A Comparative Study of Privacy-Preserving Homomorphic Encryption Techniques in Cloud Computing

A Comparative Study of Privacy-Preserving Homomorphic Encryption Techniques in Cloud Computing

Bineet Joshi, Bansidhar Joshi, Anupama Mishra, Varsha Arya, Avadhesh Kumar Gupta, Dragan Peraković
Copyright: © 2022 |Pages: 11
DOI: 10.4018/IJCAC.309936
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

In cloud computing, a third party hosts a client's data, which raises privacy and security concerns. To maintain privacy, data should be encrypted by cryptographic techniques. However, encrypting the data makes it unsuitable for indexing and fast processing, as data needs to be decrypted to plain text before it can be further processed. Homomorphic encryption helps to overcome this shortcoming by allowing users to perform operations on encrypted data without decryption. Many academics have attempted to address the issue of data security, but none have addressed the issue of data privacy in cloud computing as thoroughly as this study has. This paper discusses the challenges involved in maintaining the privacy of cloud-based data and the techniques used to address these challenges. It was identified that homomorphic encryption is the best solution of all. This work also identified and compared the various homomorphic encryption schemes which are capable of ensuring the privacy of data in cloud storage and ways to implement them through libraries.
Article Preview
Top

Introduction

Cloud computing is one of the very few technologies that has gained popularity not only in research areas but has also become a commercial success. As per the national institute of standards and technology’s (NIST) definition given by Mell & Grance (2011), “Cloud computing is a model for providing convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with little management effort or interaction from service providers”.

Cloud computing offers flexible resources to consumers based on their needs. This strategy is effective for both over- and under-allocating resources. Typically, cloud computing is categorised by its deployment or service model. Figure 1 depicts cloud models based on the NIST defining framework.

Low-cost computing and storage in the cloud have changed the way businesses and individuals use and manage data in a big way. However, many businesses are hesitant to store their applications and data on systems that aren't located in their own data centers because of privacy issues in cloud computing. Customers' confidential information is at greater danger of unauthorized access and exposure as workloads are migrated to a shared infrastructure.

Figure 1.

Cloud computing framework

IJCAC.309936.f01

With growing concern about data privacy around the world, every government is pressing for stricter legislation. It is critical to find solutions that can give the benefits of cloud computing while also keeping an eye on the regulations that must be obeyed to ensure data privacy. Many researchers like Zheng et al. (2017), Zhang et al. (2018), and Gupta (2020), have given a new direction in this area by presenting a novel cloud-based encryption frameworks. However, in order to accomplish even the most elementary operations on the encrypted data, one of two things must happen: either the cloud server must have access to the secret key, raising concerns about data privacy; or the record owner must download, decrypt, and work on the data locally, which can be expensive and logistically challenging.

As suggested by Homomorphic Encryption Standardization in the year 2018, homomorphic encryption (HE) can be used to greatly simplify this situation because it can act directly on the cipher text and return output in the encrypted form to the owner of the data. So it can also be used to protect the private data. This property of the homomorphic encryption algorithms makes them suitable candidates for providing data privacy in cloud computing.

In this paper, various privacy concerns associated with cloud data storage are discussed. The goal of this work is to figure out which of the many ways to protect the privacy of data in the cloud is the best. This paper identifies that homomorphic encryption has more promise than other methods. A comparison of various homomorphic encryption systems (HES) is presented. The libraries developed by industry and research groups to implement these schemes have been discussed.

This paper provides a comprehensive overview of data privacy, particularly as it relates to cloud computing, and the significance of homomorphic encryption in preserving it. This work fills the gaps in previous research, which focused more on designing the algorithm but not on its implementation issues and use in industry. To the best of our knowledge, this is the first time that the HES implementation schemes have been discussed and compared in a research work.

The rest of the paper is organized as follows: In the second section, we discuss the definition of privacy in the context of cloud computing as well as the difficulties associated with preserving it in the cloud. The different categories of homomorphic encryption systems, their working and the operations performed on them are given in the third section. In the fourth section, a comparison of various privacy-preserving homomorphic encryption systems and their implementations is presented. Section five contains the paper's conclusions and future scope.

Complete Article List

Search this Journal:
Reset
Volume 14: 1 Issue (2024)
Volume 13: 1 Issue (2023)
Volume 12: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 11: 4 Issues (2021)
Volume 10: 4 Issues (2020)
Volume 9: 4 Issues (2019)
Volume 8: 4 Issues (2018)
Volume 7: 4 Issues (2017)
Volume 6: 4 Issues (2016)
Volume 5: 4 Issues (2015)
Volume 4: 4 Issues (2014)
Volume 3: 4 Issues (2013)
Volume 2: 4 Issues (2012)
Volume 1: 4 Issues (2011)
View Complete Journal Contents Listing