Skip to main content
Log in

Homomorphic encryption algorithm providing security and privacy for IoT with optical fiber communication

  • Published:
Optical and Quantum Electronics Aims and scope Submit manuscript

Abstract

Data privacy is becoming more important as the internet of things (IoT) rapidly expands. There are significant consequences for the broad adoption of the internet of things. Homomorphic encryption is one possible solution for protecting sensitive data in the IoT. However, there is a great deal of potential for efficiency gains. In order to get enough privacy and security, it is also crucial. Our homomorphic encryption technique for secure and private optical fibre communication is detailed in this publication. The data owner, fog server, and data consumers’ privacy is the primary focus of the proposed architectural design. The performance of this research shows that our FCHE solution improves data security throughout the data storage operation and reduces encryption length. This research also aims to analyse the factors of optical fiber communication cost, storage cost, and computing cost in the context of FCHE.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

Data availability

Data sharing not applicable to this article as no datasets were generated or analysed during the current study.

References

  • Alam, T.: A reliable communication framework and its use in internet of things (IoT). CSEIT1835111| Received. 10: 450–456 (2018)

  • Alqahtani, A.S., et al.: Investigation of hybrid spectrum slicing-wavelength division multiplexing (SS-WDM) in transparent medium for mode division multiplexing applications. Opt. Quantum. Electron. 55(3), 243 (2023)

    Article  MathSciNet  Google Scholar 

  • Ashik, M.H., Maswood, M.M., Alharbi, A.G.: Designing a fog-cloud architecture using blockchain and analyzing security improvements. In: 2020 International Conference on Electrical, Communication and Computer Engineering (ICECCE). IEEE, (2020)

  • Brakerski, Z., Gentry, C., Halevi, S.: Packed ciphertexts in LWE-based homomorphic encryption. Public-Key Cryptography–PKC 2013: 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26–March 1, 2013. Proceedings 16. Springer, Berlin (2013)

  • DaXu, L., He, W., Li, S.: Internet of things in industries: a survey. IEEE. Trans. Ind. Inform. 10(4), 2233–2243 (2014)

    Article  Google Scholar 

  • Gao, Weichao, et al.: Privacy-preserving auction for big data trading using homomorphic encryption. IEEE Trans. Netw. Sci. 7(2), 776–791 (2018)

  • Guha Roy, D.: Blockedge: a privacy-aware secured edge computing framework using blockchain for industry 4.0. Sensors. 23(5), 2502 (2023)

    Article  PubMed  PubMed Central  ADS  Google Scholar 

  • Han, J.L., et al.: The implemention and application of fully homomorphic encryption scheme. In: 2012 Second International Conference on Instrumentation, Measurement, Computer, Communication and Control. IEEE (2012)

  • Jiang, H.: Secure storage of computer network data based on cloud computing. Scalable. Comput. Pract. Exp. 24(4), 663–672 (2023)

    Article  Google Scholar 

  • Kamruzzaman, M.M., et al.: Design of circular photonic crystal fiber for OAM extraction SDM applications. Opt. Quant. Electron. 54(12), 864 (2022)

    Article  CAS  Google Scholar 

  • Kumar, S., Tiwari, P., Zymbler, M.: Internet of things is a revolutionary approach for future technology enhancement: a review. J. Big. Data. 6(1), 1–21 (2019)

    Article  Google Scholar 

  • Liu, X., Yang, Y., Choo, K.K., Wang, H.: Security and privacy challenges for internet-of-things and fog computing. Wirel. Commun. Mobile. Comput. 2018, 9373961 (2018)

    Article  Google Scholar 

  • Ma, Y., Wu, Y., Li, J., Ge, J.: “APCN: a scalable architecture for balancing accountability and privacy in large-scale content-based networks. Inf. Sci. 527, 511–532 (2020)

    Article  MathSciNet  Google Scholar 

  • Mahato, G.K., Chakraborty, S.K.: A comparative review on homomorphic encryption for cloud security. IETE J. Res. 69(8), 5124–5133 (2023)

    Article  Google Scholar 

  • Mohan Das, R., et al.: A novel deep learning-based approach for detecting attacks in social IoT. Soft. Comput. 1–11 (2023)

  • Nagajayanthi, B.: Decades of internet of things towards twenty-first century: a research-based introspective. Wirel. Pers. Commun. 123(4), 3661–3697 (2022)

    Article  CAS  PubMed  Google Scholar 

  • Pătraşcu, A., Maimuţ, D., Simion, E.: New directions in cloud computing. A security perspective. In: 2012 9th International Conference on Communications (COMM). IEEE (2012)

  • Ramesh Kumar, M., Sudhakaran, P.: Comprehensive survey on detecting security attacks of IoT intrusion detection systems. Adv. Sci. Techno. 124, 738–747 (2023)

    Article  Google Scholar 

  • Ray, P.P.: A survey on internet of things architectures. J. King Saud. Univ. Comput. Inf. Sci. 30(3), 291–319 (2018)

    Google Scholar 

  • Silva, L.V., et al.: Security and privacy preserving data aggregation in cloud computing. Proceedings of the Symposium on Applied Computing. (2017)

  • Singh, D., et al.: Security issues in IoT and their countermeasures in smart city applications. Advanced computing and intelligent engineering: Proceedings of ICACIE 2018. Vol 2, pp. 301–313. Springer, Singapore (2020)

  • Tao, H., Bhuiyan, M.Z., Abdalla, A.N., Hassan, M.M., Zain, J.M., Hayajneh, T.: Secured data collection with hardware-based ciphers for IoT-based healthcare. IEEE Internet Things J. 6(1), 410–420 (2018)

    Article  Google Scholar 

  • Vikas, B.O.: Internet of things (iot): a survey on privacy issues and security. Int. J. Sci. Res. Sci. Eng. Technol. 1(3), 168–173 (2015)

    Google Scholar 

  • Wang, H., Wang, Z., Domingo-Ferrer, J.: Anonymous and secure aggregation scheme in fog-based public cloud computing. Futur. Gener. Comput. Syst.. Gener. Comput. Syst. 78, 712–719 (2018)

    Article  Google Scholar 

  • Wang, J., et al.: Flow tracer: An effective flow trajectory detection solution based on probabilistic packet tagging in SDN-enabled networks. IEEE Trans. Netw. Serv. Manag.netw. Serv. Manag. 16(4), 1884–1898 (2019)

    Article  Google Scholar 

  • Yang, Y., Chen, X., Tan, R., Xiao, Y.: Intelligent IoT for the Digital World: Incorporating 5G Communications and Fog/Edge Computing Technologies. John Wiley & Sons, Hoboken (2021)

    Book  Google Scholar 

  • Yao, Z., Ge, J., Wu, Y., Jian, L.: A privacy preserved and credible network protocol. J. Parallel. Distrib. Comput. 132, 150–159 (2019)

    Article  Google Scholar 

Download references

Acknowledgements

The authors are thankful to the Deanship of Scientific Research-Research Center at King Khalid University in Saudi Arabia for Funding this research (Code Number: RGP 2/15/44).

Funding

Funding were provided by Deanship of Scientific Research, King Khalid University, Grant number: RGP 2/15/44.

Author information

Authors and Affiliations

Authors

Contributions

ASA, YT and PE: Conceptualization, methodology, visualization, investigation, data validation and writing—original draft preparation; RK, SL and SS: Data curation, reviewing and editing.

Corresponding author

Correspondence to Abdulrahman Saad Alqahtani.

Ethics declarations

Conflict of interest

The authors declare that they do not have any competing interest. The authors of this research acknowledge that they are not involved in any financial interest.

Ethics approval and consent to participate

Not applicable.

Informed consent

Not applicable.

Consent for publication

Not applicable. The authors certify that this material or similar material has not been and will not be submitted to or published in any other publication before. Furthermore, the authors certify that they have participated sufficiently in the work to take public responsibility for the content, including participation in the concept, design, analysis, writing, or revision of the manuscript.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Alqahtani, A.S., Trabelsi, Y., Ezhilarasi, P. et al. Homomorphic encryption algorithm providing security and privacy for IoT with optical fiber communication. Opt Quant Electron 56, 487 (2024). https://doi.org/10.1007/s11082-023-06098-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11082-023-06098-5

Keywords

Navigation