An Approach for Privacy Preservation Assisted Secure Cloud Computation

Swathi Velugoti, M. P. Vani


As organizations employ technology to change their business operations
into something simpler, quicker, more secure, adaptable, and lucrative, digital transformation is assisting them in doing so. Cloud computing technology is a cornerstone to this transformation. Cloud computing imparts a more affordable, scalable, and location-independent platform for handling client data. Customers may benefit from the advantages of this new paradigm by outsourcing compute and storage requirements to public providers and paying for the services consumed. Cloud computing bestows advantageous on-the-demand oriented network ingress to specific a pool of adjustable computing resources that may be shared and which can be promptly deployed with better minimum management and efficiency oriented overhead. Cloud paradigm provides the prime and fundamental benefit of computation oriented outsourcing, where
due to customers are no longer confined by their resource-constrained devices thanks to the cloud's computing capabilities. Outsourcing allows you to save time and money. With the outsourcing problem to cloud, clients can always get the benefits of limitless computational resources in pay and use manner, free from software and hardware maintenance and operational overhead related concerns. Traditional encryption as a solution protects privacy, but restricts future data usage, reducing the fundamental economic benefits of using public cloud services dramatically. Processing on encrypted data is widely acknowledged research problem in cryptography. We offer a secure system in this study and an oracle for query vectors outsourcing using privacy homomorphism. The empirical analysis for the proposed prototype in terms of computational and security aspects, experiment results discussion is also given in this paper.

Full Text:



R. Rivest, L. Adleman, and M. Dertouzos. On data banks and privacy homomorphisms. In Foundations of Secure Computation, pp. 169-180, 1978.

S. Goldwasser, S. Micali, Probabilistic encryption and how to play mental poker keeping secret all partial information. Proc. 14th Symposium on Theory of Computing, pp. 365-377, (1982).

ElGamal T, A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory (31), pp. 469-472, 1985.

Benaloh, J. Dense Probabilistic Encryption. In: Proceedings of the Workshop on Selected Areas of Cryptography, pp. 120-128 (1994).

Naccache, David; Stern, Jacques, A New Public Key Cryptosystem Based on Higher Residues. Proceedings of the 5th ACM Conference on Computer and Communications Security. CCS’98 ACM, pp. 59-66,(1998).

Okamoto, Tatsuaki; Uchiyama, Shigenori, A new public-key cryptosystem as secure as factoring, Advances in Cryptology - EUROCRYPT’98. Lecture Notes in Computer Science, 1403. Springer, pp. 308-318, (1998).

Paillier, Pascal, Public-Key Cryptosystems Based on Composite Degree Residuosity Classes, EUROCRYPT’99. Springer, pp. 223-238, (1999).

Craig G. Fully homomorphic encryption using ideal lattices, STOC. Vol. 9. 2009.

Ivan Damgard, Mads Jurik, A Generalisation, a Simplification and Some Applications of Paillier’s Probabilistic Public-Key System. Public Key Cryptography, pp. 119-136, (2001).

Galbraith, Jay R., Organizing to Deliver Solutions, Organizational Dynamics, 31 (Autumn), pp. 194-207, (2002).

Akinori Kawachi, Keisuke Tanaka, and Keita Xagawa, Multi-bit cryptosystems based on lattice problems, In Public Key Cryptography-PKC 2007. Springer, pp. 315-329.

Peeter Laud, Alisa Pankova, On the (Im)possibility of Privately Outsourcing Linear Programming, CCSW’13, November 8, 2013, Berlin, Germany.

Lifei Wei, Haojin Zhu, Zhenfu Cao, Xiaolei Dong, Weiwei Jia, Yunlu Chen, Athanasios V. Vasilakos, Security and privacy for storage and computation in cloud computing, Information Sciences 258 (2014), pp. 371-386.

Xiaofeng Chen, Jin Li, Jianfeng Ma, Qiang Tang, Wenjing Lou, New Algorithms for Secure Outsourcing of Modular Exponentiations, IEEE Transactions on Parallel and Distributed Systems, Vol. 25, No. 9, September 2014.

Frederik Armknecht, Colin Boyd, Christopher Carr, Kristian Gjosteen, Angela Jaschke, Christian A. Reuter, Martin Strand, A Guide to Fully Homomorphic Encryption, (2015).

Jannatul Ferdush, Tasnim Mehzabin, M. M. A. Hashem, Securely Outsourcing of Large Scale Linear Fractional Programming Problem to Public Cloud, in Procs. of the IEEE 2016 5th International Conference on Informatics, Electronics and Vision (ICIEV 2016), Bangladesh.

Jianfeng Wang, Xiaofeng Chen, Efficient and Secure Storage for Outsourced Data: A Survey, Data Sci. Eng. (2016) 1(3): pp. 178-188.

Kristian Gjosteen, Martin Strand, Can there be efficient and natural FHE schemes.

Dario Fiore, Maria Isabel, Gonzalez Vasco, Claudio Soriente, Partitioned Group PasswordBased Authenticated Key Exchange, (2017).

Aayush Jain, Peter M. R. Rasmussen, Amit Sahai, Threshold Fully Homomorphic Encryption, (2017).

I-Chen Tsai, Chia-Mu Yu, Haruo Yokota, Sy-Yen Kuo, Key Management in Internet of Things via Kronecker Product, 2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing, IEEE, (2017).

Swathi, V., and M. P. Vani. ”Security and privacy challenges in cloud: survey and research direction.” International Journal of Computation Enginering Research (IJCER) 7.08 (2017): 63-72.

Swathi, V., D. Saidulu, and B. Chandrakala. ”Enabling Secure and Effective Spatial Query Processing on the Cloud using Forward Spatial Transformation.” International Journal of Computer Engineering In Research Trends 4.7 (2017): 301-307.

Bo Zhang, Boxiang Dong, Wendy Hui Wang, Integrity Authentication for SQL Query Evaluation on Outsourced Databases: A Survey, August 2018.

Yanguo Peng, Hui Li, Jiangtao Cui, Jianfeng MA, Yingfan Liu, Towards Secure Approximate k-Nearest Neighbor Query Over Encrypted High Dimensional Data, IEEE Access, Vol. 6, pp. 23137-23151, 2018.

Ahmed El-Yahyaoui, Mohamed Dafir Ech-Cherif El Kettani, An Efficient Fully Homomorphic Encryption Scheme, International Journal of Network Security, Vol.21, No.1, pp. 91-99, Jan. 2019.

Liangmin Wang, Zhendong Yang, Xiangmei Song, SHAMC: A Secure and highly available database system in multi-cloud environment, Future Generation Computer Systems, Volume 105, April 2020, pp. 873-883.

Vinod Ramesh Falmari, M. Brindha, Privacy preserving cloud based secure digital locker using Paillier based difference function and chaos based cryptosystem, Journal of Information Security and Applications, Volume 53, August 2020, p. 102513.

Swathi, V., and M. P. Vani. ”Privacy-Cheating Discouragement: A New Homomorphic Encryption Scheme for Cloud Data Security.” 2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT). IEEE, 2020.

Swathi, V., and M. P. Vani. ”A secure increased key policy attribute in cloud computing.” Journal of Innovation in Computer Science and Engineering 11.1 (2021): 26-29.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.