Optimizing Fully Homomorphic Encryption Algorithm using RSA and Diffie- Hellman Approach in Cloud Computing
Aparna Negi1 , Anshika Goyal2
- Computer Science & Engineering, Faculty of Technology, Uttarakhand Technical University, Dehradun, India.
- Computer Science & Engineering, Faculty of Technology, Uttarakhand Technical University, Dehradun, India.
Section:Research Paper, Product Type: Journal Paper
Volume-6 ,
Issue-5 , Page no. 215-220, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.215220
Online published on May 31, 2018
Copyright © Aparna Negi, Anshika Goyal . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Aparna Negi, Anshika Goyal, “Optimizing Fully Homomorphic Encryption Algorithm using RSA and Diffie- Hellman Approach in Cloud Computing,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.215-220, 2018.
MLA Style Citation: Aparna Negi, Anshika Goyal "Optimizing Fully Homomorphic Encryption Algorithm using RSA and Diffie- Hellman Approach in Cloud Computing." International Journal of Computer Sciences and Engineering 6.5 (2018): 215-220.
APA Style Citation: Aparna Negi, Anshika Goyal, (2018). Optimizing Fully Homomorphic Encryption Algorithm using RSA and Diffie- Hellman Approach in Cloud Computing. International Journal of Computer Sciences and Engineering, 6(5), 215-220.
BibTex Style Citation:
@article{Negi_2018,
author = {Aparna Negi, Anshika Goyal},
title = {Optimizing Fully Homomorphic Encryption Algorithm using RSA and Diffie- Hellman Approach in Cloud Computing},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2018},
volume = {6},
Issue = {5},
month = {5},
year = {2018},
issn = {2347-2693},
pages = {215-220},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1965},
doi = {https://doi.org/10.26438/ijcse/v6i5.215220}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i5.215220}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1965
TI - Optimizing Fully Homomorphic Encryption Algorithm using RSA and Diffie- Hellman Approach in Cloud Computing
T2 - International Journal of Computer Sciences and Engineering
AU - Aparna Negi, Anshika Goyal
PY - 2018
DA - 2018/05/31
PB - IJCSE, Indore, INDIA
SP - 215-220
IS - 5
VL - 6
SN - 2347-2693
ER -
VIEWS | XML | |
1361 | 580 downloads | 286 downloads |
Abstract
Cloud computing is a technology where user can store their data and any application software on it. With the use of this technology user need not to worry about the cost of hardware installation and their maintenance cost. Hence, the cloud computing security becomes the current research focus. To secure the cloud data, Encryption Scheme is used. Different encryption techniques used for security purpose like Fully Disk Encryption and Fully Homomorphic Encryption. FDE encrypts the entire disk and FHE encrypts the particular functions. FHE is used to secure the cloud data from exploitation during the computation. In this research paper, FHE encryption scheme is optimized in which the Encryption Time, Probability of Attacks and Space Used by encrypted data is reduced using RSA and Diffie- Hellman Algorithm. RSA Algorithm is applied to improve performance of FHE schemes. The Diffie- Hellman algorithm is also applied for the secure channel establishment in the fully homomorphic encryption It has been analyzed that RSA algorithm based FHE performs well as compared to Diffie- Hellman algorithm.
Key-Words / Index Term
Cloud Computing, Diffie Hellman Algorithm, RSA Algorithm, Fully Homomorphic Encryption, Security
References
[1] http://www.google.com/sans.org/rr/encryption/algorithm.php the Diffie-Hellman Algorithm Riley Lochridge April 11, 2003
[2] Craig Gentry, 2009,”full homomorphic encryption scheme”
[3] John Harauz ,Lori M. Kaufman,Bruce Potter,” Data Security in the World of Cloud Computing ” IEEE Security and Privacy July 2009. pp. 61-64
[4] van Dijk, M., Gentry, C., Halevi, S., Vaikuntanathan, V (2010) Fully homomorphic encryption over the integers. In Gilbert, H., ed.: EUROCRYPT. Volume 6110 of Lecture Notes in Computer Science., Springer
[5] Geethu Thomas, 2010,"Cloud Computing security using Encryption Technique"
[6] Sean Carlin, Kevin Curran, 2011 “Cloud Computing Security” International Journal of Ambient Computing and Intelligence, pp 14-19
[7] Shui Han, Jianchuan Xing, 2011 “Ensuring Data Storage Through A Novel Third Party Auditor Scheme in Cloud Computing” IEEE computer science & Technology, pp 264-268
[8] Dawn Song, Elaine Shi, 2012 “Cloud Data Protection for the Masses” IEEE Computer Society, pp 39-45
[9] Deyan Chen, Hong Zhao, 2012” Data Security and Privacy Protection Issues in Cloud Computing” International Conference on Computer Science and Electronics Engineering, pp 647-651
[10] Deepanchakaravarthi Purushothaman1 and Dr.Sunitha Abburu2 ,2012” An Approach for Data Storage Security in Cloud Computing” IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 2, No 1.
[11] Dian-Yuan Han, Feng-qing Zhang, 2012 “Applying Agents to the Data Security in Cloud Computing” International Conference on Computer Science and Information Processing(CSIP), pp 1126-1128
[12] Dr Nashaat el-Khameesy,Hossam Abdel Rahman, 2012 “A Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems” vol-3
[13] Simarjeet Kaur, 2012 “VSRD-IJCSIT, Vol. 2 (3), 2012, 242-249. Cryptography and Encryption In Cloud Computing, pp 242-249
[14] Young-Gi Min, Hyo-Jin Shin and Young-Hwan Bang, 2012 “Cloud Computing Security Issues and Access Control Solutions” Journal of Security Engineering, pp 135-140
[15] Yu, Z., Wang, C., Thomborson, C., Wang, J., Lian, S., & Vasilakos, A. V. (2012). A novel watermarking method for software protection in the cloud. Software: Practice and Experience, 42(4), 409-430.
[16] Ankur Mishra, Ruchita Mathur, Shishir Jain, Jitendra Singh Rathore, 2013 “Cloud Computing Security” International Journal on Recent and Innovation Trends in Computing and Computation, pp 36-39
[17] Bhavna Makhija, Vinit Kumar Gupta, 2013 “Enhanced Data Security in Cloud Computing with Third Party Auditor”, International Journal of Advanced Research in Computer Science and Software Engineering, pp 341-345
[18] Barron, C., Yu, H., & Zhan, J., 2013 “Cloud Computing Security Case Studies and Research”. Proceedings of the World Congress on Engineering 2013 Vol II
[19] Sanjoli Singla, Jasmeet Singh, 2013 “Cloud Data Security using Authentication and Encryption Technique” International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 7, July 2013, pp 2232-2235
[20] Punithasurya K, Esther Daniel, Dr. N. A. Vasanthi, 2013 “A Novel Role Based Cross Domain Access Control Scheme for Cloud Storage” International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 3, March 2013, pp 942-946
[21] Vimmi Pandey, 2013 “Securing the Cloud Environment Using OTP” International Journal of Scientific Research in Computer Science and Engineering vol-1, Issue-4
[22] Anjana Chaudhary, Ravinder Thakur, Manish Mann, 2014 "Security in Cloud Computing by using Homomorphic Encryption Scheme with Diffie-Hellman Algorithm "International Journal of Advanced Computational Engineering and Networking Volume-2, Issue-10, Oct-2014, pp 2320-2106
[23] Peidong Sha, Zhixiang Zhu, 2016 "The Modification of RSA algorithm to Adapt Fully Homomorphic Encryption Algorithm in Cloud Computing" IEEE CCIS2016
[24] Matlab Tutorial by Tutorials Point https://www.tutorialspoint.com/matlab/matlab_overview.htm
[25] Will Garner “Diffie-Hellman Key Exchange” ppts.