CFP last date
20 December 2024
Reseach Article

Performance Evaluation of Homomorphic Encryption based Data Access Control

by Amit Kanungo, Sanjay Thakur
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 138 - Number 11
Year of Publication: 2016
Authors: Amit Kanungo, Sanjay Thakur
10.5120/ijca2016908996

Amit Kanungo, Sanjay Thakur . Performance Evaluation of Homomorphic Encryption based Data Access Control. International Journal of Computer Applications. 138, 11 ( March 2016), 9-16. DOI=10.5120/ijca2016908996

@article{ 10.5120/ijca2016908996,
author = { Amit Kanungo, Sanjay Thakur },
title = { Performance Evaluation of Homomorphic Encryption based Data Access Control },
journal = { International Journal of Computer Applications },
issue_date = { March 2016 },
volume = { 138 },
number = { 11 },
month = { March },
year = { 2016 },
issn = { 0975-8887 },
pages = { 9-16 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume138/number11/24422-2016908996/ },
doi = { 10.5120/ijca2016908996 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:39:24.164670+05:30
%A Amit Kanungo
%A Sanjay Thakur
%T Performance Evaluation of Homomorphic Encryption based Data Access Control
%J International Journal of Computer Applications
%@ 0975-8887
%V 138
%N 11
%P 9-16
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is the new innovation in the field of internet technologies. It supports heterogeneous computing and user has not any managerial loads. In this effective computation is provided in terms of services through policies regarding resource allocation, processing, load sharing, fault tolerance etc. Normally the service ranges from platform, software counted and infrastructure as pay per use basis so as user have not burdened of supporting cost. Here the number of users accessing these services and their data is large so as it suffers from several issues. Among those issues security is taken to be critical one for providing the isolation and privacy to the user. Several new approaches created from last few years along with traditional security but all of them are unable to satisfy the users and providers need. In such environment the users data is placed at third party locations and while securely accessing the computation and overhead loads are increased. This load is due to iterative encryption standards applied while frequently accessing and saving the users changes to the files. Thus some novel standard is suggested in the literature using homomorphism characteristics from which some mathematical operations are performed directly on the cipher text without decrypting the data. By this the load of the system gets reduced. But its practical implementation is always questioned. This work proposes a novel practically feasible HEBA (Homomorphic Encryption with Behavioral Attribute) schemes for overcoming the above issues. At the analytical level of result evaluation, the suggested approach seems to be providing effective results is near future.

References
  1. Dr. Sanjay Thakur , Amit Kanungo and Prateek Nahar , “A Novel Homomorphic Encryption with Behavioural Attribute Based Fine Grained Data Access in Cloud Computing”, in International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 12, December 2014
  2. Farhan Bashir Shaikh and Sajjad Haider, “Security Threats in Cloud Computing”, in IEEE 6th International Conference on Internet Technologies & Transactional databases, UAE, 2011.
  3. Farzad Sabahi, “Cloud Computing Security Threats and Responses”, in IEEE Transaction, 2011.
  4. Kristin Lauter, Michael Naehrig and Vinod Vaikuntanathan, “Can Homomorphic Encryption be Practical”, in ACM, 2008.
  5. Mohemed Almorsy, John Grundy and Amani S. Ibrahim, “Collaboration-Based Cloud Computing Security Management Framework”, in IEEE 4th International Conference on Cloud Computing, DOI 10.1109/CLOUD.2011.9, 2011.
  6. Pardeep Kumar, Vivek Kumar Sehgal , Durg Singh Chauhan, P. K. Gupta and Manoj Diwakar, “Effective Ways of Secure, Private and Trusted Cloud Computing”, in International Journal of Computer Science Issues, Vol. 8, Issue 3, No. 2, May 2011.
  7. Robert Griffin and Subhash Sankuratripati, “Key Management Interoperability Protocol Profile Version 1.1”, in OASIS Standards Organizations at http://docs.oasis-open.org/kmip/profiles/v1.1/os/kmip-profiles-v1.1-os.doc, 2013
  8. Shucheng Yu, Cong Wang, Kui Ren and Wenjing Lou, “Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing”, in Proceedings of IEEE Infocomm, 2010.
  9. Stephen S. Yau and Ho G. An, “Confidentiality Protection in Cloud Computing Systems”, in International Journal of Software and Informatics, Vol.4, No.4, December 2010.
  10. Wayne Jansen and Timothy Grance, “Guidelines on Security and Privacy in Public Cloud Computing”, in NIST Special Publication 800-144, Dec 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Security Service Homomorphic Encryption with Behavioral Attribute (HEBA) Authentication User Attributes Monitoring Service