Scrutinizing The Progress of Homomorphic Encryption Scheme in Guaranteeing Data Privacy
Scrutinizing The Progress of Homomorphic Encryption Scheme in Guaranteeing Data Privacy
ISSN No:-2456-2165
Abstract:- The privacy and security of data is always a II. WHAT IS HOMOMORPHIC ENCRYPTION?
major concern in the current era of big data and cloud
computing. Storing the data in encrypted form was the Homomorphic Encryption is an asymmetric encryption
approach followed to overcome this problem. technique with a pair of keys, where encryption is done using
Homomorphic Encryption evolved as a technique to a public key which can decrypted only using the
perform operations on encrypted data, providing the corresponding private key. It makes use of an algebraic
same results on working on raw data. It eliminates the system, allowing to perform functions on the encrypted data.
access of decrypted data by third party (cloud service The holder of the private key alone can access the
providers) for performing computation. Since its unencrypted data after the computation, allowing data to
inception in 1978, there occurred many contributions and remain secure and private while it is used by someone else.
enhancements in this area. The main breakthrough was One of the key features that distinguishes it from other
Fully Homomorphic encryption scheme proposed by encryption models is its resistance to quantum attack.
Craig Gentry in 2009. This paper discuss about the
classification of homomorphic Encryption Schemes as III. HOMOMORPHIC ENCRYPTION:
PHE,SWHE ,FHE and the additive and multiplicative CLASSIFICATION AND OPERATIONS
operations and about various schemes that have been
proposed from time to time in view of decreasing the There multiple types of encryption schemes associated
computational cost involved and to widen the range of with Homomorphic encryption, which performs diverse
applications/domains which implements HE. Various computations on cipher text. [2]
practical implementations of Homomorphic encryption
scheme are also discussed. 3.1 Classification
There are three variants of homomorphic encryption:
Keywords:- Homomorphic Encryption, Cloud Storage,
Privacy, Security. Partially homomorphic encryption allows performing
single operation either addition or multiplication ‘n’ number
I. INTRODUCTION of times on encrypted data
With the advent of numerous applications and Somewhat homomorphic encryption allows performing
automation of many traditional systems, there is remarkable different operations(addition and subtraction)but only limited
increase in the amount digital data available, which needs to number of times.
be stored without compromising the privacy of the data.
Many organizations are relying on Cloud Service Providers Fully homomorphic encryptioncombines the advantage of
for their data storage due to its affordable cost and low partially homomorphic encryption with somewhat
maintenance. The data is stored in cloud in encrypted form to homomorphic encryption, which allows to perform unlimited
retain privacy. To perform computations and analysis, CPS amount of operation for unlimitednumber of times
has to decrypt the data, resulting in the violation of the
organizations data privacy policy. 3.2 Operations
Homomorphic Encryption performs operations on
Privacy-enhancing Technologiesarea key research area encrypted data .The secret key for decryption is with the
in the current scenario. Homomorphic Encryption provides a client alone. After decryption, the result obtained is the same
promising solution in this regard [1]. It allows to perform as if the computation on Plain text.
computations on encrypted data, without compromising its
privacy. It can play a significant role in computation and
analysis of data in domains like healthcare and finance, where
the need to assure privacy is paramount.
IV. HISTORY OF HOMOMORPHIC ENCRYPTION The homomorphic cryptosystems which are popular
now is based on the scheme put forward by ZvikaBrakerski et
The phrase homomorphic is derived from Greek words al.[12].The encryption schemes introduced after this are
‘homos’, which means ‘the same’ and ‘morphe’ with known as second-generation FHE schemes, where growth in
meaning ‘shape’. The major limitation of systems using the noise during the homomorphic computation is slower.
encryption schemes are they can be used only for storing and
retrieving encrypted data. Performing computations on data The main highlight of homomorphic encryption is the
needs the decryption of data, which affects data security. The ultimate data privacy it offers, since computations can be
concept of Homomorphic Encryption was first proposed with performed within ciphertext, eliminating the burden of
the name “private Homomorphism’ in 1978 by Rivets, decryption. In the era of Internet, where, everything's public:
Ronald L., Len Ad leman, and Michael L. Dertouzos[3], after our browsing information, location, inclinations etc. the
the RSA encryption. But little progress was made on complete data privacy offered by homomorphic encryption
developing such a system for the next 30 years. has broad applications, especially in fields like Health care
and Finance.
4.1 Different Homomorphic Schemes
Several cryptosystems based private homomorphism V. APPLICATIONS
were proposed. But most of them were either additively or
multiplicatively homomorphic. A few which were fully The first and foremost application of Homomorphic
homomorphic, but had the limitation that ciphertext size encryption can be identified as the secure computation on
grows with the number of operations[4]. An additive data stored in cloud environment [13]. It ensures data privacy
Homomorphic encryption, which can encrypt only a single bit by allowing the cloud provider to perform computation on
was proposed by ShafiGoldwasser et al.[5] encrypted data.The IoT technology implementation in
healthcare has reformed personal health care by enabling
Additive-Multiplicative Homomorphism was remote monitoring of terminally ill patients using sensors
proposed[6], which guarantees that the result obtained after attached to them [14]. One of the important advantages of
performing computation on two encrypted values is cloud computing is the effective storage space it can provide
equivalent to the result found by encrypting the value for health records and the data provided by sensors , that can
obtained after performing computation on two unencrypted be shared with healthcare providers and researchers making
values. The main drawbacks were, absence of single system the medical research more effective. Meanwhile, using
which was additively and multiplicatively homomorphic and appropriate homomorphic encryption schemes, authorized
lack of functions which had compatibility with HE. entities can retrieve relevant information from the encrypted
health records eliminating the concern of data privacy. [15]
In 1999, Paul Paillier[7] proposed a partial fully
homomorphic encryption scheme which allows addition of Use of Genome sequences plays a significant role in the
two cipher texts and multiplication of a ciphertext by a study of complex diseases or epidemiology. But the broad
plaintext number. In 2005, a homomorphic scheme devised sharing of these data always raises threat as DNA sequences
by Boneh, Goh, and Nissim allowed both additions and are biometric identifiers, similar to finger prints. Any leakage
multiplications using a ciphertext with constant-size. of these information into wrong hands will have wide
However, only one multiplication is permitted, making the destructive impacts and it will be the utmost violation of the
system somewhat homomorphic[8]. identity privacy.Homomorphic encryption schemescan be
incorporated, ensuring the security of different genomic
The emergence of cloud computing technology in early datasets uploaded to the cloud and they can be effectively
2000 triggered the attention back on Homomorphic shared for studies to provide precision medicine and thus
Encryption[9]. In 2009 Craig Gentry’s thesis[10] on fully improving the health and wellbeing of patients [16].
homomorphic encryption, provided a basic outline for