEMATICS, 2024, 20 (03) : 228 - 242
  • [29] An Arbitrary Encryption Scheme For Homomorphic Data Migration
    Bhruguram, T. M.
    Jamal, Jesna
    Kurian, Maria
    Jose, Chinchu
    2011 THIRD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2011,
  • [30] Enhanced Homomorphic Encryption Scheme with PSO for Encryption of Cloud Data
    Khan, Saif Ali
    Aggarwal, R. K.
    Kulkarni, Shashidhar
    2019 5TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS (ICACCS), 2019, : 395 - 400