Advanced Homomorphic Encryption for Cloud Data Security

D. Chandravathi - GVP College for Degree and PG courses, Viakhapatnam-45, India
P.V. Lakshmi - GITAM University, Viakhapatnam-45, India


Citation Format:



DOI: http://dx.doi.org/10.30630/joiv.1.1.11

Abstract


This paper aims to provide security of data in the Cloud using Multiplicative Homomorphic Approach. Encryption process is done with RSA algorithm. In this RSA algorithm, Shor’s algorithm is used for generating Public key Component, which enhances the security. Shor’s algorithm plays as important role in generating public key. Plain Text Message is encrypted with Public Key to generate Cipher Text and for decryption Chinese Remainder Theorem (CRT) is used to speed up the computations. By doing so, it shows how the CRT representation of numbers in Zn can be used to perform modular exponentiation about much more efficiently using three extra values pre-computed from the prime factors of n. Hence, security is enhanced in the cloud provider.

Keywords


Multiplicative homomorphic; encryption; RSA algorithm; Shor’s algorithm; CRT; public key; modular exponentiation.

Full Text:

PDF

References


Faster RSA Algorithm for Decryption Using Chinese Remainder Theorem G.N. Shinde and H.S. Fadewar , ICCES, vol.5, no.4, pp.255-261.

C. Lamprecht “Investigating the efficiency of Cryptographic algorithm in Online Transactionâ€ISN 1473-804X online, 1473-8031 I.J. of Simulation Vol.7, No.2.

AlexanderMay, “Cryptanalysis of Unbalanced RSA with Small CRT-Exponentâ€, CRYPTO 2002, LNCS 2442, pp 242-256, 2002.

JohannnesBlomer,Martin Otto, “a newCRT-RSA Algorithm Secure Against Bellcoreâ€, CC’03, October 27-30,Washington, DC, USA.

Craig Gentry, A Fully Homomorphic Encryption Scheme,2009.

http://crypto.stanford.edu/craig/craig-thesis.pdf.

Understanding Homomorphic Encryption http://en.wikipedia.org/wiki/Homomorphic_encryption.

Homomorphic Encryption Applied to the Cloud Computing Security Maha TEBAA, Saïd EL HAJJI, Abdellatif EL GHAZI.

Vic (J.R.) Winkler, â€Securing the Cloud, Cloud Computer Security, Techniques and Tacticsâ€, Elsevier.

R. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM, 21(2):120-126, 1978.

A Fully Homomorphic Encryption Implementation on Cloud Computing Shashank Bajpai and Padmija Srivastava Cloud Computing Research Team, Center for Development of Advanced Computing [C-DAC], Hyderabad.