scholarly journals Cloud Based Reasoning Health Data using Homomorphic Encryption

Cloud computing is an abundant heterogeneous paradigm. The clients are given access to cloud for storing large amount of data for many purposes. The major cloud security issues are data breaches, insider threat and insufficient due diligence etc. Most of the service providers save the Client data as a plain text format which makes the data less secured. Aim of the system is to protect the health data that are outsourced for storing in cloud. In this system, the data is encrypted using paillier cryptosystem before outsourcing, which preserves the privacy of patient’s health data. Computations are performed over this encrypted data using decision tree algorithm. The results are displayed on the client machine. Hence, it ensures the privacy preservation and cautions the patient about his health.

2020 ◽  
Vol 12 (1) ◽  
pp. 50-55
Author(s):  
Mohammed Anwar ◽  
Abed Salman

Cloud computing is a powerful computing paradigm that provides a variety of computing services to its users. An example is storage, which allows individuals and enterprises to outsource their files to remote storage. However, saving private information onto third-party storage increases the security issues of data and privacy protection concerns. For this reason, cloud service providers (CSPs) are required to save an encrypted version of user data. In this paper, a novel encryption technique based on the use of Fully Homomorphic Encryption is presented. The technique uses a superincreasing sequence to derive the key and works on encrypted data with no need for decryption; this yields the same results as performing it on plaintext data. In the proposed technique, the characters are converted to their corresponding ASCII code values, which differs from the binary values produced by other existing techniques.


2021 ◽  
Vol 9 (02) ◽  
pp. 359-361
Author(s):  
Liz George ◽  
◽  
Jubilant J. Kizhakkethottam ◽  

Homomorphic Encryption and Zero Knowledge Proofs are two trending concepts that are widely popular as data privacy preservation techniques in a wide variety of applications, especially in those associated with the newly evolved block chain technology which are immutable, distributed and secure. Zero knowledge proof is a cryptographic technique can provide proof that a certain statement is correct, without revealing any details about the statement, while homomorphic encryption allows to perform computations on encrypted data without decrypting it. This article explores the significance of the data privacy aspect provided by both ZKP and Homomorphic Encryption and how it can be effectively used to improvise the privacy of blockchain applications in various domains.


Author(s):  
Priyanka K ◽  
Priya R

cloud computing service is the most important services for many of the organizations. The service providers must ensure of their security and protection techniques to guarantee to protect the client data. There are some cloud security guidelines that supports the cloud data security are need to be followed by the vendors. Despite the fact, the vendors are facing the mess of security and protection controls and eventually leads to an confusion among the consumers on concerning the safety efforts and whether their measures satisfies the security measures. An inclusive report to survey the risk and security issues faced by cloud consumers have depicted to control the hazards. In light of this investigation, an ontology describing the cloud security controls, threats and compliances framed. a web based cloud application is designed to recommend the cloud security policies from the ontology such that it also helps the existing cloud providers. Security strategies can also be planned by the consumers by utilizing the web application that describing the ontology


2020 ◽  
Vol 12 (4) ◽  
pp. 48-62
Author(s):  
A. B. Manju ◽  
Sumathy Subramanian

With advancements in smart mobile devices and their capabilities, location-based services have gained utmost importance, as its individual and social benefits are enormous. Users of location-based services have a concern to the security issues posed by its usage as the location service providers track the users' interests, behavior, and identity information. Most of the location-based services are launched from mobile phones that have stringent resources; hence incorporating encryption schemes becomes tedious, and further, dual identity attacks uncover the encrypted message. A fog-assisted privacy protection scheme for location-based service (FPriLBS) employs a semi-trusted third party as a fog server to eliminate redundant queries submitted to the location service provider in addition to the trusted helper selection scheme which hides the real identity of the user from the fog server. The experimental results show that the proposed FPriLBS outperforms the existing schemes in terms of processing time and processing cost.


Author(s):  
Maragathavalli P. ◽  
Seshankkumar M. ◽  
Dhivakaran V. ◽  
Ravindran S.

2022 ◽  
Vol 54 (9) ◽  
pp. 1-37
Author(s):  
Asma Aloufi ◽  
Peizhao Hu ◽  
Yongsoo Song ◽  
Kristin Lauter

With capability of performing computations on encrypted data without needing the secret key, homomorphic encryption (HE) is a promising cryptographic technique that makes outsourced computations secure and privacy-preserving. A decade after Gentry’s breakthrough discovery of how we might support arbitrary computations on encrypted data, many studies followed and improved various aspects of HE, such as faster bootstrapping and ciphertext packing. However, the topic of how to support secure computations on ciphertexts encrypted under multiple keys does not receive enough attention. This capability is crucial in many application scenarios where data owners want to engage in joint computations and are preferred to protect their sensitive data under their own secret keys. Enabling this capability is a non-trivial task. In this article, we present a comprehensive survey of the state-of-the-art multi-key techniques and schemes that target different systems and threat models. In particular, we review recent constructions based on Threshold Homomorphic Encryption (ThHE) and Multi-Key Homomorphic Encryption (MKHE). We analyze these cryptographic techniques and schemes based on a new secure outsourced computation model and examine their complexities. We share lessons learned and draw observations for designing better schemes with reduced overheads.


2021 ◽  
Vol 13 (1) ◽  
pp. 20-39
Author(s):  
Ahmed Aloui ◽  
Okba Kazar

In mobile business (m-business), a client sends its exact locations to service providers. This data may involve sensitive and private personal information. As a result, misuse of location information by the third party location servers creating privacy issues for clients. This paper provides an overview of the privacy protection techniques currently applied by location-based mobile business. The authors first identify different system architectures and different protection goals. Second, this article provides an overview of the basic principles and mechanisms that exist to protect these privacy goals. In a third step, the authors provide existing privacy protection measures.


Author(s):  
Bachar Kachouh ◽  
Khalil Hariss ◽  
Layth Sliman ◽  
Abed Ellatif Samhat ◽  
Tamim Alsuliman

Sign in / Sign up

Export Citation Format

Share Document