Skip to main content

2023 | OriginalPaper | Buchkapitel

An Enhanced Encryption Scheme for Cloud Security

verfasst von : Pratyaksha Ranawat, Mayank Patel, Ajay Kumar Sharma

Erschienen in: Proceedings of Fourth International Conference on Computing, Communications, and Cyber-Security

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud computing is a technique that connects a large number of systems with either public or private network, providing dynamic scalability for data storage, building applications, and other services. The consumers are charged only for the resources they consume. Cloud computing provides enormous applications and benefits in the IT field, but all the facilities need to be completely secured and protected. Removing security risks and maintaining privacy are essential for securing cloud computing. Several encryption algorithms are used for encrypting data in the cloud. Homomorphic encryption is an advantageous technique in cloud computing because it allows the cloud service providers to work on encrypted data. Thus, it ensures the privacy of sensitive data and denies access to data by cloud providers. Nevertheless, this homomorphic encryption technique has a problem with key sharing and management. Hence, to provide efficient key management, the technique of particle swarm optimization is used along with homomorphic encryption. Data to be encrypted is taken as input and treated as the initial population. PSO generates the key for encryption; then, the data is encrypted using homomorphic encryption. We have used MATLAB to implement this proposed encryption algorithm. Performance is analyzed on the basis of the time taken to execute and the utilization of resources. The observations made suggest that the enhanced algorithm executes well and provides better results as compared to the existing algorithm. It shows less time taken to execute and requirement of less number of resources. Hence, the proposed scheme ensures cloud security efficiently.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Aggarwal N, Gupta CP, Sharma I (2014) Fully homomorphic symmetric scheme without bootstrapping. IEEE Aggarwal N, Gupta CP, Sharma I (2014) Fully homomorphic symmetric scheme without bootstrapping. IEEE
2.
Zurück zum Zitat Will MA, Nicholson B, Tiehuis M, Ko RK (2015) Secure voting in the cloud using homomorphic encryption and mobile agents. IEEE Will MA, Nicholson B, Tiehuis M, Ko RK (2015) Secure voting in the cloud using homomorphic encryption and mobile agents. IEEE
3.
Zurück zum Zitat Kaur S, Wasson V (2015) Enhancement in homomorphic encryption scheme for cloud data security. In: 9th international conference on next generation mobile applications, services and technologies (2015) Kaur S, Wasson V (2015) Enhancement in homomorphic encryption scheme for cloud data security. In: 9th international conference on next generation mobile applications, services and technologies (2015)
4.
Zurück zum Zitat Louk M, Lim H (2015) Homomorphic encryption in mobile multi-cloud computing. IEEE Louk M, Lim H (2015) Homomorphic encryption in mobile multi-cloud computing. IEEE
5.
Zurück zum Zitat Anand V, Satapathy SC (2016) Homomorphic encryption for secure information retrieval from the cloud. IEEE Anand V, Satapathy SC (2016) Homomorphic encryption for secure information retrieval from the cloud. IEEE
6.
Zurück zum Zitat Chen J (2016) Cloud storage third party data security scheme based on fully homomorphic encryption. In: International conference on network and information systems for computers Chen J (2016) Cloud storage third party data security scheme based on fully homomorphic encryption. In: International conference on network and information systems for computers
7.
Zurück zum Zitat Makwana S (2017) An application of homomorphic encryption on IoT-based greenhouse. In: International conference on energy, communication, data analytics and soft computing Makwana S (2017) An application of homomorphic encryption on IoT-based greenhouse. In: International conference on energy, communication, data analytics and soft computing
8.
Zurück zum Zitat Rangasami K, Vagdevi S (2017) Comparative study of homomorphic encryption methods for secured data operations in cloud computing. In: International conference on electrical, electronics, communication, computer, and optimization techniques Rangasami K, Vagdevi S (2017) Comparative study of homomorphic encryption methods for secured data operations in cloud computing. In: International conference on electrical, electronics, communication, computer, and optimization techniques
9.
Zurück zum Zitat Das D (2018) Secure cloud computing algorithm using homomorphic encryption and multi-party computation. IEEE Das D (2018) Secure cloud computing algorithm using homomorphic encryption and multi-party computation. IEEE
10.
Zurück zum Zitat Shankar K, Ilayaraja M (2018) Secure optimal k-NN on encrypted cloud data using homomorphic encryption with query users. In: International conference on computer communication and informatics Shankar K, Ilayaraja M (2018) Secure optimal k-NN on encrypted cloud data using homomorphic encryption with query users. In: International conference on computer communication and informatics
Metadaten
Titel
An Enhanced Encryption Scheme for Cloud Security
verfasst von
Pratyaksha Ranawat
Mayank Patel
Ajay Kumar Sharma
Copyright-Jahr
2023
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-99-1479-1_58