Skip to main content
Log in

Design of fully homomorphic multikey encryption scheme for secured cloud access and storage environment

  • Published:
Journal of Intelligent Information Systems Aims and scope Submit manuscript

Abstract

Cloud hosting is a kind of storage that enables users to access, save, and manage their data in a secure and private cloud environment. As a result of this choice, users are no longer need to maintain and build their storage infrastructure on their computers or servers. Many businesses are hesitant to embrace cloud storage because of the complexities of data privacy and security issues. An easy-to-use and secure method for cloud storage sharing and data access is proposed in this study, which may be implemented quickly and easily. This solution requires users to have a secure password and biometric data in order to function properly. Their capacity to deceive consumers into disclosing critical information to their service providers is the primary reason for this problem. Cloud storage systems must have a secure framework in place in order for users to connect to and interact with one another. Many benefits of cloud storage exist, including enabling users to store and manage their data in a safe environment. Users can regulate and manage their data security while using cloud storage services. While implementing a safe and authenticated data storage model, this article addresses the different elements that must be taken into consideration. Several procedures have been established to deal with this problem. Unfortunately, they are not sufficiently secure to prevent a wide variety of security intrusions from taking place on them. When encrypting stored cloud data, the Fully Homomorphic multikey Encryption (FHE) algorithm is utilized. They also have a vulnerability in their protocol that makes it susceptible to both user and serverside attacks. When it comes to remote access, cloud data and data sharing between geographically dispersed devices is a reliable protocol to use.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Data Availability

Data analyzed during the research is available upon reasonable request.

References

  • Albrecht, M., Chase, M., Chen, H., Ding, J., Goldwasser, S., Gorbunov, S., Halevi, S., Hoffstein, J., Laine, K., Lauter, K., & et al. (2019). Homomorphic encryption standard. Cryptology ePrint Archive.

  • Ghaffar, Z., Ahmed, S., Mahmood, K., Islam, S.H., Hassan, M.M., & Fortino, G. (2020). An improved authentication scheme for remote data access and sharing over cloud storage in cyber-physical-social-systems. IEEE Access, 8, 47144–47160.

    Article  Google Scholar 

  • Karati, A., Amin, R., Mohit, P., Sureshkumar, V., & Biswas, G.P. (2021). Design of a secure file storage and access protocol for cloud-enabled internet of things environment. Computers and Electrical Engineering, 94, 107298.

    Article  Google Scholar 

  • Kaleem, M.A., Khan, P.M., & Khan, U.A. (2021). Strengthening of homomorphic encryption scheme for cloud environment using particle optimization algorithm. In 2021 Fourth international conference on computational intelligence and communication technologies (CCICT) (pp. 397–405). IEEE.

  • Li, X., Kumari, S., Shen, J., Wu, F., Chen, C., & Islam, S.K. (2017). Secure data access and sharing scheme for cloud storage. Wireless Personal Communications, 96(4), 5295–5314.

    Article  Google Scholar 

  • Liu, J., Wang, C., Tu, Z., Wang, X.A., Lin, C., & Li, Z. (2021). Secure KNN classification scheme based on homomorphic encryption for cyberspace. Security and Communication Networks, 2021.

  • Rawal, B.S., & Vivek, S.S. (2017). Secure cloud storage and file sharing. 2017 IEEE international conference on smart cloud (SmartCloud). https://doi.org/10.1109/smartcloud.2017.19.

  • Yang, X., Zheng, S., Zhou, T., Liu, Y., & Che, X. (2021). Optimized relinearization algorithm of the multikey homomorphic encryption scheme. Tsinghua Science and Technology, 27(3), 642–652.

    Article  Google Scholar 

  • Zhou, L., Li, X., Yeh, K.-H., Su, C., & Chiu, W. (2019). Lightweight iot-based authentication scheme in cloud computing circumstance. Future Generation Computer Systems, 91, 244–251.

    Article  Google Scholar 

  • Zhu, H., Wang, C., & Wang, X. (2021). Quantum fully homomorphic encryption scheme for cloud privacy data based on quantum circuit. International Journal of Theoretical Physics, 60(8), 2961–2975.

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dilli Babu Salvakkam.

Ethics declarations

Conflict of Interests

The authors declare that they have no conflict of interest.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Salvakkam, D.B., Pamula, R. Design of fully homomorphic multikey encryption scheme for secured cloud access and storage environment. J Intell Inf Syst (2022). https://doi.org/10.1007/s10844-022-00715-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10844-022-00715-7

Keywords

Navigation