Skip to main content

Privacy Protection of Edge Computing Using Homomorphic Encryption

  • Conference paper
  • First Online:
Pattern Recognition and Data Analysis with Applications

Abstract

The emergence in the field of Internet of Things and the success of the cloud providers have extended the horizon of the new technological model that is Edge computing. This technology has got the ability to handle problems such as improving the response time, increasing battery life, cost saving of the network, along with ensuring protection and privacy of the data. To manifest the idea of Edge Computing, here a detailed case study is presented starting from cloud architecture to the security issues, further extending to its security countermeasures using Homomorphic encryption. This article explores the security challenges and the smart way to handle them and ensure privacy to the data with nicely explained algorithms. The algorithms perform computation on the encrypted form without decryption of the ciphertext. This does not require the sharing of a secret key. The opportunities in the field of edge computing is also emphasize with the expectation that this paper will pique interest and encourage further study in this area.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Alaya, B., Laouamer, L., Msilini, N.: Homomorphic encryption systems statement. Trends and challenges. Comput. Sci. Rev. 36, 100235 (2020)

    Google Scholar 

  2. Li, J., Song, D., Chen, S., Lu, X.: A simple fully homomorphic encryption scheme available in cloud computing. In: IEEE 2nd International Conference on Cloud Computing and Intelligence Systems, pp. 214–217 (2012)

    Google Scholar 

  3. Khan, M.A., Salah, K.: IoT security: review, blockchain solutions, and open challenges. Future Gener. Comput. Syst. 82, 395–411 (2018)

    Article  Google Scholar 

  4. Ai, Y., Peng, M., Zhang, K.: Edge computing technologies for Internet of Things: a primer. Digital Commun. Networks 4(2), 77–86 (2018)

    Article  Google Scholar 

  5. Magesh, S., Indumathi, J., Radha RamMohan, S., Niveditha, V.R., Shanmuga Prabha, P.: Concepts and contributions of edge computing in Internet of Things (IoT): a survey. Int. J. Comput. Networks Appl. 7(5), 146–156 (2020)

    Google Scholar 

  6. Faisal, M., Ali, I., Khan, M.S., Kim, S.M., Kim, J.: Establishment of trust in Internet of Things by integrating trusted platform module: to counter cybersecurity challenges. Complexity (2020)

    Google Scholar 

  7. Caprolu, M., Pietro, R.D., Lombardi, F., Raponi, S.: Edge computing perspectives: architectures, technologies, and open security issues. In: IEEE International Conference on Edge Computing (EDGE) 2019, pp. 116–123 (2019)

    Google Scholar 

  8. Alwarafy, A., Al-Thelaya, K.A., Abdallah, M., Schneider, J., Hamdi, M.: A survey on security and privacy issues in edge-computing-assisted Internet of Things. IEEE Internet Things J. 8(6), 4004–4022 (2021)

    Article  Google Scholar 

  9. Wu, H., Zhang, Z., Guan, C., Wolter, K., Xu, M.: Collaborate edge and cloud computing with distributed deep learning for smart city internet of things. IEEE Internet Things J. 7(9), 8099–8110 (2020)

    Article  Google Scholar 

  10. Abawajy, J.: User preference of cyber security awareness delivery methods. Behav. Inf. Technol. 33(3), 237–248 (2014)

    Article  MathSciNet  Google Scholar 

  11. Murugesan, A., Saminathan, B., Al-Turjman, F., Kumar, R.L.: Analysis on homomorphic technique for data security in fog computing. Trans. Emerg. Telecommun. Technol. 1–16 (2020)

    Google Scholar 

  12. Yan, X., Wu, Q., Sun, Y.: A homomorphic encryption and privacy protection method based on blockchain and edge computing. Wirel. Commun. Mobile Comput. 2020 (2020)

    Google Scholar 

  13. Mannanuddin, K., Kumar, M.R., Aluvala, S., Nagender, Y.: Fundamental perception of EDGE computing. In: International Conference on Recent Advancements in Engineering and Management, vol. 981. Warangal, India (2020)

    Google Scholar 

  14. Parikh, S., Dave, D., Patel, R., Doshi, N.: Security and privacy issues in cloud, fog and edge computing. Proc. Comput. Sci. 160, 734–739 (2019)

    Article  Google Scholar 

  15. Shi, W., Cao, J., Zhang, Q., Li, Y., Xu, L.: Edge computing: vision and challenges. IEEE Internet Things J. 3(5), 637–646 (2016)

    Article  Google Scholar 

  16. Faruque, M.A., Vatanparvar, K.: Energy management-as-a-service over fog computing platform. IEEE Internet Things J. 3(2), 161–169 (2016)

    Article  Google Scholar 

  17. Alabdulatif, A., Khalil, I., Yi, X.: Towards secure big data analytic for cloud-enabled applications with fully homomorphic encryption. J. Parallel Distrib. Comput. 137, 192–204 (2019)

    Article  Google Scholar 

  18. Lin, H., Bergmann, N.W.: IoT privacy and security challenges for smart home environments. Information 7(3), 44 (2016)

    Article  Google Scholar 

  19. Elhassani, M., Boulbot, A., Chillali, A., Mouhib, A.: Fully homomorphic encryption scheme on a non-commutative ring R. In: International Conference on Intelligent Systems and Advanced Computing Sciences (ISACS) 2019, pp. 1–4 (2019)

    Google Scholar 

  20. Wang, B., Zhan, Y., Zhang, Z.: Cryptanalysis of a symmetric fully homomorphic encryption scheme. IEEE Trans. Inf. Forensics Secur. 13(6), 1460–1467 (2018)

    Article  Google Scholar 

  21. Zhang, Y.J., Shang, T., Liu, J.W., Wu, W.: Quantum homomorphic encryption based on quantum obfuscation. In: International Wireless Communications and Mobile Computing (IWCMC) 2020, pp. 2010–2015 (2020)

    Google Scholar 

  22. Morampudi, M.K., Prasad, M.V.N.K., Raju, U.S.N.: Privacy-preserving iris authentication using fully homomorphic encryption. Multimed. Tools Appl. 79, 19215–19237 (2020)

    Article  Google Scholar 

  23. Varghese, B., Wang, N., Barbhuiya, S., Kilpatrick, P., Nikolopoulos, D.S.: Challenges and opportunities in edge computing. In: IEEE International Conference on Smart Cloud (SmartCloud) 2016, pp. 20–26 (2016)

    Google Scholar 

  24. Manzoor, A., Braeken, A., Kanhere, S.S., Ylianttila, M., Liyanage, M.: Proxy re-encryption enabled secure and anonymous IoT data sharing platform based on blockchain. J. Network Comput. Appl. 176 (2021)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ganesh Kumar Mahato .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mahato, G.K., Chakraborty, S.K. (2022). Privacy Protection of Edge Computing Using Homomorphic Encryption. In: Gupta, D., Goswami, R.S., Banerjee, S., Tanveer, M., Pachori, R.B. (eds) Pattern Recognition and Data Analysis with Applications. Lecture Notes in Electrical Engineering, vol 888. Springer, Singapore. https://doi.org/10.1007/978-981-19-1520-8_31

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-1520-8_31

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-1519-2

  • Online ISBN: 978-981-19-1520-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics