Skip to main content
Log in

A Design of Secure Communication Protocol Using RLWE-Based Homomorphic Encryption in IoT Convergence Cloud Environment

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

A super-connected society is emerging in which things and things or people and things communicate with each other through the Internet of Things. Since devices in the existing IoT environment have limitations such as low power, volume, and performance, a new paradigm has been suggested by integrating with cloud computing technology. However, there are still issues to resolve in the new convergence paradigm in order to mitigate vulnerabilities regarding data management and information protection for security. Thus, this study designs a RLWE-based homomorphic encryption communication protocol for user authentication and message management in a cloud computing-based IoT convergence environment. We conducted performance analysis on a communication protocols in the existing IoT environment and the proposed communication protocol to ensure safety and security. The study verified safety and security by conducting performance analysis of current IoT environment communication protocol and proposed communication protocol. The study conducted comparative analysis on time complexity and space complexity in accordance with encryption and decoding of proposed communication protocol to confirm that it provides strong security and equivalent level of efficiency. Also, by designing a communication protocol, the study aimed to provided a safe communication infrastructure from user authentication to data transfer to users.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Park, J. (2014). Future of Internet of Things (1st ed.). ETNEWS.

  2. Choi, Kyung, & Kim, Mi-Hui. (2016). Reseach on convergence of internet-of-things and cloud computing. JKCA, 16(5), 1–12.

    Google Scholar 

  3. Nam, H.-J. (2017). Security and privacy issues of fog computing. KICIS, 1(42).

  4. Pyo, C. S., Kang, H. Y., Kim, N. S., & Bang, H. C. (2013). Trends and development prospects of IoT(M2M). The Journal of Korean Institute of Communication and Information Sciences, 30(8), 3–8.

    Google Scholar 

  5. Gentry, C. (2009). A fully homomorphic encryption scheme. Stanford University, Ph.D. Thesis.

  6. Cha, H.-J. (2015). Design of the secure data management system using homomorphic encryption. KICTS, 4(15).

  7. Gentry, C., & Halevi, S. (2011). Implementing gentry’s fully homomorphic encryption scheme. In Advances in Cryptology –EUROCRYPT, Lecture Notes in Computer Science (Vol. 6632, pp. 129–148).

  8. Kim, J.-H. (2013). Fully homomorphic encryption scheme without key. FHE, KICS, 5(38), 428–433.

    Article  Google Scholar 

  9. Kim, J.-H., You, S.-K., & Lee, S.-H. (2013). Fully homomorphic encryption scheme without key switching. KICS, 38(5), 428–433.

    Article  Google Scholar 

  10. Yang, H., Kim, H., Tang, D., & Li, H. An Efficient Somewhat HE scheme over Integers and Its Variation. IETE Technical Review.

  11. Song, Y.-J., & Park, K.-Y. (2009). Homomorphic encryption technique for database outsourcing. KIISC, 19(3), 80–89.

    Google Scholar 

  12. Brakerski, Z., Gentry, C., & Vaikuntanathan, V. (2011). Fully homomorphic encryption without bootstrapping. IACR Eprint Archive.

  13. Yang, H., & Kim, H. (2013). A fully homomorphic encryption scheme based on somewhat homomorphic encryption scheme with two integers. In Proceedings of KICS winter conference 2013 (pp. 76–77).

  14. Kim, S.-J., Kim, J.-M., & Cho, I.-J. (2012). Design of configuration management using homomorphic encryption in mobile cloud service. KIICE, 16(10), 2217–2223.

    Google Scholar 

  15. Kim, H.-S., & Lee, S.-W. (2013). Homomorphic encryption scheme and applications for cloud computing security. SERSC, 10(2), 213–224.

    Google Scholar 

  16. Cho, N.-S., & Hong, D.-W. (2008). Technical trend of the searchable encryption system. ETRI, 23(4).

  17. Stehle, D., & Steinfeld, R. (2010). Faster fully homomorphic encryption. Lecture Notes in Computer Science, 6477, 377–394.

    Article  MathSciNet  MATH  Google Scholar 

  18. Damgard, I., & Jurik, M. (2001). A generalization, a simplification and some applications of Paillier’s probabilistic public-key system. In Public Key Cryptography—PKC (pp. 119–136).

  19. Gennaro, R., Gentry, C., & Parno, B. (2010). Non-interactive verifiable computing: Outsourcing computation to untrusted workers. Lecture Notes in Computer Science, 6223, 465–482.

    Article  MathSciNet  MATH  Google Scholar 

  20. Rivest, R., Addleman, L., & Dertouzos, M. (1978). On data banks and privacy homomorphism. In Foundations of secure computation (pp. 169–177).

  21. Kolesnikov, V., Sadeghi, A., & Schneider, T. (2009). How to combine homomorphic encryption and garbled circuits—Improved circuits and computing the minimum distance efficiently. In: Proceedings of SPEED 2009 (pp. 100–121).

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jung-Oh Park.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jin, BW., Park, JO. & Mun, HJ. A Design of Secure Communication Protocol Using RLWE-Based Homomorphic Encryption in IoT Convergence Cloud Environment. Wireless Pers Commun 105, 599–618 (2019). https://doi.org/10.1007/s11277-018-6083-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-018-6083-9

Keywords

Navigation