Reference Hub4
Asymmetric Encryption Scheme to Protect Cloud Data Using Paillier-Cryptosystem

Asymmetric Encryption Scheme to Protect Cloud Data Using Paillier-Cryptosystem

Jaydip Kumar, Vipin Saxena
Copyright: © 2021 |Volume: 12 |Issue: 2 |Pages: 9
ISSN: 1942-3594|EISSN: 1942-3608|EISBN13: 9781799860778|DOI: 10.4018/IJAEC.2021040104
Cite Article Cite Article

MLA

Kumar, Jaydip, and Vipin Saxena. "Asymmetric Encryption Scheme to Protect Cloud Data Using Paillier-Cryptosystem." IJAEC vol.12, no.2 2021: pp.50-58. http://doi.org/10.4018/IJAEC.2021040104

APA

Kumar, J. & Saxena, V. (2021). Asymmetric Encryption Scheme to Protect Cloud Data Using Paillier-Cryptosystem. International Journal of Applied Evolutionary Computation (IJAEC), 12(2), 50-58. http://doi.org/10.4018/IJAEC.2021040104

Chicago

Kumar, Jaydip, and Vipin Saxena. "Asymmetric Encryption Scheme to Protect Cloud Data Using Paillier-Cryptosystem," International Journal of Applied Evolutionary Computation (IJAEC) 12, no.2: 50-58. http://doi.org/10.4018/IJAEC.2021040104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Cloud computing is used for large shared resources to facilitate execution and storage. So there is a need of resolving crucial security issues to avoid data theft. Hence cloud security provides data encryption for security parameters to change plain-text to cipher-text. The homomorphic encryption technique is used for performing operations on encrypted data. To manage the huge and growing informational collections that are being prepared these days, great encryption execution is a significant advance for the common sense of homomorphic encryption techniques, the Paillier cryptosystem is also used by researchers for securing the decimal digits of information. In the present work, a hybrid Paillier cryptosystem technique is used for reducing the bit length of the cipher-text by performing hex code operations on encryption. The proposed method has been implemented in the use of two object-oriented programming languages i.e. C++ and Python programming languages. The simulated results show the minimum encrypted bit length as well as provide more secure data. And we have also analyzed our algorithm based on the two parameters namely space complexity and time complexity which are represented in the form of tables and graphs given below.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.