CFP last date
20 January 2025
Reseach Article

Securing Data in the Cloud using the SDC Algorithm

by Dennis Redeemer Korda, Edward Danso Ansong, Dickson Kodzo Mawuli Hodowu
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 183 - Number 25
Year of Publication: 2021
Authors: Dennis Redeemer Korda, Edward Danso Ansong, Dickson Kodzo Mawuli Hodowu
10.5120/ijca2021921631

Dennis Redeemer Korda, Edward Danso Ansong, Dickson Kodzo Mawuli Hodowu . Securing Data in the Cloud using the SDC Algorithm. International Journal of Computer Applications. 183, 25 ( Sep 2021), 24-29. DOI=10.5120/ijca2021921631

@article{ 10.5120/ijca2021921631,
author = { Dennis Redeemer Korda, Edward Danso Ansong, Dickson Kodzo Mawuli Hodowu },
title = { Securing Data in the Cloud using the SDC Algorithm },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2021 },
volume = { 183 },
number = { 25 },
month = { Sep },
year = { 2021 },
issn = { 0975-8887 },
pages = { 24-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume183/number25/32084-2021921631/ },
doi = { 10.5120/ijca2021921631 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:17:53.308997+05:30
%A Dennis Redeemer Korda
%A Edward Danso Ansong
%A Dickson Kodzo Mawuli Hodowu
%T Securing Data in the Cloud using the SDC Algorithm
%J International Journal of Computer Applications
%@ 0975-8887
%V 183
%N 25
%P 24-29
%D 2021
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The past few years have seen much attention directed towards cloud computing where private and organizational usage has skyrocketed because of the flexibility it provides. Cloud computing may be exploited for a decrease in the limitations of conventional computing architectures in this way profiting an organization as far as a competitive advantage, space, time, power, cost and in any event, giving a disentangled business process. In as much as Cloud computing arises with a lot of benefits, the security challenges that it poses cannot be overestimated. The use of traditional encryption algorithms such as RSA, DGHV andGen10, to scramble the secluded data before transferring it to the cloud provider have been proposed to solve this security loophole. But, the customer ought to give the secret key tothe server to unscramble the data before performing the computations necessitated. This paper proposes a framework for a variant of the Homomorphic encryption known as SDC encryption algorithm which allows performing calculations on scrambled data without decoding. The performance metrics of the proposed framework was carried out using the big-Oh notation and an SDC encryption library in python and then tested for correctness. The results obtained from the proposed framework of the SDC encryption algorithm indicated satisfactory performances. Hence, with the utilization of the SDC encryption algorithm, the customer's data in cloud server is secure and this also allows computations onthis encoded data. These results provide inspiring evidence for securing data in clouds using the SDC encryption algorithm.

References
  1. N. Lord, "DigitalGuardian," 11 September 2018. [Online]. Available: https://digitalguardian.com/blog/cryptography-cloud-securing-cloud-data-encryption. [Accessed 5 November 2019].
  2. C. Gentry, "Fully Homomorphic Encryption Using Ideal Lattices," ACM, pp. 169-178, 2009.
  3. Z. Brakerski and V. Vaikuntanathan, "Fully homomorphic encryption from ring-lwe and security for key dependent messages," in Proceedings of the 31st Annual Conference on Advances in Cryptology, Berlin,Heidelberg: Springer-Verlag, 2011.
  4. C. Gentry, S. Halevi and N. P. Smart, "Fully homomorphic encryption with polylog overhead," in Proceedings of the 31st Annual international conference on Theory and Applications of Cryptographic Techniques, Berlin, 2012.
  5. D. R. Korda, "Securing Data in the Clouds Using SDC Encryption Algorithm," Department of Computer Science, KNUST, Kumasi, 2020.
  6. J. Li, S. Song, S. Chen and X. Lu, "A Simple Fully Homomorphic Encryption Scheme Available In Cloud Computing," IEEE, pp. 214-217, 2012.
  7. JetNeans, "PyCharm," PyCharm, 2020. [Online]. Available: https://www.jetbeans/pycharm/. [Accessed 13 March 2020].
  8. A. M. Sagheer, "Elliptic Curves Cryptographic Techniques," in IEEE, 2012.
  9. S. S. Hamad and A. M. Sagheer, "Design of Fully Homomorphic Encryption by Prime Modular Operation," Telfor Journal, vol. 10, no. 2, 2018.
  10. I. Jabbar and S. Najim, "Using Fully Homomorphic Encryption to Secure Cloud Computing," Internet of Things and Cloud Computing, pp. 13-18, 2016.
  11. D. K. M. Hodowu, D. R. Korda and E. D. Ansong, "An Enhancement of Data Security in Cloud Computing with an Implementation of a Two-Level Cryptographic Technique, using AES and ECC Algorithm," International Journal of Engineering Research & Technology, vol. 9, no. 9, 2020.
  12. K. M. Mohanty, "Secure Data Storage on the Cloud using Homomorphic Encrypyion," National Institute of Technology, Rourkela, 2013.
  13. C. Gentry, "Computing Arbitrary Functions of Encrypted Data.," Publications of ACM, vol. 53, no. 3, pp. 97-105, 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Fully homomorphic encryption partially homomorphic encryption SDC encryption algorithm and big-Oh notation.