Skip to main content
Log in

A Design of System using homomorphic encryption for multimedia data management

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

With the introduction of the concept of information warfare, the way military operations are done is changing quickly. Now, much more than it was in past, quick acquisition of information and effective decision making are crucial. Especially, these days the ratio of multimedia data is on the rise. A data management system has been put in place since the 1980s which encrypts information before storing it, and allowing only authorized users to gain access to it according to the proper procedures.

In this paper, a secure and effective multimedia data management system that uses homomorphic operations is designed and implemented. By using homomorphic operations, it is able to quickly process stored ciphertext without a decryption process, allowing fast decision making after information gathering in a NCW environment. In order to assess the performance of the effective multimedia data management system implemented in this paper, it was compared to an ordinary system in which ciphertext has to be first decrypted before it can be modified. The secure and effective multimedia data management system for information warfare implemented in this study is highly versatile because any public encryption algorithm can be used, and has short response times thanks to the homomorphic algorithm which allows processing to be done directly on the ciphertext.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Alabdulatif A, Mohammed K (2016) Privacy preserving cloud computation using Domingo-Ferrer scheme. Journal of King Saud University-Computer and Information Sciences 28(1):27–36

    Article  Google Scholar 

  2. Artur T (2014) A high-order compact difference algorithm for half-staggered grids for laminar and turbulent incompressible flows. Journal of Computational Physics 276:438–467

    Article  MathSciNet  MATH  Google Scholar 

  3. Engouang DT, Yun L, Jiang ZZ (2014) Pallier based homomorphic encrypted data aggregation in wireless sensor networks. Applied Mechanics and Materials (543):3017–3022

  4. Ertaul L, Johan Hadiwijaya Y, Gokay S (2015) Analyzing homomorphic encryption schemes in securing wireless sensor networks (WSN). International Journal of Computer Science and Network Security (IJCSNS) 15(5):1–11

    Google Scholar 

  5. Hayward R, Chiang C-C (2015) Parallelizing fully homomorphic encryption for a cloud environment. Journal of Applied Research and Technology 13(2):245–252

  6. Hyun-Jong C, Jin-Mook K, Hwang-Bin R (2014) A Study of secure data management system using homomorphic encryption in defense environment. Life Science Journal 11(7s)

  7. Kim H, Lee SW (2013) Homomorphic encryption scheme and applications for cloud computing securi. Journal of the Korea Institute of Security Engineering 10(2):213–224

  8. Kim N, Lee S (2014) Design of city logging system using searchable image encryption system of streaming service. International Journal of Smart Home 8(2):7–14

  9. Louk M, Lim H (2015) Homomorphic encryption in mobile multi cloud computing. In: International conference on information networking (ICOIN) IEEE, pp 493–497

  10. Schepens J, Dijkstra T, Grootjen F (2012) Distributions of cognates in Europe as based on Levenshtein distance. Bilingualism: Lang Cogn 15(1):157–166

  11. Sen J (2013) Homomorphic encryption: theory & applications. arXiv:1305.5886

  12. Son SW, Lee JK, Lim JI, Jun TI (2008) Cryptography & network security. McGraw-Hill, Korea, 2–7, 305

  13. Song YJ, Lee SH, Kyun KY, Kyun HC (2009) EPC information search technology using Paillier encryption. Conference Of The Institute Of Electronics Engineers of Korea 32(2):423–424

  14. Song YJ, Park KY (2009) Homomorphic encryption technology for database outsourcing. Jounal of the Korea Institute of Information Security and Cryptology 19(3):80–89

    Google Scholar 

  15. Sun G, Huang S, Bao W, Yang Y, Wang Z (2014) A privacy protection policy combined with privacy homomorphism in the internet of things. In: International conference on computer communication and networks (ICCCN), pp 1–6

  16. Tirthani N, Ganesan R (2014) Data security in cloud architecture based on Diffie Hellman and elliptical curve cryptography, IACR Cryptology ePrint Archive

  17. Yang JS, Lee HJ, Park MW, Eom JH (2015) Security threats on national defense ICT based on IoT. Advanced Science and Technology Letters (UCMA) 97:94–98

    Article  Google Scholar 

Download references

Acknowledgments

Foundation item: The National Project of India (No.: xxx-xxxx). Authors are grateful to the Department of Science and Technology, Government of India for financial support to carry out this work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jin-Mook Kim.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Cha, HJ., Yang, HK., Kim, JM. et al. A Design of System using homomorphic encryption for multimedia data management. Multimed Tools Appl 76, 19897–19912 (2017). https://doi.org/10.1007/s11042-016-3767-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-3767-6

Keywords

Navigation