Secure Data Using Homomorphic Encryption Technique for Generating Shorter Cipher Text in Cloud Environment

  • Swachil J. Patel
  • Ronak R. Patel
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 26)


“Cloud Computing” is recent buzzword in the whole IT world. It is aimed to provide IT as a service to their cloud users’ on-demand basis with better features like availability, flexibility, reliability, security, scalability and many more. In security paradigm, there is several data security issues need to be addressed. For this, homomorphic encryption scheme is discovered where cipher-texts are stored as data in cloud storage instead of plaintexts (i.e. secure information). There is no need of plaintext except at time of encryption and decryption at sender side and receiver side respectively, as whatever computations done in algorithm is done on cipher-texts only. This paper mainly focuses on cipher-text data stored in database using modified homomorphic encryption mechanism. The data stored in database having small length and complex structure which is difficult for any analysts to decipher the data.


Cloud Encryption homomorphic Security 


  1. 1.
    Potey, M.M., Dhote, C.A., Sharma, D.H.: Homomorphic encryption for security of cloud data. In: 7th International Conference on Communication, Computing and Virtualization, pp. 175–181 (2016)CrossRefGoogle Scholar
  2. 2.
    Yi, X., Paulet, R., Bertino, E.: Homomorphic Encryption Homomorphic Encryption and Applications, SpringerBriefs in Computer Science, pp. 27–46zbMATHGoogle Scholar
  3. 3.
    Halevi, S.: Homomorphic Encryption Book on Tutorials on the Foundations of Cryptography, April 2017Google Scholar
  4. 4.
    Rivest, R.L., Adleman, L., Dertouzos, M.L.: On Data Banks and Privacy Homomorphisms, pp. 169–180. Academia Press, Berlin (1978)Google Scholar
  5. 5.
    Ahmad, I., Khandekar, A.: Homomorphic encryption method applied to cloud computing. Int. J. Inf. Comput. Technol. 4(15), 1519–1530 (2014)Google Scholar
  6. 6.
    Shah, S., Shah, Y., Kotak, J.: Somewhat homomorphic encryption technique with its key management protocol. Int. J. Recent Innov. Trends Comput. Commun. 2(12), 4180–4183 (2014)Google Scholar
  7. 7.
    Hayward, R., Chiang, C.-C.: Parallelizing fully homomorphic encryption for a cloud environment. J. Appl. Res. Technol. 13, 245–252 (2015)CrossRefGoogle Scholar
  8. 8.
    Elhoseny, M., Elminir, H., Riad, A., Yuan, X.: A secure data routing schema for WSN using elliptic curve cryptography and homomorphic encryption. J. King Saud Univ. Comput. Inf. Sci. 28, 262–275 (2015)Google Scholar
  9. 9.
    Dasgupta, S., Pal, S.K.: Design of a polynomial ring based symmetrichomomorphic encryption scheme. Elsevier GmbH Perspect. Sci. 8, 692–695 (2016)Google Scholar
  10. 10.
    Vaikuntanathan, V.: Lecture on: Computing on Encrypted Data, pp. 1–6 (2013)Google Scholar
  11. 11.
    Raisaro, J.L., Choi, G., Pradervand, S.: Protecting privacy and security of genomic data in I2B2 with homomorphic encryption and differential privacy. IEEE/ACM Trans. Comput. Biol. Bioinf. 15, 1413–1426 (2018)Google Scholar
  12. 12.
    Chean, L.T., Ponnusamy, V., Fati, S.M.: Authentication scheme using unique identification method with homomorphic encryption. In: Mobile Cloud Computing: 2018 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE) (2018)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Computer Engineering DepartmentSPCEGandhinagarIndia
  2. 2.Information Technology DepartmentSPCEGandhinagarIndia

Personalised recommendations