Advertisement

Hyper Elliptic Curve Based Homomorphic Encryption Scheme for Cloud Data Security

  • S. SelviEmail author
  • M. Gobi
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 26)

Abstract

Another rising pattern in the field in PC innovation is Cloud computing. Generally, the information was kept up and controlled in one possess servers. Cloud computing is a stretchy, savvy, and affirmed conveyance stage for giving business or shopper IT benefits in overabundance of the Internet. Today, Cloud provider gives conveyance of registering as an administration. Contingent upon the administration, the colossal data is shared over the system and this tremendous measure of information is put away in the cloud service provider. Henceforth, security is a noteworthy worry for the information in the cloud. Different encryption calculations were combined for securing the information in the cloud. Yet at the same time, the information is not secure in the cloud because of different assaults on the information. Thus, another method called Homomorphic encryption is presented which is a smart thought that enables particular operations to be performed on the scrambled information. In this paper, we propose hybrid homomorphic encryption calculation for giving improved security and secrecy of the information that is put away in the cloud. The Encryption procedure is conveyed by utilizing Hyper Elliptic Curve Cryptography (HECC) calculation, which creates a key, this resultant key is sent to the cloud provider where Homomorphic multiplicative operations are combined to the scrambled key. Hence, the encoded key is put away in the cloud which can be gotten to whenever. Since the cloud supplier has the scrambled key no other individual can have the capacity to know which operation has been performed. Consequently security and confirmation is upgraded. For the best Performance and most incredible security of cloud computing, this paper proposed homomorphic hybrid encryption strategy. Both are ideal, a mix of HECC and Homomorphic encryption to hybrid calculation. Here first we are creating key from HECC cryptosystem then these private and public keys taken after by Homomorphic with the end goal of encryption/decoding, for a safe scrambled correspondence of clients in cloud.

Keywords

Cloud computing Cloud provider Encrypted data Hyper Elliptic Curve Cryptography (HECC) Homomorphic encryption Cloud security Hybrid 

References

  1. 1.
    Ganesan, R., Gobi, M., Vivekanandan, K.: A novel digital envelope approach for a secure e-commerce channel. Int. J. Netw. Secur. 11(3), 121–127 (2010)Google Scholar
  2. 2.
    Gobi, M., Kannan, D.: A secured public key cryptosystem for biometric encryption. Int. J. Comput. Sci. Inf. Technol. 5(1), 49 (2014)Google Scholar
  3. 3.
    Selvi, S., Ganesan, R.: An efficient access control protocol for cloud data security using hyper elliptic curve cryptography. IRACST – Int. J. Comput. Netw. Wirel. Commun. (IJCNWC) 6(4), 6 (2016). ISSN: 2250-3501Google Scholar
  4. 4.
    Wankhede-Barsgade, M.T., Meshram, S.A.: Comparative study of elliptic and hyper elliptic curve cryptography in discrete logarithmic problem. IOSR J. Math. (IOSR-JM), 10(2) Ver. V, pp. 61–63, March, April 2014. www.iosrjournals.org. e-ISSN: 2278-5728, p-ISSN:2319-765XCrossRefGoogle Scholar
  5. 5.
    Gobi, M., Vivekanandan, K.: A new digital envelope approach for secure electronic medical records. CSNS Int. J. Comput. Sci. Netw. Secur. 9(1), 1 (2009). 1 Manuscript received January 5, 2009 Manuscript revised January 20 2009Google Scholar
  6. 6.
    Menezes, A.J., Wu, Y.H., Zuccherato, R.J.: An elementary introduction to hyper elliptic curves. Technical Report CORR 96-19. University of Waterloo, Ontario, Canada, November 1996Google Scholar
  7. 7.
    Lange, T.: Efficient arithmetic on genus 2 hyperelliptic curves over finite fields via explicit formulae. Cryptology ePrint Archive: Report 2002/121 (2002)Google Scholar
  8. 8.
  9. 9.
    Stallings, W.: Cryptography and Network Security: Principles and Practice, 2nd edn. Pearson Education, Boston (2002)Google Scholar
  10. 10.
    Sakai, Y., Sakurai, K.: On the practical performance of hyper-elliptic curve cryptosystems in software implementation. IEICE Trans. Fundam. E83-A(4), 692–703 (2000)Google Scholar
  11. 11.
    Stallings, W.: Cryptography and Network Security, 4th edn. Pearson Education, Boston (2006)Google Scholar
  12. 12.
    Lee, H., Alves-Foss, J., Harrison, S.: The use of encrypted functions for mobile agent security. In: 2004 Proceedings of the 37th Annual Hawaii International Conference on System Sciences, p. 10. IEEE (2004)Google Scholar
  13. 13.
    Coron, J.S., Lepoint, T., Tibouchi, M.: Practical multilinear maps over the integers. In: Advances in Cryptology–CRYPTO 2013, pp. 476–493. Springer, Heidelberg (2013)CrossRefGoogle Scholar
  14. 14.
    Ravindran, S., Kalpana, P.: Data storage security using partially homomorphic encryption in a cloud. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3(4), 603–606 (2013). ISSN: 2277 128XGoogle Scholar
  15. 15.
    Selvi, S., Gobi, M.: Improving cloud data security using hyper elliptical curve cryptography & steganography. Int. J. Sci. Res. Develop. 5(04) 2017. ISSN (online): 2321-0613Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Department of Computer SciencePSG College of Arts and ScienceCoimbatoreIndia
  2. 2.Department of Computer ScienceChikkanna Government Arts CollegeTripurIndia

Personalised recommendations