Abstract
“Cloud Computing” is recent buzzword in the whole IT world. It is aimed to provide IT as a service to their cloud users’ on-demand basis with better features like availability, flexibility, reliability, security, scalability and many more. In security paradigm, there is several data security issues need to be addressed. For this, homomorphic encryption scheme is discovered where cipher-texts are stored as data in cloud storage instead of plaintexts (i.e. secure information). There is no need of plaintext except at time of encryption and decryption at sender side and receiver side respectively, as whatever computations done in algorithm is done on cipher-texts only. This paper mainly focuses on cipher-text data stored in database using modified homomorphic encryption mechanism. The data stored in database having small length and complex structure which is difficult for any analysts to decipher the data.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Potey, M.M., Dhote, C.A., Sharma, D.H.: Homomorphic encryption for security of cloud data. In: 7th International Conference on Communication, Computing and Virtualization, pp. 175–181 (2016)
Yi, X., Paulet, R., Bertino, E.: Homomorphic Encryption Homomorphic Encryption and Applications, SpringerBriefs in Computer Science, pp. 27–46
Halevi, S.: Homomorphic Encryption Book on Tutorials on the Foundations of Cryptography, April 2017
Rivest, R.L., Adleman, L., Dertouzos, M.L.: On Data Banks and Privacy Homomorphisms, pp. 169–180. Academia Press, Berlin (1978)
Ahmad, I., Khandekar, A.: Homomorphic encryption method applied to cloud computing. Int. J. Inf. Comput. Technol. 4(15), 1519–1530 (2014)
Shah, S., Shah, Y., Kotak, J.: Somewhat homomorphic encryption technique with its key management protocol. Int. J. Recent Innov. Trends Comput. Commun. 2(12), 4180–4183 (2014)
Hayward, R., Chiang, C.-C.: Parallelizing fully homomorphic encryption for a cloud environment. J. Appl. Res. Technol. 13, 245–252 (2015)
Elhoseny, M., Elminir, H., Riad, A., Yuan, X.: A secure data routing schema for WSN using elliptic curve cryptography and homomorphic encryption. J. King Saud Univ. Comput. Inf. Sci. 28, 262–275 (2015)
Dasgupta, S., Pal, S.K.: Design of a polynomial ring based symmetrichomomorphic encryption scheme. Elsevier GmbH Perspect. Sci. 8, 692–695 (2016)
Vaikuntanathan, V.: Lecture on: Computing on Encrypted Data, pp. 1–6 (2013)
Raisaro, J.L., Choi, G., Pradervand, S.: Protecting privacy and security of genomic data in I2B2 with homomorphic encryption and differential privacy. IEEE/ACM Trans. Comput. Biol. Bioinf. 15, 1413–1426 (2018)
Chean, L.T., Ponnusamy, V., Fati, S.M.: Authentication scheme using unique identification method with homomorphic encryption. In: Mobile Cloud Computing: 2018 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE) (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Patel, S.J., Patel, R.R. (2019). Secure Data Using Homomorphic Encryption Technique for Generating Shorter Cipher Text in Cloud Environment. In: Hemanth, J., Fernando, X., Lafata, P., Baig, Z. (eds) International Conference on Intelligent Data Communication Technologies and Internet of Things (ICICI) 2018. ICICI 2018. Lecture Notes on Data Engineering and Communications Technologies, vol 26. Springer, Cham. https://doi.org/10.1007/978-3-030-03146-6_107
Download citation
DOI: https://doi.org/10.1007/978-3-030-03146-6_107
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-03145-9
Online ISBN: 978-3-030-03146-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)