Secure Computation in Cloud Environment: Fazail Amin
Secure Computation in Cloud Environment: Fazail Amin
www.ijcsit.com
Fazail Amin et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (3) , 2014, 3058-3061
www.ijcsit.com
2) Data access:
This is very important aspect of banking service, the
cloud service provider must not be able to get any
information about which data from database is being
accessed, that is provider shoud get information about the
index being searched for in the database. This can be
achieved by using PIR (personal information retrieval)
protocol which makes use of FHE to search for the index.
A. Introduction:
Outsourcing the banking operations to cloud platform
Most important aspect of banking is privacy because
banks have confidential information about their customers
which are very valuable to banks and other competitors.
Insecurity about information leakage is one thing and
securely processing the data (that is banking transactions) is
another important aspect which the cloud service provider
must provide without failure. Banking operations are data
intensive they access and process huge volumes of data on
regular basis. So what we need is a secure environment
which can provide platform for secure computation
remotely without leaking any information about the data
being processed. Also the access to the database must also
not leak any information about the data being accessed.
Keeping in view the above mentioned requirements a
fully homomorphic encryption scheme can achieve the
goals if it can be implemented efficiently. Currently many
FHE schemes are available but the efficiency remains the
major issue.
B. Overview of the banking model:
User authentication system
Data access (controlling the access to data)
Banking operations (this includes the various
transactions)
1) User authentication system:
bank
FHE
module
3) Banking operations:
The data should not be in plaintext format at
any intermediate level and the user should be able to
process the data without decrypting it. User
encrypts the data before sending it to the cloud and
if any operation needs to be done on the data it
REFERENCES
[1] Shubha Bharil, T. Hamaspriya, Praveen Lalwani. a secure key for
cloud using threshold cryptography in Kerberos. International
journal of computer applications, Volume 79-no7 oct 2013
m
[2] Yugi Suga, Jinbocha Mitsui, A fast(2,2 ) threshold secret sharing
th
scheme using m linearly Independent binary vectors. 16
International conference of network based information systems
2013 IEEE.
[3] Dimitrios Zissis, Dimitrios Lekkas, Addressing cloud computing
security issues, Future generation computer systems 28 (2012).
Pages 583-592.
[4] R.Rivesst, L. Adleman, M. Dertouros,on data naks and privacy
homomorhism,Int. foundations of secure computation,Academic
press,1978, pg 169-177.
[5] S. Goldwasser and S. Micali, Probabilistic encryption,Journal of
Computer and System Sciences, vol. 28, no. 2,pp. 270299, 1984.
[6] C. Gentry, A fully homomorphic encryption scheme, Ph.D.
dissertation, Stanford University, 2009.
[7] Zhu Ping, Guang Xiang, the protection methods for mobile code
based homomorphic encryption and data confusion, 2011
international conference on management of e-commerse and egovernment 2011
[8] Chiang Chia-Chu,
Hayward Ryan, An architechture for
parallelizing fully homomorphic cryptography on cloud , 2013
seventh international conference on complex, intelligent and
software instensive systems 2013
[9] Vaikunthnathan V. , computing blindfolded: new developments in
fully homomorphic encryption, 2011 IEEE 52nd
Annual
symposium on foundations of computer science 2011.
[10] Alejandro Llamas and Raul Ernesto Gonzalez, A Cryptographic
Scheme for Secure Cloud Computing. 2013 10th International
Conference on Electrical Engineering, Computing Science and
Automatic Control (CCE) Mexico City, Mexico. 2013
[11] http://docs.cloudstack.apache.org/en/latest/ introduction to open
cloud stack
[12]
https://gmplib.org/manual/Introduction-to-GMP.html#Introductionto-GMP