Open Access
Subscription Access
Open Access
Subscription Access
Hybrid Crypto System using Homomorphic Encryption and Elliptic Curve Cryptography
Subscribe/Renew Journal
Providing security and privacy for the cloud data is one of the most difficult task in recent days. The privacy of the sensitive information ought to be protecting from the unauthorized access for enhancing its security. Security is provided using traditional encryption and decryption process. One of the drawbacks of the traditional algorithm is that it has increased computational complexity, time consumption, and reduced security. We proposed a scheme in this the original data get encrypted into two different values. Using Elliptical curve cryptography (ECC) and Homomorphic are combined to provide encryption. The data in each slice can be encrypted by using different cryptographic algorithms and encryption key before storing them in the Cloud. The objective of this technique is to store data in a proper secure and safe manner in order to avoid intrusions and data attacks meanwhile it will reduce the cost and time to store the encrypted data in the Cloud Storage.
Keywords
Security, Privacy Preservation, Homomorphic Encryption and Decryption, Key Generation.
Subscription
Login to verify subscription
User
Font Size
Information
- V.P. Bansal and S. Singh, “A Hybrid Data Encryption Technique using RSA and Blowfish for Cloud Computing on FPGAs”, Proceedings of 2nd International Conference on Recent Advances in Engineering and Computational Sciences, pp. 103-108, 2015.
- K. El Makkaoui, A. Beni-Hssane and A. Ezzati, “Can Hybrid Homomorphic Encryption Schemes be Practical?”, Proceedings of 5th International Conference on Multimedia Computing and Systems, pp. 1-7, 2016.
- Y.S. Gunjal, M.S. Gunjal and A.R. Tambe, “Hybrid Attribute Based Encryption and Customizable Authorization in Cloud Computing”, Proceedings of International Conference On Advances in Communication and Computing Technology, pp. 1-5, 2018.
- K. Raja and S. Pushpa, “Novelty‐Driven Recommendation by using Integrated Matrix Factorization and Temporal‐Aware Clustering Optimization”, International Journal of Communication Systems, pp. 1-16, 2018.
- N. Lee, Z. Chen and F. Chen, “Cloud Server Aided Computation for ElGamal Elliptic Curve Cryptosystem”, Proceedings of IEEE 37th Annual Computer Software and Applications Conference Workshops, pp. 22-26, 2013.
- R. Nivedhaa and J. Justus, “A Secure Erasure Cloud Storage System using Advanced Encryption Standard Algorithm and Proxy Re-Encryption”, Proceedings of International Conference on Communication and Signal Processing, pp. 1-6, 2018.
- X. Song and Y. Wang, “Homomorphic Cloud Computing Scheme based on Hybrid Homomorphic Encryption”, Proceedings of International Conference on Computer and Communications, pp. 13-16, 2017.
- A. Sude and V. Shinde, “Authenticated CRF Based Improved Ranked Multi-Keyword Search for Multi-Owner Model in Cloud Computing”, Proceedings of International Conference on Computing, Communication, Control and Automation, pp. 1-5, 2017.
- M. Thangapandiyan, P.M. Anand and K.S. Sankaran, “Enhanced Cloud Security Implementation Using Modified ECC Algorithm”, Proceedings of International Conference on Communication and Signal Processing, pp. 12-17, 2018.
- D.R. Kumar Raja and S. Pushpa, “Diversifying Personalized Mobile Multimedia Application Recommendations through the Latent Dirichlet Allocation and Clustering Optimization”, Multimedia Tools and Applications, pp. 1-20, 2019.
- A. Yun, J.H. Cheon and Y. Kim, “On Homomorphic Signatures for Network Coding”, IEEE Transactions on Computers, Vol. 59, No. 9, pp. 1295-1296, 2010.
Abstract Views: 273
PDF Views: 0