Thesis On Homomorphic Encryption Model For Data Security in Cloud Computing
Thesis On Homomorphic Encryption Model For Data Security in Cloud Computing
Cloud Computing
PhD PROPOSAL
BY
PGS/04/20202601
1
Table of Contents
Abstract - - - - - - - - - iii
Chapter One
1. Introduction - - - - - - - - - 1
2. Problem Statement - - - - - - - - 1
3. Aim and Objectives - - - - - - - - 2
4. Research Question - - - - - - - - 2
5. Summary of Contributions - - - - - - - 2
6. Scope and Limitations - - - - - - - - 3
7. Chapters Organisation - - - - - - - - 3
Chapter Two
2.0 Literature Review - - - - - - - - 5
2.1 Cloud Computing - - - - - - - - 5
2.1.1 Characteristics of Cloud Computing Services - - - 6
2.1.2 Security issues for Cloud Computing - - - -- 7
2.2 Homomorphic Encryption Overview - - - - - - 9
2.2.1 Homomorphic Encryption Schemes - - - - - 9
2.3 Related Work - - - - - - - - - 10
2.4 Summary of related work - - - -- - - - 12
Chapter Three
3.1 Research Methodology and Data Analysis - - - - - 14
3.2 Homomorphic Encryption applied to cloud computing Security - - 14
3.3 Proposed Algorithm in Cryptosystem- - - -- - - 15
3.4 Data Analysis - - - - - - - - - 18
References - - - - - - - - -- - 20
2
Abstract
Most enterprises and academics adopted cloud computing due to convenient, cheaper and easy
accessibility of information unlike most computer owners that often encounter lots of challenges
as a result of storage facilities. Cloud computing technologies have attracted a number of
individuals and organizations to be part of it because; problems associated with storage facilities
have been obviated. Cloud Computing is a payable service where the customers are expected to
pay for the services offered to them on demand. These services exist in different ways obtainable
on hardware and software forms based on demand and they can be accessed via the internet.
Ideally, all services offered to the client by cloud computing service provider were not actually
domiciled or contained on the actual computer of the client rather on the computer of the cloud
computing service provider, as a result, the safety of data could be an issue. Although so many
efforts were made by researchers to tackle security issues via deployment of different techniques
such as Blowfish model, Advanced Encryption Standard (AES), Data Encryption Standard
(DES), Triple Data Encryption Standard (3DES), Rivest Cipher 4 (RC4), etc. However, most of
the research does not really address the major goal of data security at a time which is
authentication, confidentiality and integrity. This research proposes a methodology that can be
adopted to execute operations on encrypted data without decrypting them, without any changes on
the processed results as if they have worked directly on the plaintext. The proposed methodology
will be used to perform operations on encrypted data without knowing the private key (without
decryption), the client is the only holder of the secret key. The research will adopt Multiplicative
Homomorphic Encryption and Additive Homomorphic Encryption for the operation of data by
computing the Encryption of f into a and b (Enc(f (a, b)) without using the private key. The
cryptosystem will be evaluated by calculating an arbitrary number of additions and
multiplications and thus calculating any type of function on encrypted data and compare based on
four characteristics; (1) Homomorphic Encryption type, (2) Privacy of data, (3) Security applied
to and (4) keys used.
3
CHAPTER ONE
Introduction
1.0 Introduction
Information technology have revolutionized as a result of cloud computing. Cloud storage has
indeed become an integral and indispensable service for a wide range of organizations and sectors
(Abbas, Mahdi & Hussein, 2020). They stated that the increasing use and processing of data have
driven the adoption of cloud storage. Bentafat, Mazhar, Rathore and Bakiras (2021) posited that the
emergence of cloud storage and computing platforms empowers users to delegate storage and
computational tasks concerning their data, while also enabling businesses to relinquish the
responsibility of managing data centers. Cloud Computing is a service structured around a pay-as-
you-go model, where customers are charged based on the resources they consume, aligning costs
with usage. Cloud storage services are readily accessible through diverse hardware and software
configurations, adapting to fluctuating demands, and can be accessed via the internet (Rashid &
Chaturvedi, 2019).
The dynamic and flexible nature of cloud computing allows organizations to focus on their core
business activities while leveraging the capabilities of cloud service providers such as Google,
Microsoft and Amazon to efficiently and effectively meet their IT needs (Rashid & Chaturvedi,
2019). In an ideal scenario, the services provided to the client by a cloud computing service provider
are hosted on the provider's infrastructure rather than the client's local computer. Consequently, data
security could become a concern. However, the breaches of user privacy within cloud computing
posed a significant barrier to clients' adoption of cloud services. These developments necessitate
collaboration among clients, service providers, and web hosting companies to create a more robust
and secure environment. Such secure environment can be effectively established through the
implementation of security measures capable of thwarting intruders from engaging in various
malicious activities. The renowned approaches to supporting such security are the usage of
encryption/decryption techniques (Bentafat et al. 2021).
For the purpose of this work, the researcher proposed a Homomorphic Encryption model for data
security in cloud computing taking into cognizance, the convenience and efficiency of asymmetric
key cryptography which does not require sharing key with the recipient. A detailed explanation will
be presented beside a discussion of related works on Homomorphic Encryption cryptosystem.
A homomorphic encryption is one of the cryptographic methods that allow mathematical operations
to be carried out on a cipher text, instead of on the actual data itself. The cipher text is an encrypted
version of the input data (also called plain text), that is operated on and then decrypted to obtain the
4
desired output (Mohammed & Dujan, 2021). The critical property of homomorphic encryption is
that the same output would be obtained from decrypting the operated cipher text as from simply
operating on the initial plain text. This strategy aims to enhance the security of the communication
system by integrating cryptographic principles and secure computations. Establishing a secure
communication system opens the door to a wide range of applications that demand stringent privacy
protection, such as banking transactions and medical services (Burt, 2021). In other words, this
research to a large extent would address the three major goals of data security, which is
authentication, confidentiality and integrity.
Security continues to be the cornerstone of successful trade and investments. With the increasing
adoption of cloud computing services by numerous organisations, the heightened usage has attracted
the attention of intruders seeking to breach cloud data (Frantha & Orsbone, 2021). Utilizing
conventional encryption algorithms to encrypt remote data prior to uploading it to the cloud provider
has emerged as the prevailing approach for bridging the security divide in cloud computing
environments. To implement this method, the customer will be required to provide the secret key to
the cloud service provider's server in order to decrypt the data prior to executing the necessary
computations on it. Hence, concerns arise regarding the privacy and confidentiality of the stored
data. Though, many security techniques were developed for safeguarding data in the cloud. Since the
publication of RSA (named after its inventors: Ron Rivest, Adi Shamir, and Leonard Adleman)
asymmetric cryptographic algorithm encryption scheme in 1978, computations on encrypted values
have attracted valuable attention.
Homomorphic encryption stands out as the fitting solution for addressing data security,
confidentiality, integrity, authentication and privacy concerns within cloud computing. This
encryption method proves effective in safeguarding data as it eliminates the necessity for processors
to decrypt inputs prior to executing desired operations (Waleed, Al-Jobouri & Al-Zoubi, 2019).
However, many of the proposed protection schemes designed to expand upon the basic model of
homomorphic encryption were hindered by lack of flexibility because it supported only a limited
number of arithmetic operations. Furthermore, the primary focus of researchers has been on crafting
algorithms for data security in cloud environments, with less attention directed towards performing
calculations on scrambled data without decoding and also addressing implementation challenges.
This study aims to bridge the existing research gap by delving into the modification of homomorphic
encryption referred to as secure data sharing (SDC) encryption algorithm, which enables the
execution of computations on encrypted data without the necessity of decoding. Therefore, by
employing the SDC encryption algorithm, the customer's data stored in the cloud server is
5
safeguarded, facilitating the execution of necessary computations on this encrypted data.
To achieve the main goal of this research, the research expected to provide answers to the following
questions:
Q1: What are the performance challenges and obstacles related to data security in cloud computing?
Q2: What is the overview of Homomorphic Encryption algorithm?
Q3: What is the framework for implementing the SDC Encryption algorithm in cloud computing?
Encryption techniques play a crucial role in enhancing data security within the cloud environment,
effectively thwarting intruders from executing various malicious activities. The renowned
approaches to support such security are the usage of encryption/decryption techniques (Bentafat et
al. 2021).
Instead of decrypting it first, the proposed model conducted mathematical operations directly on the
cipher text of the data. The research will evaluate the time of the encryption and decryption
compared with conventional encryption/decryption algorithms.
A novel aspect of this research, is that the model will offer comprehensive data security benefits that
are crucial for organizations seeking to leverage cloud computing while safeguarding their sensitive
information from unauthorized access and data breaches thereby enhancing communication systems
by integrating cryptographic theory and secure computation techniques.
6
1.6 Scope and Limitations
The research presents a concept of securing data in cloud computing with the application of
homomorphic encryption technique. Part of the limitation of this research is that the encryption
process produces a cipher text file larger than its original plaintext counterpart, leading to longer
decryption times compared to encryption.
The research is structured in a way that helps to achieve a broad and connected analysis of Cloud
Computing and Homomorphic encryption. The thesis formed in 6 chapters:
In chapter 1, “General introduction”, we introduce the idea of Cloud Computing through which we
present the concept of Homomorphic Encryption (HE) its real-life implementations, and then we
tried to present the connection between the two concepts with more details.
In chapter 2, “Literature review”, we introduce the idea of Cloud Computing through presenting
many definitions in the literature, then we discuss the essential characteristics of Cloud Computing
together with a variety of existing services and deployment models.
Chapter 3, “Methodology” presents a review of the security concerns of Cloud Computing. Then
we introduce the use of cryptography in general for supporting security in the Cloud. More
specifically, we analyze conventional encryption as a potential step for solving the data security
concerns. Then the chapter ends by reviewing the challenges involved when the traditional
encryption is implemented in a Cloud environment.
.
7
Chapter Two
Literature Review
2.0 Introduction
Over the past few years, researchers (Rocha & Falcão, 2019; Ayman, Haneen & Eman, 2020;
Mohammed & Dujan, 2021; Korda, Ansong & Hodowu, 2021), introduced the principles of Cloud
Computing and Homomorphic Encryption individually. Therefore, it is necessary to review the
existing literature to discern the correlation between the two concepts.
In contemporary times, the Internet is regarded as the largest repository of information and the most
extensively utilized medium of communication (Lauroui et al., 2021). Promoting the social
networking features, emailing and blogging have all effectively and efficiently contributed to easing,
moving forward and improving the human being’s life. This wonderful resource made the whole
world look like a smaller place where billions of people live. However, with the tremendous growth
of the Internet, many issues were raised to harm and threaten the most sensitive information about
the users: their privacy (Ahmad & Garko, 2020). It is extremely important to be aware of the
different dangers that can face the internet users whenever they try to connect to the external world
through a public network. One must also be aware of the different parties that present a potential
fraud and should know how to deal with them. These malicious entities can be hackers, stalkers or
third party users (Ahmad & Garko, 2020). All of them strive to obtain sensitive and private
information, likely with intentions for malicious exploitation. Ultimately, every internet user should
be aware of the precise methods available to safeguard their privacy and utilize them effectively
(Orobosade, Thompson, Alese & arome, 2020; labati, Genovese, Piuri, Scotti & Vishwakarma,
2020).
8
2.2 Cloud Computing and Its Architecture
Researchers, such as (Abdalla & Varol, 2019; Taghipour, Mowloodi, Mahboobi & Abdi, 2020;
Mekawie & Yehia, 2021; Alshareef, 2023) posited that cloud computing architecture is defined by three
major layer, often referred to as the "cloud computing stack" or "cloud service models." Each layer
provides a different level of abstraction and functionality to users and developers. These layers are:
Cloud Infrastructure (Iaas), which provides raw computing resources, allowing users to manage
virtual machines, storage, and networking components. The cloud application platform (Paas), which
offers a platform and development tools for building and deploying applications without worrying
about the underlying infrastructure and the cloud application software (Saas), which delivers fully
functional software applications that users can access and use without the need for local installation
or maintenance. This layered architecture enables organizations and developers to choose the level
of control, flexibility and management they require based on their specific needs and expertise. It
also promotes scalability, cost-effectiveness, and rapid development and deployment of applications
and services.
Figure 1, shows a typical cloud computing ecosystem where various hardware components and
applications collectively form the cloud infrastructure. The network nodes, which consist of different
devices, serve as the end users of the cloud infrastructure and services (Alshareef, 2023).
9
Figure 1: Cloud Computing Architecture
Sourece:https://pimages.toolbox.co m/wp-content/uploads/2021/07/09134159/38-3.png
2. Platform as a Service(PaaS)
PaaS offers a higher level of abstraction, providing a platform with development tools, runtime
environments, and frameworks for building, deploying, and managing applications. Developers
can focus on writing code and building applications without needing to manage the underlying
infrastructure. PaaS is suitable for developers who want to streamline application development
and deployment. (Mohammed & Dujan, 2021).
According to Narayana, Kumar and Jayashree, (2017); Suthar et al., (2019), key characteristics
of PaaS include:
Development tools, runtime environments, and frameworks for building applications.
Simplified application deployment and scaling.
Automatic management of underlying infrastructure and resources.
Reduced administrative tasks and improved developer productivity.
11
12
Source:https://www.researchgate.net/profile/Mervat-Bamiah/publication/275036700/figure/fig2
/AS:669016616087575@1536517399779/Cloud-Computing-Deployment-Models-Mell-and-Grance-
2011_W640.jp g
13
1. Public Cloud: A public cloud is a type of cloud computing where services are provided over a
network that is open for public use. The cloud infrastructure is owned and operated by a third-party
cloud service provider and resources are shared among multiple users (Widyastuti & Irwansyah,
2018). Public cloud services, such as IaaS, PaaS, and SaaS, are available to anyone who wants to use
them. Examples of public cloud providers include Amazon Web Services (AWS), Microsoft Azure,
and Google Cloud Platform (GCP) (Basu et al. 2018).
2. Private Cloud: A private cloud is a cloud computing environment that is dedicated to a single
organization. It can be physically located on-premises or hosted by a third-party service provider
(Narayana et al. 2017; Saygili, 2020). The key feature of a private cloud is that it provides a more
controlled and isolated environment, which can be desirable for organizations with specific security,
compliance, or performance requirements (Helali & Omri, 2021). The organization has more control
over the infrastructure and resources in a private cloud compared to a public cloud.
3. Community Cloud: A community cloud is a shared cloud environment that is used by multiple
organizations with common interests or requirements. It is a hybrid between public and private
clouds. Organizations within a specific industry, sector, or community collaborate to create and
share a cloud infrastructure that meets their collective needs (Foote, 2021). This model can help
organizations address shared concerns while still maintaining a level of control over their data and
resources.
4. Hybrid Cloud: A hybrid cloud is a combination of two or more different cloud deployment models
(typically a mix of public and private clouds) that remain distinct entities but are connected by
standardized or proprietary technology. This allows data and applications to be shared between
them. The hybrid cloud model is often used when organizations want to leverage the benefits of both
public and private clouds while maintaining control over certain sensitive data or workloads
(Alshareef, 2023).
It's important to note that the deployment models (public, private, community, hybrid) are different
from the cloud service models (IaaS, PaaS, SaaS). The service models describe the level of control
over the infrastructure and services, while the deployment models describe how the cloud
environment is set up and accessed, (Taghipour et al., 2020).
14
Advantages and Disadvantages of Deployment Models
Each cloud deployment model comes with its own set of advantages and disadvantages. The choice
of a deployment model depends on the specific needs and priorities of an organization (Mekawie &
Yehia, (2021); Saygili, (2020); Mohammed & Dujan (2021)).
Table1. Advantages and Disadvantages associated with each deployment model:
Cloud Model Advantages Disadvantages Examples
Public Cloud 1. Cost-Efficiency: Pay-2. Security Concerns: IBM smart cloud
as-you-go pricing Some organizations Google App Engine
allows organizations may have security and Amazon EC2
to pay for only the compliance concerns Microsoft Window
resources they use. due to the shared Azure
Scalability: Easily nature of resources.
scale resources up or 3. Limited
down based on Customization: Less
demand. control and
Accessibility: customization
Services are compared to private
accessible over the cloud deployments.
internet from 4. Potential Downtime:
anywhere in the Reliance on the
world. internet and third-
No Upfront Capital party providers may
Expenditure: lead to downtime if
Minimal upfront costs there are connectivity
as the infrastructure is issues or service
owned and maintained disruptions.
by the cloud provider.
15
Compliance: Easier
to achieve and
maintain compliance
with industry or
regulatory standards.
16
Zhou, (2018); Sun, (2020); Labati et al. (2020); Choudhary and Singh (2022), they discussed a number
of cloud computing characteristics, which includes:
1. On-Demand Self-Service: Users can provision and manage computing resources, such as virtual
machines, storage, and applications, without requiring human interaction with the service
provider. These enables users to quickly access and deploy resources as needed.
2. Broad Network Access: Cloud services are accessible over the internet from various devices,
such as laptops, smartphones, and tablets. This accessibility allows users to access their
applications and data from virtually anywhere.
3. Resource Pooling: Cloud providers pool computing resources to serve multiple users
simultaneously. These resources are dynamically allocated and reassigned based on demand.
Users share resources while maintaining a sense of isolation from each other.
4. Rapid Elasticity: Cloud resources can be quickly scaled up or down based on workload
demands. This elasticity allows users to handle fluctuating resource requirements without
significant manual intervention.
5. Measured Service: Cloud systems automatically monitor and measure resource usage. Users are
billed based on their consumption, promoting cost efficiency. This pay-as-you-go model is more
cost-effective compared to traditional fixed-cost models.
6. Multi-Tenancy: Multiple users or "tenants" can share the same physical infrastructure while
remaining isolated from each other. Tenants can have their own virtualized resources, ensuring
security and privacy.
7. Ubiquitous Network Access: Cloud services are accessible from various devices over the
internet, providing seamless access to applications and data. This enables remote work and
collaboration.
8. Resource Virtualization: Cloud providers use virtualization technologies to create virtual
instances of computing resources, such as virtual machines, storage, and networks. This
abstraction allows for better resource utilization and management.
9. Resilient and Redundant: Cloud services are often designed with redundancy and fault
tolerance in mind. This ensures high availability and reliability, minimizing service disruptions.
10. Self-Healing and Automated Management: Cloud platforms can automatically detect failures
and perform recovery actions without manual intervention. Automated management tools help
optimize resource allocation and performance.
11. API-Driven: Cloud services are often accessible through Application Programming Interfaces
(APIs), allowing developers to programmatically interact with and manage resources. This
enables automation and integration with other systems.
17
12. Scalability: Cloud services can scale both vertically (adding more resources to a single
instance) and horizontally (adding more instances to distribute load). This scalability supports
growing workloads and user demands.
These characteristics collectively enable organizations and individuals to leverage cloud
computing to achieve greater flexibility, efficiency, and innovation in their IT operations and
services.
The popularity of cloud computing has indeed led to a variety of benefits that enable networks,
applications and services to be shared and distributed in a more effective and efficient manner.
Studies in Haghighat, Zonous and Mottaleb, (2015); Galibus, (2016); Nasarul, (2017); Yan et al.
(2018); Sun, (2020); Chandrasekaran, (2021), outlined some of the benefits of Cloud computing.
The on-demand nature of cloud computing and the accessibility it provides to a wide array of
resources have significantly transformed the way businesses and individuals approach technology
(Alshareef, 2023). The Benefits include amongst others;
1. Cost Savings: Cloud computing eliminates the need for upfront capital investments in hardware,
infrastructure, and maintenance. You can pay for resources on a consumption basis, reducing
overall costs.
2. Scalability: Cloud services allow you to scale your resources up or down based on demand,
ensuring optimal performance during peak periods and avoiding wastage during low-demand
times.
3. Flexibility: Cloud platforms provide a variety of resources, including computing power, storage,
and networking, which can be easily customized to meet your specific needs.
4. Global Accessibility: Cloud services can be accessed from anywhere with an internet
connection, enabling remote work, collaboration, and data access.
5. Rapid Deployment: Cloud computing enables quick provisioning of resources, reducing the
time it takes to deploy applications and services.
6. Innovation: Cloud providers offer access to advanced technologies like artificial intelligence,
machine learning, and analytics, enabling innovation and experimentation without large upfront
investments
7. Automatic Updates: Cloud services typically handle updates, patches, and security
enhancements, ensuring that your applications are up-to-date and secure without requiring
extensive manual intervention.
18
8. Reliability and Redundancy: Cloud providers often have redundant data centers and robust
backup solutions, enhancing reliability and minimizing data loss in case of hardware failures or
disasters.
9. Disaster Recovery: Cloud platforms offer improved disaster recovery solutions, allowing you to
recover data and services quickly after unexpected events.
10. Resource Efficiency: Cloud environments often optimize resource utilization, leading to better
energy efficiency and reduced environmental impact compared to traditional on-premises setups.
11. Collaboration: Cloud-based collaboration tools enable teams to work together seamlessly,
regardless of their geographical locations.
12. Security: Cloud providers invest heavily in security measures, employing encryption, access
controls, and compliance certifications to safeguard data and applications.
13. Reduced IT Maintenance: Cloud services handle hardware maintenance, updates, and
troubleshooting, freeing up IT staff to focus on strategic tasks.
14. Testing and Development: Cloud environments are ideal for creating testing and development
environments without the need for dedicated hardware.
15. Competitive Edge: Cloud computing empowers businesses to respond quickly to market
changes, adopt new technologies, and deliver services faster, providing a competitive advantage.
16. Pay-as-You-Go Pricing: The pay-as-you-go model allows businesses to only pay for what they
use, avoiding over provisioning and providing cost predictability.
17. Data Insights: Cloud-based analytics tools allow organizations to extract valuable insights from
data for better decision-making.
18. Remote Monitoring and Management: Cloud services enable remote monitoring and
management of resources, making it easier to maintain and optimize your systems.
19. Regulatory Compliance: Many cloud providers offer compliance certifications and tools that
can help businesses adhere to industry regulations.
20. Sustainability: Cloud services' resource optimization and energy-efficient designs contribute to
reduced energy consumption and a smaller carbon footprint.
19
1. Data Security and Privacy Concerns: Storing sensitive or confidential data in the cloud raises
concerns about unauthorized access, data breaches, and privacy violations. Organizations may worry
about losing control over their data, especially when it's hosted on third-party servers.
2. Dependency on Internet Connectivity: Cloud storage relies on a stable and fast internet
connection. If your internet connection is slow or unreliable, accessing and transferring data to and
from the cloud can be challenging and time-consuming.
3. Downtime and Outages: Cloud service providers can experience downtime and outages, which can
disrupt your access to data and applications. Even major cloud providers have experienced
significant downtime in the past, affecting their customers' operations.
4. Limited Control and Customization: Cloud storage services often provide standardized solutions,
which may not fully meet your organization's specific needs. You might have limited control over
the infrastructure and configuration, making it difficult to customize the environment to your
requirements.
5. Vendor Lock-In: Migrating data and applications to a different cloud provider or back to on-
premises infrastructure can be challenging due to compatibility issues and proprietary formats. This
can lead to vendor lock-in and hinder your flexibility to switch providers.
6. Data Transfer Costs: While many cloud providers offer free or low-cost data uploads, transferring
large volumes of data into or out of the cloud can incur significant data transfer costs. This is
especially relevant for organizations with large datasets.
7. Performance Variability: Cloud storage performance can be subject to variability due to factors
like network latency, shared resources, and server load. This can impact application responsiveness
and user experience.
8. Data Loss and Recovery: Although cloud providers implement backup and disaster recovery
mechanisms, data loss can still occur. Ensuring proper data backup and recovery strategies is crucial
to mitigate this risk.
9. Regulatory Compliance Challenges: Depending on your industry and location, regulatory
compliance requirements may restrict where and how you store data. It's important to ensure that
your cloud provider complies with relevant regulations.
10. Long-Term Costs: While cloud storage can offer cost savings in the short term, over the long term,
costs can accumulate as your storage needs grow. Organizations should carefully analyze pricing
models and consider the Total Cost of Ownership (CTO).
11. Service Discontinuation: Cloud providers might discontinue or change the services they offer. This
could lead to migration challenges and require you to reevaluate your storage strategy.
20
12. Data Residency and Sovereignty: Depending on your geographical location and the location of
your cloud provider's data centers, there could be legal and regulatory implications related to data
residency and sovereignty.
However, to address these disadvantages and risks, organizations should conduct a thorough risk
assessment, carefully choose their cloud service provider and develop a comprehensive cloud
strategy that includes security measures, data backup plans, and contingency plans for potential
issues. (Alshareef, 2023). It's important to weigh the pros and cons of cloud storage based on your
organization's specific needs, priorities, and risk tolerance (Kaur, 2019).
21
2.4.3 Data Integrity in the Cloud
Data integrity pertains to the assurance that data remains accurate, consistent, and unaltered
throughout its lifecycle within the cloud environment. It encompasses the preservation of data
reliability, ensuring that information retains its intended meaning and validity ( Frantha & Orsbone
2021). Data integrity is essential for maintaining trust and confidence in the cloud services utilized by
organizations. It ensures that data is not susceptible to unauthorized access, tampering, or corruption,
thereby safeguarding its integrity and reliability.
Achieving data integrity in cloud computing involves the implementation of various technical and
procedural measures. Encryption mechanisms are commonly employed to protect data both in transit
and at rest, ensuring confidentiality and mitigating the risk of unauthorized modifications.
Additionally, access controls and authentication mechanisms are enforced to restrict data access to
authorized users, reducing the likelihood of malicious alterations (Harfoushi & Obiedat 2018; Sun,
2020; Choudhary & Singh, 2022).
Furthermore, cloud service providers typically employ data redundancy and replication techniques to
enhance data durability and resilience against potential data loss or corruption events. Regular data
backups and integrity checks are performed to detect and mitigate any discrepancies or anomalies in
stored data (Omotosho, 2019).
Organizations leveraging cloud services are also responsible for implementing robust data integrity
policies and practices which includes defining clear data handling procedures, enforcing access
controls, and conducting regular audits to ensure compliance with regulatory requirements and
industry standards.
Data integrity in cloud computing is fundamental for maintaining the trustworthiness and reliability
of cloud-based data assets, enabling organizations to confidently leverage cloud services for their
data storage, processing, and management needs (Choudhary & Singh 2022).
22
practices, organizations can ensure high levels of data availability in the cloud environment
(Bajaber, Alqulaity & Alotaibi, 2019).
Conventionally, data is encrypted before sending it to cloud provider, but to execute the calculations
the data should be decrypted every time they need to work on it. Until now it was impossible to
encrypt data and to trust a third party to keep them safe and able to perform distinct calculations on
them. So to allow the Cloud provider to perform the operations on encrypted data without decrypting
them requires using the cryptosystems based on Homomorphic Encryption (Ayman et al., 2020).
24
Homomorphic encryption schemes offer several advantages in scenarios where preserving the
privacy and security of data is paramount. Some of the key advantages as presented by IEEE Digital
Privacy 2024 include:
1. Privacy Preservation: Homomorphic encryption allows computations to be performed on
encrypted data without the need to decrypt it first. This means that sensitive data remains
confidential throughout the computation process, minimizing the risk of data exposure or
unauthorized access.
2. Secure Outsourcing of Computation: With homomorphic encryption, data owners can
securely outsource computations to third-party service providers or cloud platforms without
revealing the underlying data. This enables organizations to take advantage of cloud computing
resources while maintaining control over their sensitive data.
3. Data Confidentiality: Since computations are performed on encrypted data, unauthorized
parties-including service providers or cloud administrators -cannot access the plaintext data or the
intermediate results of computations. This ensures the confidentiality of data even when it's
processed by external entities.
4. Flexible Data Utilization: Homomorphic encryption supports various types of computations,
including addition, multiplication, and more complex operations depending on the specific
encryption scheme used. This flexibility allows for a wide range of applications, including data
analysis, machine learning, and secure data sharing.
5. Compliance with Privacy Regulations: In industries with strict data privacy regulations (such
as healthcare and finance), homomorphic encryption can help organizations comply with
regulations like HIPAA (Health Insurance Portability and Accountability Act) or GDPR
(General Data Protection Regulation) by ensuring that sensitive data is protected throughout
processing.
6. Reduced Data Transfer Risks: By performing computations on encrypted data locally or within
a secure environment, organizations can reduce the risk associated with transferring sensitive
data across networks. This minimizes the likelihood of data breaches or interception during
transit.
7. Protection against insider Threats: Homomorphic encryption helps mitigate the risk of insider
threats within organizations. Even administrators or employees with access to the computational
infrastructure cannot access the plaintext data or intermediate results, thus reducing the potential
for data misuse or unauthorized access.
Despite these advantages, it's important to consider that homomorphic encryption also comes
with challenges, such as computational overhead, complexity of implementation, and limitations
on supported operations. However, ongoing research and advancements in homomorphic
25
encryption techniques aim to address these challenges and further enhance the practical
applicability of this technology.
There are various types of homomorphic encryption schemes, including partially homomorphic,
somewhat homomorphic and fully homomorphic encryption (Alaya, Laouamer & Msilini, 2022).
1. Partially Homomorphic Encryption (PHE): This type allows either addition or multiplication
operations to be performed on encrypted data, but not both. Examples include the Paillier
cryptosystem, which supports addition, and the ElGamal cryptosystem, which supports
multiplication.
2. Somewhat Homomorphic Encryption (SHE): SHE schemes support both addition and
multiplication operations on encrypted data but have limitations on the number of operations that
can be performed before decryption is required. The first fully homomorphic encryption scheme
proposed by Gentry was based on bootstrapping techniques applied to SHE schemes.
3. Fully Homomorphic Encryption (FHE): FHE allows both addition and multiplication
operations to be performed on encrypted data. This is a more advanced and complex form of
homomorphic encryption. FHE enables a broader range of computations to be carried out on
encrypted data, making it more versatile. However, fully homomorphic encryption is
computationally more intensive and has higher overhead compared to partially homomorphic
schemes.
Recently, there has been ongoing research to improve the efficiency and practicality of
homomorphic encryption. Various applications in secure data analysis, privacy-preserving
machine learning, and secure cloud computing have been explored (Mohammed & Al Attar,
2023).
According to Alaya et. al. (2022); Mohammed and Al Attar, (2023), the process in a homomorphic
encryption scheme involves the following steps:
1. Key Generation: The first step involves generating public and private keys for encryption and
decryption. These keys are typically generated using well established cryptographic algorithms.
2. Encryption: Data that needs to be processed is encrypted using the public key. This results in cipher
text, which appears as random data and cannot be understood without the corresponding private key.
3. Homomorphic Operations: Homomorphic encryption schemes support specific mathematical
operations (e.g., addition or multiplication) on cipher texts that correspond to equivalent operations
26
on plaintexts. There are different types of homomorphic encryption schemes, such as partially
homomorphic encryption (which supports either addition or multiplication operations) and fully
homomorphic encryption (which supports both addition and multiplication operations).
4. Evaluation: In this step, the encrypted data undergoes computations or operations while remaining
encrypted. These operations are typically performed using specialized algorithms that leverage the
homomorphic properties of the encryption scheme.
5. Decryption: Once the computations are completed, the result is decrypted using the private key.
Only the entity possessing the private key can decrypt the result and obtain the final output.
6. Security Considerations: Throughout the process, it's crucial to ensure the security of the
encryption scheme. This includes protecting the keys, preventing attacks that could compromise the
confidentiality of the data or the integrity of the computations, and ensuring that the chosen
homomorphic encryption scheme meets the desired security requirements.
These processes collectively enable the use of homomorphic encryption to perform computations on
encrypted data securely, without exposing sensitive information. However, homomorphic encryption
typically incurs significant computational overhead compared to traditional (non-encrypted)
computations, which can affect performance and scalability in practical applications (Mohammed &
Al Attar, 2023).
(START HERE)
27
noise present in each cipher text, which gradually increases until it reaches a point where the noise
renders the resulting cipher text undecryptable.
Dijk et al. (2010) introduced the DGHV algorithm, a fully homomorphic encryption scheme. This
algorithm enhances Gentry's cryptosystem by demonstrating that the somewhat homomorphic
components of ideal lattices can be replaced with a simpler homomorphic algorithm that operates
with integers. This algorithm is theoretically simpler when compared to Gentry's cryptosystem. This
straightforward algorithm possesses both additive and multiplicative homomorphic properties,
enabling it to perform low-complexity mathematical operations. Additionally, it can leverage
bootstrapping and squashing techniques to transform into a fully homomorphic encryption scheme.
In 2010, Gentry introduced a homomorphic encryption algorithm referred to as "Gen 10," in the
ACM publication which represented an advancement over prior work in cloud computing. This
algorithm, characterized by the structure , demonstrated notable improvements. The
variable denotes the encrypted message, serving as the cipher text, while represents the key, and
stands for an arbitrary numerical value. The encryption process exhibits homomorphic properties
with respect to addition, subtraction, and multiplication operations. There is a relationship between
and , where is the residue of modulo expressed . The encryption process in Gen
10 follows this approach: for keyGen, an arbitrary p-bit odd integer is selected. To encrypt a bit
, represents an arbitrary N-bit number such that . The resulting cipher text is
satisfying .
Various researchers, including Smart and Varcauteren (2010); Xiao, Bastani and Yen, (2012); Maha
and Said, (2014); Hayward and Chiang (2015); have suggested various applications for
homomorphic encryption within the context of cloud computing. However, most of these schemes
were insecure because they lack adequate measures to safeguarding cipher text recovery thus,
permitting plaintext leak out.
In the work of Jabbar and Najim (2017), they proposed a fully homomorphic encryption to secure
data in cloud environment. They analyzed some of the existing homomorphic encryption schemes
and discussed the use of SDC algorithm scheme in securing cloud computing data. Their work to
some extent addressed cipher text recovery. However, it lacks implementation of the algorithm.
Waleed, Al-Jobouri and Al-Zoubi, (2019), proposed Cloud Security Based on Homomorphic
Encryption. The proposed approach explored applications of fully homomorphic encryption scheme
in securing data in cloud environment but with less emphasis on the implementation of the scheme.
28
Furthermore, Korda, Ansong and Hodowu, (2021) introduced the SDC algorithm, a straightforward
fully homomorphic encryption technique inspired by Gentry’s cryptographic algorithm designed to
offer user-friendliness while minimizing reliance on end-client security measures. This framework
also provides the flexibility to manage cryptographic operations within a trusted infrastructure.
Additionally, it enables the transmission of encoded data to the public cloud without granting the
cloud the ability to decode the data it stores.
It is crucial to emphasize that the most of the works under review advocate for performing either
addition, multiplication, or both operations on encrypted data. However, none of them have
mentioned any cipher text recovery algorithms.
Studies revealed that, the cipher text recovery algorithm in the DGHV scheme involves transferring
the secret key to the server, posing significant instability concerns.
Despite the cipher text recovery algorithms of Gen 10; Smart and Varcauteren (2010), Xiao et al.
(2012), Maha and Said (2014), Kocabas and Soyata (2015), requiring the presentation of q to the
server, they utilize c mod q where q is an irregular number and c is the cipher text. However, the
plaintext still leaks.
Though, the works of Jabbar and Najim (2016); Waleed et al. (2019) provided frame work for cipher
text recovery but lacks implementation.
The algorithm proposed by Korda et al. (2021) addresses the issue of cipher text recovery without
any leakage of plaintext. Regardless of their decoding procedure relying on the secret key p, it's
worth noting that the recovery process utilizes the entirely unique whole number q. Therefore, it
satisfies both the requirement for cipher text recovery and simultaneously ensures information
security.
This research, Homomorphic Encryption Model for Data Security in Cloud Computing intends to
build upon the work of Korda et al.(2021), by leveraging on the SDC encryption algorithm which is
a modification of a fully homomorphic encryption model in securing data in the cloud environment.
29
REVISIT THIS
Chapter Three
3.1 Research Methodology and Data Analysis
Typically, standard encryption techniques are utilized to protect data during its transfer to the cloud.
An alternative approach involves encrypting the data prior to sending it to the Cloud service
provider. This necessitates decrypting the data at each operational stage, where the client typically
provides the private key to the server (Cloud provider) for decryption before executing the required
calculations. However, this process may impact the confidentiality and privacy of the data stored in
the Cloud (Alsufian et al., 2022).
This study suggests the development of an ecosystem framework for cloud computing, enabling the
execution of various operations on encrypted data without the need for decryption. This approach
aims to yield results comparable to working directly on the raw data during calculations.
Homomorphic Encryption systems enable the execution of operations on encrypted data without the
requirement of knowing the private key (i.e. without decryption), with the client being the sole
possessor of the secret key (Ayman et al., 2020). Upon decrypting the outcome of any operation, the
result is identical to conducting the calculation on the original raw data.
In this context, a straightforward method for enhancing data security in the cloud is proposed. This
approach involves the utilization of a public-key-based homomorphic authenticator, accompanied by
the implementation of a random masking privacy-preserving algorithm for secure data transmission.
The suggested model incorporates a bilinear aggregate signature, following Nishoni and Aldo's
(2020) recommendation. This inclusion aims to enable efficient key auditing, ensuring the
maintenance of ciphertext size without unnecessary expansion . It concurrently preserves all log files
while simultaneously verifying and synchronizing the data onto the cloud ((Nishoni and Aldo 2020).
The primary objective of the cloud service provider is to uphold and verify the integrity of data. If
minor alterations occur in the data, the data owner sends a corresponding report to the user. The
homomorphic authenticator algorithm is employed to uphold the integrity of the data. The
homomorphic authenticator algorithm is designed for digital signature applications, specifically for
securely "compressing" large files before encryption with a private (secret) key in a public-key
cryptosystem like the bilinear key aggregate system (Nishoni and Aldo 2020). Leveraging
cryptosystems based on Homomorphic Encryption allows cloud providers to execute operations on
encrypted data without the need for decryption (Alaya et al. 2022).
3.2 Homomorphic Encryption Applied to Cloud Computing Security
30
This research employs standard encryption method to safeguard both the operations and storage of
data when transferring it to the Cloud. The primary approach involves securing the data by
encrypting it before transmitting it to the Cloud provider. For data decryption before performing the
necessary calculations, the client must furnish the private key to the server (Cloud provider),
potentially impacting the confidentiality and privacy of the stored data in the Cloud. This study
introduces a model for conducting operations on encrypted data without the need for decryption,
ensuring that the outcomes of the calculations remain consistent with those obtained from processing
the raw data directly. Homomorphic Encryption model would be adopted to achieve the purpose.
3.3 Proposed Algorithm in Cryptosystems
Homomorphic Encryption systems enable the execution of operations on encrypted data without the
requirement of knowing the private key (i.e. without decryption), with the client being the sole
possessor of the secret key. Upon decrypting the outcome of any operation, the result is identical to
conducting the calculation on the original raw data (Ayman et al. 2020).
An encryption is Homomorphic, if: from Encryption (a), Enc(a) and Encryption (b), Enc(b) it is
possible to compute Enc(f (a, b)), where f can be: +, ×, ⊕ and without using the private key. Within
Homomorphic encryption, distinctions are made based on the operations it enables access to on raw
data, the additive Homomorphic encryption (only additions of the raw data) is the Pailler and
Goldwasser-Micalli (Alaya et al., 2022).
Ek is an encryption algorithm with key k.
Dk is a decryption algorithm.
Dk (Ek (n) × Ek (m)) = n×m or Enc (x⊗y) = Enc(x) ⊗ Enc(y)
DL (EL (n) × EL (m)) = n+m or Enc (x⊕y) = Enc(x) ⊗ Enc(y)
The first property is called additive homomorphic encryption, and the second is multiplicative
homomorphic encryption. An algorithm is fully homomorphic if both properties are satisfied
simultaneously.
Homomorphic Encryption exhibits a multiplicative property when there exists an algorithm capable
of computing Enc(x * y) based on Enc and Enc all without knowledge of the values of x and y
(Kartit 2022). Examples of this include the RSA and Elgamal algorithms.
According to Rivest et al.(1978), they illustrated the RSA algorithm, demonstrating it as an instance
of a multiplicative homomorphic scheme as shown below.
Key Generation
Pick two large primes and such that ,
31
where is Euler’s totient function.
Public Key
Private Key
Encryption
Decryption
The multiplicative homomorphic characteristic of the RSA scheme can be described as follows (Burt
2021).
Then
(1)
Homomorphic Encryption possesses an additive property when there exists an algorithm capable of
computing Enc(x + y) based on Enc(x) and Enc(y), all without knowledge of the actual values of x
and y (Kartit 2022). Examples of this include the Pailler and Goldwasser-Micali algorithms.
32
Key Generation
Take two random primes and such that
Calculate
Public Key
Private Key
Encryption
Decryption
Waleed et al. (2019) demonstrated the homomorphic characteristics of Paillier scheme in the
following manner;
(2)
In order to conduct addition and multiplication operations on encrypted data stored within the cloud
provider's infrastructure, the client necessitates possession of two distinct key generators: one
tailored for RSA encryption and another for Paillier encryption.
The El Gamal cryptosystem is also introduced and it is initially designed as a multiplicative
homomorphic encryption scheme. However, through modifications to the coding mode, it can be
adapted to function as an additive cryptosystem.
El Gamal Cryptosystem:
Then
The El Gamal Cryptosystem demonstrates the property of multiplicative homomorphic encryption as
When the plaintext is placed in the exponent, the result is obtained thus;
(3)
34
REFERENCES
Abbas, M. S., Mahdi, S.S., & Hussien, S. A. (2020). Security improvement of Cloud Data Using Hybrid
Cryptography and Steganography. International Conference on Computer Science and Software Engineering (CSASE),
pp. 123-127, doi: 10.1109/CSASE48920.2020.9142072.
Abdalla, P.A., & Varol, A. (2019). Advantages to Disadvantages of Cloud Computing for Small-Sized
Business. Proceedings of 7th International Symposium on Digital Forensics and Security, Barcelos, Portugal, pp 1-6,
doi:10.1109/ISDFS.2019.8757549.
Ahmad, S. A., & Garko, A. B. (2020). A Hybrid Cryptographic Algorithm for Data Security in the Cloud.
© Afr. J. MIS 2(2):35–58.
Alaya, B., Laouamer, L., & Msilini, N. (2022). Homomorphic encryption systems statement: Trends and challenges. Computer
Science Review, vol. 36, p. 100235.
Aldossary, S., & Allen, W. (2016). Data Security, Privacy, Availability and Integrity in Cloud
Computing: Issues and Current Solutions. International Journal of Advanced Computer Science and Application, vol. 7,
no. 4, pp. 485-498, doi: 10.14569/IJACSA.2016.070464.
Alshareef, H. N. (2023). Current Development, Challenges and Future Trends in Cloud Computing: A
Survey. International Journal of Advanced Computer Science and Applications,( IJACSA), Vol. 14, No. 3, pp.329-338.
Alsufaian, R.A., AlQahtani, K.H., AlAjmi, R.M., Almoussa, R.A., AlGhamdi, R.A., & Nagy N. (2022).
Secure File Storage on Cloud using Hybrid Cryptography. International Conference on Computer Science and Software
Engineering (CSASE), PP, 1-4.
Ayman, A., Haneen, Z., & Eman, S. (2020). Survey on Homomorphic Encryption and Address of New Trend. International
Journal of Advanced Computer Science and applications (IJACSA), vol. 11, no. 7, pp.618-626.
Bajaber, W., Alqulaity, M., & Alotaibi, F. (2019). Different Techniques to Ensure High Availability in
Cloud Computing. International Journal of Advanced Research in Computer and Communication Engineering, vol. 6,
no. 11, pp. 1-16, doi: 10.17148/IJARCCE.2019.61102.
Basu, S., Bardhan, A., Gupita, K., & Saha, P. (2018). Cloud Computing Security Challenges & Solutions-A Survey. IEEE 8th
Annual Computing and Communication Workshop and Conference (CCWC), pp. 347-356, doi:
10.1109/CCWC.2018.8301700.
Bentafat, E., Mazhar, M., Rathore, & Bakiras, S. (2021). Towards Real-Time Privacy-Preserving Video
Surveillance. Computer Communications 180 (February):97–108.
Burt, J. (2021). Homomorphic Encryption Makes Real-World Gains, Pushed by Google, IBM, Microsoft.eSecurityPlanet.
https://www.esecurityplanet.com/compliance/homomorphic-encryption-makes-real-world gains/
Chandrasekaran, E. (2021). Essentials of Cloud Computing (Revised edition). Taylor & Francis Group LLC, CrC Press.
Choudhary, S., & Singh, N. (2022). Analysis of Security-Based Access Control Models for Cloud
Computing. International Journal of Cloud Applications and Computing, 12(1), 1–19. doi:10.4018/IJCAC.2022010104.
Derfouf, M., & Eleuldj, M. (2018). Cloud Secured Protocol based on Partial Homomorphic Encryptions. 4th International
Conference on Cloud Computing Technologies and Applications (Cloudtech), Brussels, Belgium, doi:
10.1109/CloudTech.2018.8713353.
35
Dijk, M. V., Gentry, C., Halevi, S., & Vaikuntanathan, V. (2010). Fully homomorphic encryption over
the Integers, In: Advances in Cryptology-Eurocrypt”, Springer, Germany, vol, 6110, pp. 24–43.
ElGamal, T. (1985). A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on
Information Theory, vol. 31, no. 4, pp. 469-472.
Frantha, J., & Orsbone, P. (2021). Data Integrity Challenges in Cloud Computing. 9th International
Conference on Recent Innovations in Science Engineering and Management, (ICRISEM-21), pp. 936-943.
Galibus, T., Krasnoproshin, V., Albuqerque, R., & Pignaton de Freitas, E. (2016). Elements of Cloud
Storage Security, Concepts, Designs and Optimized Practices. Springer ebook, doi: 10.1007/978-3-319-44962-3.
Gentry, C., & Stanford University, Computer Science Department. (2009). A Fully Homomorphic
Encryption Scheme. Amsterdam University Press.
Gentry, C, (2010). Computing arbitrary functions of encrypted data. Communications of The ACM,
Vol. 53, no.3, pp. 97-105.
Goldwasser, S., & Micali, S. (1984). Probabilistic encryption. Journal of Computer and System Sciences,
vol. 28, no. 2, pp. 270-299.
Haghighat, H., Zonous, S., & Mottaleb, M. A. (2015). CloudID: Trustworthy Cloud-based and Cross-
Enterprise Biometric Identification. Expert Systems with Applications, vol. 42, no. 21, pp. 7905-7916, doi:
10.1016/j.eswa.2015.06.025.
Harfoushi, O., & Obiedat, R. (2018). Security in Cloud Computing using Hash Algorithm: A Neural
Cloud Data security model. Canadian Center of Science and Education, vol. 12, no. 6, doi: 10.5539/mas.v12n6p143.
Hayward, R., & Chiang, C. (2015). Parallelizing Fully Homomorphic Encryption for a Cloud
Environment. Journal of Applied Research and Technology, vol. 13, no. 2, pp. 245-252.
Helali, L., & Omri, M.N. (2021). A survey of data center consolidation in cloud computing systems.
Comput. Sci. Rev., vol. 39, p. 100366, Feb 2021, doi: 10.1016/j.cosrev.2021.100366.
Jabbar, I., & Najim, S. (2017). Using Fully Homomorphic Encryption to Secure Cloud Computing.
Internet of Things and cloud Computing. http://www.sciencepublishinggroup.com/j/iotcc, 4(2): 13-18.
Kacha, L., & Zitouni, A. (2018). An Overview on Data Security in Cloud Computing. Conference Paper in Advances in
Intelligent Systems and Computing(AISC), Springer International Publishing, vol. 661, pp. 250-261, doi: 10.1007/978-3-
319-67618-0_23.
Kartit, A. (2022). New Approach Based on Homomorphic Encryption to Secure Medical Images
in Cloud Computing. Trends in Sciences, 19(9), 3970. doi:10.48048/tis.2022.3970.
Kaur, T. (2019). Cloud Computing: A Study of the Cloud Computing Services. International Journal for Research in Applied
Science & Engineering Technology (IJRASET), vol. 7, no. VI, pp. 1933-1938, doi: 10.22214/ijraset.2019.6325.
Korda, D.R., Ansong, E.D., & Hodowu, D.K.M. (2021). Securing Data in the Cloud usding SDC
Algorithm. International Journal of Computer Application, pp.24-29.
36
Kumar, S., Karnani, G., Gaur M.S., & Mishra, A. (2021). Cloud Security using Hybrid Cryptography
Algorithms. 2nd International Conference on Intelligent Engineering and Management (ICIEM), pp. 599-604, doi:
10.1109/ICIEM51511.2021.9445377.
Labati, R. D., Genovese, A., Piuri, V, Scotti, F., & Vishwakarma, S. (2020). Computational Intelligence in Cloud Computing. In:
Kovács L., Haidegger T., Szakál A. (eds) Recent Advances in Intelligent Engineering. Topics in Intelligent Engineering
and Informatics, vol 14. Springer, Cham. https://doi.org/10.1007/978-3-030-14350-3_6.
Laroui, M., Boubakr, N., Hassine, M., Moussa, A. C., Hossam, A., & Mohsen, G. (2021). Edge and Fog
Computing for IoT: A Survey on Current Research Activities & Future Directions.” Computer Communications
180(June):210–31.
Maha, T., & Said, E. H. (2014). Secure Cloud Computing through Homomorphic Encryption.
International Journal of asdvancements in Computing Technology (IJACT), pp.29–38.
Mekawie, N., & Yehia, K. (2021). Challenges of Deploying Cloud Computing in E-Health. Procedia
Computer Science181:1049–57. doi: 10.1016/J.PROCS.2021.01.300.
Mesbahi, M. R., Rahmani, A.M., & Hosseinzadeh, M. (2019). Reliability and high availability in cloud
computing environments: a reference roadmap. Human centric computing and information science (Cent. Comput. Inf.
Sci.), Springer, vol. 8, no. 20, pp. 6-16, doi: 10.1186/s13673-018-0143-8.
Microsoft. (2022,July 12). Microsoft SEAL: Fast and Easy-to-Use Homomorphic Encryption Library. Microsoft Research.
https://www.microsoft.com/en-us/research/project/microsoft-seal/
Mohammed, M.A., & Al Attar, T.N.A. (2023). Fully Homomorphic Encryption Scheme for Securing
Cloud Data. UHD Journal of Science and technology, Vol.7, issue 2, pp 40-49.
Mohammed, S. J., & Dujan, B.T. (2021). From cloud computing security towards homomorphic
encryption: A comprehensive review. TELKOMNIKA Telecommunication, Computing, Electronics and Control, vol.19,
no.4, pp. 1152 – 116.
Narayana, K. E., Kumar, S., & Jayashree, K. (2017). A Review on different types of Deployment Models in Cloud Computing.
International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE), vol. 5, no. 2, pp.
1475-1480, doi: 10.15680/IJIRCCE.2017. 0502029.
Nasarul, K. V. (2017). Review on Benefits and Security Challenges of Cloud Computing. International Journal of Computer
Science and Information Technologies, vol. 8, no. 2, pp. 224-228.
Nishoni, S., & Aldo, T. A. (2020). Secure Communication with Data Analysis and Auditing using
Bilinear Key Aggregate Cryptosystem in Cloud Computing. Materials Today: Proceedings 24:2358–65.
Omotosho, O. (2019). A Review on Cloud Computing Security. International Journal of Computer Science and Mobile
Computing (IJCSMC), vol. 8, no. 9, pp. 245-257, doi: 10.14257/ijgdc.2015.8.5.21.
Orobosade, A., Thompson, A., Alese, B., & Arome, J. (2020). Cloud Application Security using Hybrid
Encryption. Communications on Applied Electronics 7(33):25–31.
Paillier, P. (1999). Public-key cryptosystems based on composite degree residuosity classes, In: Advances
in Cryptology-Eurocrypt ’99”. Vol. 1592, Springer Berlin Heidelberg, pp. 223-238.
Rashid, A., & Chaturvedi, A. (2019). Cloud Computing Characteristics and Services A Brief Review.
International Journal of Computer Sciences and Engineering, vol. 7, no. 2, pp. 421-426.
Rivest, R. L., Adleman, L., & Dertouzos, M. L. (1978). On data banks and privacy homomorphisms. Foundations of Secure
Computation, 4(11), 169-180.
Rivest, R. L., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems.
Communications of the ACM, 21(2), 120–126. doi:10.1145/359340.359342
Rocha, V. F., & Julio, L. (2019). An Overview on Homomorphic Encryption Algorithms.” Institute of
Computing, UNICAMP.
37
Saygili, O. Y. (2020). The Introduction to Private Cloud using Oracle Exadata and Oracle Database. Taylor & Francis, doi:
10.1201/9780429020902.
Smart, N., & Vercauteren, F. (2010). Fully homomorphic encryption with relatively small key and
ciphertext sizes in Public Key Cryptography-PKC. 2010, Springer, pp. 420-443.
Sun, P. J. (2020). Security and privacy protection in cloud computing: Discussions and challenges. Journal of Network and
Computer Applications, vol. 160, 2020, doi: https://doi.org/10.1016/j.jnca.2020.102642.
Suthar, F., Khanna, S., & Patel, J. (2019). A Survey on Cloud Security Issues. International Journal of Computer Sciences and
Engineering (IJCSE), vol. 7, no. 3, pp. 120-123, doi: 10.26438/ijcse/v7i3.120123.
Taghipour, M., Mowloodi, E., Mahboobi, M., & Abdi, J. (2020). Application of Cloud Computing in
System Management in Order to Control the Process. vol. 3, pp.34–55, 2020, doi: 10.31058/j.mana.2020.33003.
Waleed, T.A., Al-Jobouri, Q., & Al-Zoubi, H. (2019). Cloud Security based on Homomorphic
Encryption. International Journal of Advanced Computer Science and Application, vol. 10, No.8, pp 300-307.
Widyastuti, D., & Irwansyah, I. (2018). Benefits and Challenges of Cloud Computing Technology
Adoption in Small and Medium Enterprises (SMEs), doi: 10.2991/bcm-17.2018.46.
Xiao, L., Bastani, O., & Yen, I. L. (2012). An Efficient Homorphic Encryption Protocol for Multi-User
Systems. IACR Cryptology, Bellevue, WA, 2012.
Yao, A. C. (1982). Protocols for Secure Computations. Proceedings of the 23rd Annual Symposium on
Foundations of Computer Science (SFCS ‘82)”. IEEE Computer Society, pp. 160-164.
Yan, l., Hao, X., Cheng, Z., & Zhou, R.(2018). Cloud computing security and privacy. Proceedings of the 2018 International
Conference on Big Data and Computing, pp. 119-123, doi: 10.1145/3220199.3220217.
38