SECURE OUTSOURCED CALCULATIONS WITH HOMOMORPHIC ENCRYPTION

Page 1

Advanced Computing: An International Journal (ACIJ), Vol.9, No.6, November 2018

SECURE OUTSOURCED CALCULATIONS WITH HOMOMORPHIC ENCRYPTION Qi Wang, Dehua Zhou and Yanling Li Department of Computer Science, Jinan University, China

ABSTRACT With the rapid development of cloud computing, the privacy security incidents occur frequently, especially data security issues. Cloud users would like to upload their sensitive information to cloud service providers in encrypted form rather than the raw data, and to prevent the misuse of data. The main challenge is to securely process or analyze these encrypted data without disclosing any useful information, and to achieve the rights management efficiently. In this paper, we propose the encrypted data processing protocols for cloud computing by utilizing additively homomorphic encryption and proxy cryptography. For the traditional homomorphic encryption schemes with many limitations, which are not suitable for cloud computing applications. We simulate a cloud computing scenario with flexible access control and extend the original homomorphic cryptosystem to suit our scenario by supporting various arithmetical calculations. We also prove the correctness and security of our protocols, and analyze the advantages and performance by comparing with some latest works.

KEYWORDS Cloud Computing, Privacy, Homomorphic Encryption, Proxy Cryptography

1. INTRODUCTION Cloud computing is a style of computing in which dynamically scalable and often virtualized resources are provided as a service over Internet, it describes a type of outsourcing of computer services. With the rapid development of cloud computing, there are an increasing number of cloud-based services, such as Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS). Under the cloud computing architecture, information is permanently stored in servers on the Internet and cached temporarily on clients [1], users and service providers are separated, data owners and custodians are separated, so the data owners do not have the full control over their own private data, the service provider can access the data that is in the cloud at any time. The cloud providers may share private information with third parties without the permission of the data owners, it is inevitably to incur some new privacy issues. At present, the urgent problem is to study how to protect user privacy efficiently under the cloud computing. To the best of our knowledge, a promising solution to solve such privacy issues is to encrypt the DOI:10.5121/acij.2018.9601

1


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.