CFP last date
22 July 2024
Reseach Article

Securing Data in Clouds using the SDC Algorithm: Current Trends and Research Directions

by Dennis Redeemer Korda, Eric Ayintareba Akolgo, Emmanuel Oteng Dapaah, Dickson Kodzo Mawuli Hodowu
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 185 - Number 38
Year of Publication: 2023
Authors: Dennis Redeemer Korda, Eric Ayintareba Akolgo, Emmanuel Oteng Dapaah, Dickson Kodzo Mawuli Hodowu
10.5120/ijca2023923186

Dennis Redeemer Korda, Eric Ayintareba Akolgo, Emmanuel Oteng Dapaah, Dickson Kodzo Mawuli Hodowu . Securing Data in Clouds using the SDC Algorithm: Current Trends and Research Directions. International Journal of Computer Applications. 185, 38 ( Nov 2023), 23-28. DOI=10.5120/ijca2023923186

@article{ 10.5120/ijca2023923186,
author = { Dennis Redeemer Korda, Eric Ayintareba Akolgo, Emmanuel Oteng Dapaah, Dickson Kodzo Mawuli Hodowu },
title = { Securing Data in Clouds using the SDC Algorithm: Current Trends and Research Directions },
journal = { International Journal of Computer Applications },
issue_date = { Nov 2023 },
volume = { 185 },
number = { 38 },
month = { Nov },
year = { 2023 },
issn = { 0975-8887 },
pages = { 23-28 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume185/number38/32939-2023923186/ },
doi = { 10.5120/ijca2023923186 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:28:06.751252+05:30
%A Dennis Redeemer Korda
%A Eric Ayintareba Akolgo
%A Emmanuel Oteng Dapaah
%A Dickson Kodzo Mawuli Hodowu
%T Securing Data in Clouds using the SDC Algorithm: Current Trends and Research Directions
%J International Journal of Computer Applications
%@ 0975-8887
%V 185
%N 38
%P 23-28
%D 2023
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The rapid evolution of cloud computing has brought forth an urgent need to ensure the security and confidentiality of data stored in the cloud. Access control methods, while useful, may not provide sufficient protection. As a viable alternative, data encryption has emerged as a robust solution, empowering organizations to encode data before transferring it to the cloud. Within the realm of encryption algorithms, homomorphic encryption stands out for its unique capabilities. By allowing computations on ciphertext data without revealing the original information, it addresses both confidentiality and data processing needs in cloud computing. This review delves into the critical topic of cloud computing security with a focus on safeguarding data privacy using homomorphic encryption. Various encryption algorithms are explored, including the renowned Gentry cryptosystem, DGHV algorithm, Gen10, SDC algorithm, and the cutting-edge GSW algorithm. Homomorphic encryption, which permits computations on ciphertexts, is dissected, distinguishing between additive and multiplicative homomorphisms. Notably, fully homomorphic encryption, a groundbreaking concept, supports both addition and multiplication operations on ciphertexts. The inception of fully homomorphic encryption by Gentry marked a pivotal moment in the field, enabling computations on encrypted data. Subsequent research expanded upon this concept, introducing variations and practical implementations. One such implementation aims to bridge the gap between cloud computing and data confidentiality, offering a glimpse into the future of secure cloud computing. This paper sheds light on the key homomorphic encryption algorithms utilized in safeguarding cloud computing data, providing a comprehensive overview of their features and potential applications.

References
  1. J. Li, S. Song, S. Chen and X. Lu, "A Simple Fully Homomorphic Encryption Scheme Available In Cloud Computing," IEEE, pp. 214-217, 2012.
  2. S. Goldwasser and S. Micali, "Probabilistic Encryption and How to Play Mental Poker Keeping Secret all Partial Information," ACM Symposium on Theory of Computing, 1982.
  3. M. Tebaa, S. El Hajji and A. El Ghazi, "Homomorphic Encryption Applied to the Cloud Computing Security.," in World Congress on Engineering, London, 2012.
  4. I. Jabbar and S. Najim, "Using Fully Homomorphic Encryption to Secure Cloud Computing," Internet of Things and Cloud Computing, pp. 13-18, 2016.
  5. C. Gentry, "Computing Arbitrary Functions of Encrypted Data," ACM, vol. 53, no. 3, pp. 97-105, 2010.
  6. C. Gentry, "A Fully Homomorphic Encryption Scheme," 2009.
  7. I. Jabbar and S. Najim, "Using Fully Homomorphic Encryption to Secure Cloud Computing," Internet of Things and Cloud Computing, pp. 13-18, 2016.
  8. C. Gentry, "Fully Homomorphic Encryption Using Ideal Lattices," ACM, pp. 169-178, 2009.
  9. K. M. Mohanty, "Secure Data Storage on the Cloud using Homomorphic Encrypyion.," in National Institute of Technology., Rourkela, 2013.
  10. M. M. Potey, C. A. Dhote and H. D. Sharma, "Homomorphic Encryption for Security of Cloud Data," in International Conference on Communication, Computing and Virtualization, 2016.
  11. D. R. Korda, E. D. Ansong and D. K. M. Hodowu, "Securing Data in the Cloud using the SDC Algorithm," International Journal of Computer Applications , pp. 24-29, 2021.
  12. V. Brakerski and V. Vaikuntanathan, "Lattice-Based FHE as Secure as PKE," in ITCS 2014, 2014.
  13. J. Alperin-Sheriff and C. Peikert, "Faster Bootstrapping with Polynomial Error," in In CRYPTO 2014, 2014.
  14. L. Ducas and D. Micciancio, "FHEW: Bootstrapping Homomorphic Encryption in less than a second," University of California, San Diego, 2014.
  15. I. Chillotti, N. Gama, M. Georgieva and M. Izabachène, "Faster fully homomorphic encryption: Bootstrapping in less than 0.1 seconds.," Asiacrypt , pp. 3-33, 2016.
  16. BuiltIn, "BuiltIn," 17 April 2019. [Online]. Available: https://builtin.com/cloud-computing/cloud-computing-in-healthcare.
  17. Forsee Medical, "Cloud Computing in Healthcare," 28 September 2020. [Online]. Available: https://www.foreseemed.com/blog/cloud-computing-in-healthcare.
  18. D. K. M. Hodowu, D. R. Korda and E. D. Ansong, "An Enhancement of Data Security in Cloud Computing with an Implementation of a Two-Level Cryptographic Technique, using AES and ECC Algorithm," International Journal of Engineering Research & Technology, vol. 09, no. 09, pp. 639-650, 2020.
  19. O. Kocabas and T. Soyata, "Utilizing Homomorphic Encryption to Implement Secure and Private Medical Cloud Computing.," IEEE, 2015.
  20. O. Kocabas and T. Soyata, "Utilizing Homomorphic Encryption to Implement Secure and Private Medical Cloud Computing," IEEE, 2015.
  21. J. H. Cheon and M. Kim, "Optimized Search and Compute Circuits and their Application to Query Evaluation on Encrypted Data.," IEEE Transactions on Information Forensics and Security, pp. 188-199, 2016.
  22. C. Ayantika and I. Sengupta, "Translating Algorithms to handle Fully Homomorphic Encrypted Data on the Cloud," IEEE Transactions on Cloud Computing, vol. 6, no. 1, 2018.
  23. D. S. Dhokey and A. V. Deorankar, "Review on Usage of Homomorphic Encryption Technique," International Journal of Current Research, pp. 76377-76379, 2018.
  24. K. Aganya and I. Sharma, "Symmetric Fully Homomorphic Encryption Scheme with Polynomials Operations.," in International Conference on Electronics, Communication and Aerospace Technology. , Coimbatore: IEEE., 2018.
Index Terms

Computer Science
Information Sciences

Keywords

Encryption Algorithms Data Security Homomorphic Encryption Algorithms and Cloud Computing