An Authentication Data Security in Cloud Medical Server (CMS) Using Homomorphic Encryption Process Based Naccache-Stern Cryptogram
Keywords:
Cloud computing, unauthorized access, homomorphic encryption, Naccache–Stern cryptosystem based homomorphic encryption processAbstract
Today, cloud computing is crucial for data storage and transport. This method involves sensitive and confidential data that requires authentication to prevent unwanted access. Traditional cryptography approaches encrypt and decrypt stored data, but they fail to maintain authorization, trust, and security in geographically distributed environments. This work presents an effective homomorphic encryption method to secure data with less decryption. Initial analysis of cloud-stored data using Naccache–Stern cryptosystem-based homomorphic encryption. The system produces the key to encrypt shared information that intermediate users cannot access. Encryption lets users access data and build confidence with cloud storage providers. This powerful homomorphic encryption technology secures cloud data access and storage. System efficiency is assessed using experimental data and conversations.
Downloads
References
Zhang, Q., Cheng, L., Boutaba, R.: Cloud computing: state-of-the-art and research challenges. Int. J. Internet Serv. Appl. 1, 7–18 (2010)
Yu, H., Powell, N., Stembridge, D., Yuan, X.: Cloud computing and security challenges. In: ACM Proceedings of the 50th Annual Southeast Regional Conference, pp. 298–302. ACM (2012)
Sinha, N., Khreisat, L.: Cloud computing security, data, and performance issues. In: IEEE 23rd Wireless and Optical Communication Conference, pp. 1–6. IEEE (2014)
Kacha L., Zitouni A. (2018) An Overview on Data Security in Cloud Computing. In: Silhavy R., Silhavy P., Prokopova Z. (eds) Cybernetics Approaches in Intelligent Systems. CoMeSySo 2017. Advances in Intelligent Systems and Computing, vol 661. Springer, Cham
Yu, C., Yang, L., Liu, Y., Luo, X.: Research on data security issues of cloud computing. In: IET International Conference on Cyberspace Technology, pp. 1–6. IET (2014)
Subashini, S., Kavitha, V.: A Survey on Security Issues in Service Delivery Models of Cloud Computing. Journal of Network and Computer Applications 34, 1–11 (2010)
Sato, H., Kanai, A., Tanimoto, S.: A Cloud Trust Model in a Security Aware Cloud. In: IEEE International symposium on Applications and the Internet, pp. 121–124 (2010)
Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for data storage security in cloud computing. In: 2010 Proceedings IEEE INFOCOM, vol. 54(2), pp. 1–9 (2010)
Teruko Miyata, Yuzo Koga, Paul Madsen,” A Survey on Identity Management Protocols and Standards,” IEICE Transactions on Information and Systems archive, Volume E89-D Issue 1, January 2006.
Song YJ., Cha JS., Kang JM., Kim WS. (2011) A Data Management Method to Secure Data in Cloud Computing Environment. In: Kim T., Adeli H., Robles R.J., Balitanas M. (eds) Information Security and Assurance. ISA 2011. Communications in Computer and Information Science, vol 200. Springer, Berlin, Heidelberg
Pradeep Semwal ; Mahesh Kumar Sharma, “Comparative study of different cryptographic algorithms for data security in cloud computing”, International Conference on Advances in Computing,Communication & Automation (ICACCA) (Fall) IEEE.
Halevi S. (2017) Homomorphic Encryption. In: Lindell Y. (eds) Tutorials on the Foundations of Cryptography. Information Security and Cryptography. Springer, Cham
Yi X., Paulet R., Bertino E. (2014) Homomorphic Encryption. In: Homomorphic Encryption and Applications. SpringerBriefs in Computer Science. Springer, Cham
Manish M.PoteyMr.aC.A.DhoteDr.bDeepak H.SharmaMr, “Homomorphic Encryption for Security of Cloud Data”, Procedia Computer Science, Volume 79, 2016, Pages 175-181.
Geeta F. Nadlamani ; Shabnam Shaikh, “Preserving privacy using TPA for cloud storage based on regenerating code”, International Conference on Recent Trends in Information Technology (ICRTIT) in IEEE,2016.
Maha TEBAA, 2Said EL HAJII, “Secure Cloud Computing through Homomorphic Encryption”, International Journal of Advancements in Computing Technology(IJACT), Volume5, Number16, December 2013.
Xun Wang, Tao Luo, and Jianfeng Li, “A More Efficient Fully Homomorphic Encryption Scheme Based on GSW and DM Schemes,” Security and Communication Networks, vol. 2018, Article ID 8706940, 14 pages, 2018. https://doi.org/10.1155/2018/8706940.
Abbas Acar, Hidayet Aksu, A. Selcuk Uluagac, Mauro Conti, “A Survey on Homomorphic Encryption Schemes: Theory and Implementation”, Journal ACM Computing Surveys (CSUR) Surveys Homepage,Volume 51 Issue 4, September 2018.
Majedah Alkharji, Hang Liu, “Homomorphic Encryption Algorithms and Schemes for Secure Computations in the Cloud”, International Conference on Secure Computation and Technology, At Virginia International University, Fairfax, VA,2018.
MriduGulati, “Diagnostic assessment of patients with interstitial lung disease”, Prim Care Respir J, Volume 20, Issue 2, pp.120-127, 2011
N. Jayapandian, A. M. J. Md. Zubair Rahman, “Secure and efficient online data storage and sharing over cloud environment using probabilistic with homomorphic encryption”, Cluster Computing in Springer, Issue 2/2017
Afif, M.H and Hedar, A.-R., “Data Classification using Support Vector Machine Integrated with Scatter Search Method”, Japan-Egypt Conference on Electronics, Communications and Computers (JEC-ECC), IEEE, pp. 168-172, ISBN: 4673-0485, 2012.
Julien Bringer ; Herve Chabanne ; Qiang Tang, “An Application of the Naccache-Stern Knapsack Cryptosystem to Biometric Authentication”, IEEE Workshop on Automatic Identification Advanced Technologies, 2007.
K. Liang, J. K. Liu, D. S. Wong, W. Susilo, "An efficient cloud based revocable identity-based proxy re-encryption scheme for public clouds data sharing" in Computer Security-ESORICS, Springer, pp. 257-272, 2014.
S. Gueron and V. Krasnov, “Speed records for multi-prime RSA using AVX2 architectures,” in Information Technology: New Generations, pp. 237–245, Springer, Cham, 2016
Downloads
Published
Issue
Section
License
Copyright (c) 2024 Hemlathadhevi A (Author)
This work is licensed under a Creative Commons Attribution 4.0 International License.