0% found this document useful (0 votes)
147 views

Thesis On Homomorphic Encryption Model For Data Security in Cloud Computing

THESIS

Uploaded by

Ahmad Maccido
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
147 views

Thesis On Homomorphic Encryption Model For Data Security in Cloud Computing

THESIS

Uploaded by

Ahmad Maccido
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 38

Homomorphic Encryption Model for Data Security in

Cloud Computing

PhD PROPOSAL

BY

NWOJI JUDE OGUEJIOFOR

PGS/04/20202601

1
Table of Contents
Abstract - - - - - - - - - iii
Chapter One
1. Introduction - - - - - - - - - 1
2. Problem Statement - - - - - - - - 1
3. Aim and Objectives - - - - - - - - 2
4. Research Question - - - - - - - - 2
5. Summary of Contributions - - - - - - - 2
6. Scope and Limitations - - - - - - - - 3
7. Chapters Organisation - - - - - - - - 3
Chapter Two
2.0 Literature Review - - - - - - - - 5
2.1 Cloud Computing - - - - - - - - 5
2.1.1 Characteristics of Cloud Computing Services - - - 6
2.1.2 Security issues for Cloud Computing - - - -- 7
2.2 Homomorphic Encryption Overview - - - - - - 9
2.2.1 Homomorphic Encryption Schemes - - - - - 9
2.3 Related Work - - - - - - - - - 10
2.4 Summary of related work - - - -- - - - 12
Chapter Three
3.1 Research Methodology and Data Analysis - - - - - 14
3.2 Homomorphic Encryption applied to cloud computing Security - - 14
3.3 Proposed Algorithm in Cryptosystem- - - -- - - 15
3.4 Data Analysis - - - - - - - - - 18
References - - - - - - - - -- - 20

2
Abstract
Most enterprises and academics adopted cloud computing due to convenient, cheaper and easy
accessibility of information unlike most computer owners that often encounter lots of challenges
as a result of storage facilities. Cloud computing technologies have attracted a number of
individuals and organizations to be part of it because; problems associated with storage facilities
have been obviated. Cloud Computing is a payable service where the customers are expected to
pay for the services offered to them on demand. These services exist in different ways obtainable
on hardware and software forms based on demand and they can be accessed via the internet.
Ideally, all services offered to the client by cloud computing service provider were not actually
domiciled or contained on the actual computer of the client rather on the computer of the cloud
computing service provider, as a result, the safety of data could be an issue. Although so many
efforts were made by researchers to tackle security issues via deployment of different techniques
such as Blowfish model, Advanced Encryption Standard (AES), Data Encryption Standard
(DES), Triple Data Encryption Standard (3DES), Rivest Cipher 4 (RC4), etc. However, most of
the research does not really address the major goal of data security at a time which is
authentication, confidentiality and integrity. This research proposes a methodology that can be
adopted to execute operations on encrypted data without decrypting them, without any changes on
the processed results as if they have worked directly on the plaintext. The proposed methodology
will be used to perform operations on encrypted data without knowing the private key (without
decryption), the client is the only holder of the secret key. The research will adopt Multiplicative
Homomorphic Encryption and Additive Homomorphic Encryption for the operation of data by
computing the Encryption of f into a and b (Enc(f (a, b)) without using the private key. The
cryptosystem will be evaluated by calculating an arbitrary number of additions and
multiplications and thus calculating any type of function on encrypted data and compare based on
four characteristics; (1) Homomorphic Encryption type, (2) Privacy of data, (3) Security applied
to and (4) keys used.

3
CHAPTER ONE

Introduction

1.0 Introduction
Information technology have revolutionized as a result of cloud computing. Cloud storage has
indeed become an integral and indispensable service for a wide range of organizations and sectors
(Abbas, Mahdi & Hussein, 2020). They stated that the increasing use and processing of data have
driven the adoption of cloud storage. Bentafat, Mazhar, Rathore and Bakiras (2021) posited that the
emergence of cloud storage and computing platforms empowers users to delegate storage and
computational tasks concerning their data, while also enabling businesses to relinquish the
responsibility of managing data centers. Cloud Computing is a service structured around a pay-as-
you-go model, where customers are charged based on the resources they consume, aligning costs
with usage. Cloud storage services are readily accessible through diverse hardware and software
configurations, adapting to fluctuating demands, and can be accessed via the internet (Rashid &
Chaturvedi, 2019).
The dynamic and flexible nature of cloud computing allows organizations to focus on their core
business activities while leveraging the capabilities of cloud service providers such as Google,
Microsoft and Amazon to efficiently and effectively meet their IT needs (Rashid & Chaturvedi,
2019). In an ideal scenario, the services provided to the client by a cloud computing service provider
are hosted on the provider's infrastructure rather than the client's local computer. Consequently, data
security could become a concern. However, the breaches of user privacy within cloud computing
posed a significant barrier to clients' adoption of cloud services. These developments necessitate
collaboration among clients, service providers, and web hosting companies to create a more robust
and secure environment. Such secure environment can be effectively established through the
implementation of security measures capable of thwarting intruders from engaging in various
malicious activities. The renowned approaches to supporting such security are the usage of
encryption/decryption techniques (Bentafat et al. 2021).
For the purpose of this work, the researcher proposed a Homomorphic Encryption model for data
security in cloud computing taking into cognizance, the convenience and efficiency of asymmetric
key cryptography which does not require sharing key with the recipient. A detailed explanation will
be presented beside a discussion of related works on Homomorphic Encryption cryptosystem.
A homomorphic encryption is one of the cryptographic methods that allow mathematical operations
to be carried out on a cipher text, instead of on the actual data itself. The cipher text is an encrypted
version of the input data (also called plain text), that is operated on and then decrypted to obtain the
4
desired output (Mohammed & Dujan, 2021). The critical property of homomorphic encryption is
that the same output would be obtained from decrypting the operated cipher text as from simply
operating on the initial plain text. This strategy aims to enhance the security of the communication
system by integrating cryptographic principles and secure computations. Establishing a secure
communication system opens the door to a wide range of applications that demand stringent privacy
protection, such as banking transactions and medical services (Burt, 2021). In other words, this
research to a large extent would address the three major goals of data security, which is
authentication, confidentiality and integrity.

1.2 Problem Statement

Security continues to be the cornerstone of successful trade and investments. With the increasing
adoption of cloud computing services by numerous organisations, the heightened usage has attracted
the attention of intruders seeking to breach cloud data (Frantha & Orsbone, 2021). Utilizing
conventional encryption algorithms to encrypt remote data prior to uploading it to the cloud provider
has emerged as the prevailing approach for bridging the security divide in cloud computing
environments. To implement this method, the customer will be required to provide the secret key to
the cloud service provider's server in order to decrypt the data prior to executing the necessary
computations on it. Hence, concerns arise regarding the privacy and confidentiality of the stored
data. Though, many security techniques were developed for safeguarding data in the cloud. Since the
publication of RSA (named after its inventors: Ron Rivest, Adi Shamir, and Leonard Adleman)
asymmetric cryptographic algorithm encryption scheme in 1978, computations on encrypted values
have attracted valuable attention.
Homomorphic encryption stands out as the fitting solution for addressing data security,
confidentiality, integrity, authentication and privacy concerns within cloud computing. This
encryption method proves effective in safeguarding data as it eliminates the necessity for processors
to decrypt inputs prior to executing desired operations (Waleed, Al-Jobouri & Al-Zoubi, 2019).
However, many of the proposed protection schemes designed to expand upon the basic model of
homomorphic encryption were hindered by lack of flexibility because it supported only a limited
number of arithmetic operations. Furthermore, the primary focus of researchers has been on crafting
algorithms for data security in cloud environments, with less attention directed towards performing
calculations on scrambled data without decoding and also addressing implementation challenges.
This study aims to bridge the existing research gap by delving into the modification of homomorphic
encryption referred to as secure data sharing (SDC) encryption algorithm, which enables the
execution of computations on encrypted data without the necessity of decoding. Therefore, by
employing the SDC encryption algorithm, the customer's data stored in the cloud server is
5
safeguarded, facilitating the execution of necessary computations on this encrypted data.

1.3 Aim and Objectives


This research aims to address data security issues in Cloud Computing and how encryption could
solve some issues. Moreover, a modification of Homomorphic Encryption known as SDC encryption
algorithm and its implementations were highlighted via the following objectives:
1. To investigate the performance/difficulties associated with data security in cloud
computing.
2. To develop a comprehensive understanding of the Homomorphic Encryption algorithm
and the framework used for its implementation.
3. To suggest a framework for implementing the SDC Encryption algorithm in cloud
computing.

1.4 Research Questions

To achieve the main goal of this research, the research expected to provide answers to the following
questions:
Q1: What are the performance challenges and obstacles related to data security in cloud computing?
Q2: What is the overview of Homomorphic Encryption algorithm?
Q3: What is the framework for implementing the SDC Encryption algorithm in cloud computing?

1.5 Summary of Contributions

Encryption techniques play a crucial role in enhancing data security within the cloud environment,
effectively thwarting intruders from executing various malicious activities. The renowned
approaches to support such security are the usage of encryption/decryption techniques (Bentafat et
al. 2021).
Instead of decrypting it first, the proposed model conducted mathematical operations directly on the
cipher text of the data. The research will evaluate the time of the encryption and decryption
compared with conventional encryption/decryption algorithms.
A novel aspect of this research, is that the model will offer comprehensive data security benefits that
are crucial for organizations seeking to leverage cloud computing while safeguarding their sensitive
information from unauthorized access and data breaches thereby enhancing communication systems
by integrating cryptographic theory and secure computation techniques.

6
1.6 Scope and Limitations

The research presents a concept of securing data in cloud computing with the application of
homomorphic encryption technique. Part of the limitation of this research is that the encryption
process produces a cipher text file larger than its original plaintext counterpart, leading to longer
decryption times compared to encryption.

1.7 Chapters Organisation

The research is structured in a way that helps to achieve a broad and connected analysis of Cloud
Computing and Homomorphic encryption. The thesis formed in 6 chapters:
In chapter 1, “General introduction”, we introduce the idea of Cloud Computing through which we
present the concept of Homomorphic Encryption (HE) its real-life implementations, and then we
tried to present the connection between the two concepts with more details.
In chapter 2, “Literature review”, we introduce the idea of Cloud Computing through presenting
many definitions in the literature, then we discuss the essential characteristics of Cloud Computing
together with a variety of existing services and deployment models.
Chapter 3, “Methodology” presents a review of the security concerns of Cloud Computing. Then
we introduce the use of cryptography in general for supporting security in the Cloud. More
specifically, we analyze conventional encryption as a potential step for solving the data security
concerns. Then the chapter ends by reviewing the challenges involved when the traditional
encryption is implemented in a Cloud environment.
.

7
Chapter Two
Literature Review

2.0 Introduction
Over the past few years, researchers (Rocha & Falcão, 2019; Ayman, Haneen & Eman, 2020;
Mohammed & Dujan, 2021; Korda, Ansong & Hodowu, 2021), introduced the principles of Cloud
Computing and Homomorphic Encryption individually. Therefore, it is necessary to review the
existing literature to discern the correlation between the two concepts.
In contemporary times, the Internet is regarded as the largest repository of information and the most
extensively utilized medium of communication (Lauroui et al., 2021). Promoting the social
networking features, emailing and blogging have all effectively and efficiently contributed to easing,
moving forward and improving the human being’s life. This wonderful resource made the whole
world look like a smaller place where billions of people live. However, with the tremendous growth
of the Internet, many issues were raised to harm and threaten the most sensitive information about
the users: their privacy (Ahmad & Garko, 2020). It is extremely important to be aware of the
different dangers that can face the internet users whenever they try to connect to the external world
through a public network. One must also be aware of the different parties that present a potential
fraud and should know how to deal with them. These malicious entities can be hackers, stalkers or
third party users (Ahmad & Garko, 2020). All of them strive to obtain sensitive and private
information, likely with intentions for malicious exploitation. Ultimately, every internet user should
be aware of the precise methods available to safeguard their privacy and utilize them effectively
(Orobosade, Thompson, Alese & arome, 2020; labati, Genovese, Piuri, Scotti & Vishwakarma,
2020).

2.1 Cloud Computing


Cloud Computing stands as one of the fastest-growing technologies, attracting researchers to
continually augment and refine its services (Nishoni & Aldo, 2020). This technology is transforming
traditional IT services into remotely accessible, on-demand hardware, and software services for
which users pay (Nishoni & Aldo, 2020; Alshareef, 2023). These services are managed and hosted
by the Cloud provider, who then delivers them to various organizations or customers. Organizations
gain advantages through heightened flexibility and efficiency, eliminating the necessity for a
dedicated IT team or investments in specialized hardware and software licenses. (Kumar, Kamani,
Gaur & Mishra, 2021).

8
2.2 Cloud Computing and Its Architecture

Researchers, such as (Abdalla & Varol, 2019; Taghipour, Mowloodi, Mahboobi & Abdi, 2020;
Mekawie & Yehia, 2021; Alshareef, 2023) posited that cloud computing architecture is defined by three
major layer, often referred to as the "cloud computing stack" or "cloud service models." Each layer
provides a different level of abstraction and functionality to users and developers. These layers are:
Cloud Infrastructure (Iaas), which provides raw computing resources, allowing users to manage
virtual machines, storage, and networking components. The cloud application platform (Paas), which
offers a platform and development tools for building and deploying applications without worrying
about the underlying infrastructure and the cloud application software (Saas), which delivers fully
functional software applications that users can access and use without the need for local installation
or maintenance. This layered architecture enables organizations and developers to choose the level
of control, flexibility and management they require based on their specific needs and expertise. It
also promotes scalability, cost-effectiveness, and rapid development and deployment of applications
and services.
Figure 1, shows a typical cloud computing ecosystem where various hardware components and
applications collectively form the cloud infrastructure. The network nodes, which consist of different
devices, serve as the end users of the cloud infrastructure and services (Alshareef, 2023).

9
Figure 1: Cloud Computing Architecture
Sourece:https://pimages.toolbox.co m/wp-content/uploads/2021/07/09134159/38-3.png

2.2.1 Cloud Service Models


Cloud service models also, refer to the different levels of services and functionalities that cloud
providers offer to users and organizations. These models are discussed in detail:
1. Infrastructure as a Service (IaaS)
In this model, cloud providers deliver virtualized computing resources over the internet. Users
can rent and manage virtual machines, storage, and networking components. They have control
over the operating systems, applications, and configurations within the provided virtual
machines. IaaS is suitable for users who need more control and customization over their
infrastructure (Abdalla& Varol, 2019).
Key characteristics of IaaS as posited by Mohammed and Dujan, (2021); Suthar, Khanna and
Patel, (2019); Kaur, (2019) include:
 Provisioning and management of virtualized hardware resources (e.g., virtual machines,
storage, networks).
10
 User control over operating systems, applications, and configurations.
 Scalability and flexibility to adjust resources based on demand.
 Pay-as-you-go pricing model.

2. Platform as a Service(PaaS)
PaaS offers a higher level of abstraction, providing a platform with development tools, runtime
environments, and frameworks for building, deploying, and managing applications. Developers
can focus on writing code and building applications without needing to manage the underlying
infrastructure. PaaS is suitable for developers who want to streamline application development
and deployment. (Mohammed & Dujan, 2021).
According to Narayana, Kumar and Jayashree, (2017); Suthar et al., (2019), key characteristics
of PaaS include:
 Development tools, runtime environments, and frameworks for building applications.
 Simplified application deployment and scaling.
 Automatic management of underlying infrastructure and resources.
 Reduced administrative tasks and improved developer productivity.

3. Software as a Service (SaaS)


SaaS delivers fully functional software applications over the internet on a subscription basis.
Users can access and use these applications through web browsers without the need for local
installation or maintenance. SaaS is suitable for users who want to access specific software
applications without managing the underlying infrastructure. (Alshareef, 2023).
Key characteristics of SaaS as posited by Aldosary and Allen, (2016); Basu, Bardhan, Gupita
and Saha, (2018) and Kaur, (2019) includes:
 Access to software applications hosted and managed by the provider.
 Subscription-based pricing model.
 Automatic updates and maintenance by the provider.
 User-friendly interfaces accessible from various devices.

11
12
Source:https://www.researchgate.net/profile/Mervat-Bamiah/publication/275036700/figure/fig2
/AS:669016616087575@1536517399779/Cloud-Computing-Deployment-Models-Mell-and-Grance-
2011_W640.jp g

2.2.2 Deployment Models


According to (Mekawie & Yehia 2021) deployment model in cloud computing defines the way
cloud computing services are implemented and made available to users. It defines the arrangement
and distribution of computing resources within a cloud environment. There are several deployment
models in cloud computing, each with its own characteristics and use cases. The main deployment
models are: (i) Public Cloud, (ii) Private Cloud, (iii) Community Cloud, (iv) Hybrid Cloud.

Figure 2.2: Cloud Computing Deployment Models. Source:https://www.researchgate.net/profile/Mervat-


Bamiah/publication/27 5036700/figure/fig2/AS:669016616087575@15365173997 79/Cloud-Computing-
Deployment- Models-Mell-and-Grance-2011 _W640.jpg

13
1. Public Cloud: A public cloud is a type of cloud computing where services are provided over a
network that is open for public use. The cloud infrastructure is owned and operated by a third-party
cloud service provider and resources are shared among multiple users (Widyastuti & Irwansyah,
2018). Public cloud services, such as IaaS, PaaS, and SaaS, are available to anyone who wants to use
them. Examples of public cloud providers include Amazon Web Services (AWS), Microsoft Azure,
and Google Cloud Platform (GCP) (Basu et al. 2018).

2. Private Cloud: A private cloud is a cloud computing environment that is dedicated to a single
organization. It can be physically located on-premises or hosted by a third-party service provider
(Narayana et al. 2017; Saygili, 2020). The key feature of a private cloud is that it provides a more
controlled and isolated environment, which can be desirable for organizations with specific security,
compliance, or performance requirements (Helali & Omri, 2021). The organization has more control
over the infrastructure and resources in a private cloud compared to a public cloud.

3. Community Cloud: A community cloud is a shared cloud environment that is used by multiple
organizations with common interests or requirements. It is a hybrid between public and private
clouds. Organizations within a specific industry, sector, or community collaborate to create and
share a cloud infrastructure that meets their collective needs (Foote, 2021). This model can help
organizations address shared concerns while still maintaining a level of control over their data and
resources.

4. Hybrid Cloud: A hybrid cloud is a combination of two or more different cloud deployment models
(typically a mix of public and private clouds) that remain distinct entities but are connected by
standardized or proprietary technology. This allows data and applications to be shared between
them. The hybrid cloud model is often used when organizations want to leverage the benefits of both
public and private clouds while maintaining control over certain sensitive data or workloads
(Alshareef, 2023).
It's important to note that the deployment models (public, private, community, hybrid) are different
from the cloud service models (IaaS, PaaS, SaaS). The service models describe the level of control
over the infrastructure and services, while the deployment models describe how the cloud
environment is set up and accessed, (Taghipour et al., 2020).

14
Advantages and Disadvantages of Deployment Models
Each cloud deployment model comes with its own set of advantages and disadvantages. The choice
of a deployment model depends on the specific needs and priorities of an organization (Mekawie &
Yehia, (2021); Saygili, (2020); Mohammed & Dujan (2021)).
Table1. Advantages and Disadvantages associated with each deployment model:
Cloud Model Advantages Disadvantages Examples
Public Cloud 1. Cost-Efficiency: Pay-2. Security Concerns: IBM smart cloud
as-you-go pricing Some organizations Google App Engine
allows organizations may have security and Amazon EC2
to pay for only the compliance concerns Microsoft Window
resources they use. due to the shared Azure
Scalability: Easily nature of resources.
scale resources up or 3. Limited
down based on Customization: Less
demand. control and
Accessibility: customization
Services are compared to private
accessible over the cloud deployments.
internet from 4. Potential Downtime:
anywhere in the Reliance on the
world. internet and third-
No Upfront Capital party providers may
Expenditure: lead to downtime if
Minimal upfront costs there are connectivity
as the infrastructure is issues or service
owned and maintained disruptions.
by the cloud provider.

Private Cloud Enhanced Security: 5. Higher Costs: Microsoft ECI data


Provides greater Typically involves center
control over security higher upfront costs Amazon VPC
measures, making it for infrastructure and Eucalyptus
suitable for sensitive ongoing maintenance.
data.
Customization: Limited Scalability:
Offers more May have limitations
customization and in quickly scaling
flexibility in resources compared to
configuring public clouds.
infrastructure and
services.
Predictable Complexity:
Performance: Requires skilled IT
Resources are personnel to manage
dedicated to a single and maintain the
organization, leading infrastructure.
to more predictable 6.
performance. 7.

15
Compliance: Easier
to achieve and
maintain compliance
with industry or
regulatory standards.

Hybrid Cloud Flexibility: Offers a Complexity: VMware Hybrid


balance between the Managing and cloud
customization of integrating multiple Microsoft hybrid
private clouds and the environments can be cloud
cost-effectiveness of complex. Amazon Web Service
public clouds.
Data and Security Challenges:
Application Requires careful
Portability: Allows management to ensure
the movement of data security policies are
and applications consistently applied
between public and across both
private environments. environments.
Scalability: Can scale Costs: Cost
resources dynamically management becomes
based on changing more complex when
workload dealing with multiple
requirements cloud providers and
environments.
Community Cloud Cost Sharing: Limited Flexibility: Google App Engine
Resources and costs May not provide the
are shared among same level of
organizations with flexibility as public or
common interests. hybrid cloud models.
Collaboration: Complex
Suitable for Governance:
collaborative efforts Requires effective
and shared services governance to address
among community the needs and
members. concerns of multiple
Compliance: Can be organizations.
designed to meet Dependency on
specific compliance Community
requirements of the Members: Relies on
community. the active
participation and
cooperation of
community members.

2.3 Cloud Computing Characteristics


Cloud computing is characterized by several key features that distinguish it from traditional
computing models. These characteristics collectively contribute to the flexibility, scalability, and
efficiency that cloud computing offers. In the studies of Nasarul, (2017); Yan, Hao, Cheng and

16
Zhou, (2018); Sun, (2020); Labati et al. (2020); Choudhary and Singh (2022), they discussed a number
of cloud computing characteristics, which includes:
1. On-Demand Self-Service: Users can provision and manage computing resources, such as virtual
machines, storage, and applications, without requiring human interaction with the service
provider. These enables users to quickly access and deploy resources as needed.
2. Broad Network Access: Cloud services are accessible over the internet from various devices,
such as laptops, smartphones, and tablets. This accessibility allows users to access their
applications and data from virtually anywhere.
3. Resource Pooling: Cloud providers pool computing resources to serve multiple users
simultaneously. These resources are dynamically allocated and reassigned based on demand.
Users share resources while maintaining a sense of isolation from each other.
4. Rapid Elasticity: Cloud resources can be quickly scaled up or down based on workload
demands. This elasticity allows users to handle fluctuating resource requirements without
significant manual intervention.
5. Measured Service: Cloud systems automatically monitor and measure resource usage. Users are
billed based on their consumption, promoting cost efficiency. This pay-as-you-go model is more
cost-effective compared to traditional fixed-cost models.
6. Multi-Tenancy: Multiple users or "tenants" can share the same physical infrastructure while
remaining isolated from each other. Tenants can have their own virtualized resources, ensuring
security and privacy.
7. Ubiquitous Network Access: Cloud services are accessible from various devices over the
internet, providing seamless access to applications and data. This enables remote work and
collaboration.
8. Resource Virtualization: Cloud providers use virtualization technologies to create virtual
instances of computing resources, such as virtual machines, storage, and networks. This
abstraction allows for better resource utilization and management.
9. Resilient and Redundant: Cloud services are often designed with redundancy and fault
tolerance in mind. This ensures high availability and reliability, minimizing service disruptions.
10. Self-Healing and Automated Management: Cloud platforms can automatically detect failures
and perform recovery actions without manual intervention. Automated management tools help
optimize resource allocation and performance.
11. API-Driven: Cloud services are often accessible through Application Programming Interfaces
(APIs), allowing developers to programmatically interact with and manage resources. This
enables automation and integration with other systems.

17
12. Scalability: Cloud services can scale both vertically (adding more resources to a single
instance) and horizontally (adding more instances to distribute load). This scalability supports
growing workloads and user demands.
These characteristics collectively enable organizations and individuals to leverage cloud
computing to achieve greater flexibility, efficiency, and innovation in their IT operations and
services.

2.3.1 Benefits of Cloud Computing

The popularity of cloud computing has indeed led to a variety of benefits that enable networks,
applications and services to be shared and distributed in a more effective and efficient manner.
Studies in Haghighat, Zonous and Mottaleb, (2015); Galibus, (2016); Nasarul, (2017); Yan et al.
(2018); Sun, (2020); Chandrasekaran, (2021), outlined some of the benefits of Cloud computing.
The on-demand nature of cloud computing and the accessibility it provides to a wide array of
resources have significantly transformed the way businesses and individuals approach technology
(Alshareef, 2023). The Benefits include amongst others;
1. Cost Savings: Cloud computing eliminates the need for upfront capital investments in hardware,
infrastructure, and maintenance. You can pay for resources on a consumption basis, reducing
overall costs.
2. Scalability: Cloud services allow you to scale your resources up or down based on demand,
ensuring optimal performance during peak periods and avoiding wastage during low-demand
times.
3. Flexibility: Cloud platforms provide a variety of resources, including computing power, storage,
and networking, which can be easily customized to meet your specific needs.
4. Global Accessibility: Cloud services can be accessed from anywhere with an internet
connection, enabling remote work, collaboration, and data access.
5. Rapid Deployment: Cloud computing enables quick provisioning of resources, reducing the
time it takes to deploy applications and services.
6. Innovation: Cloud providers offer access to advanced technologies like artificial intelligence,
machine learning, and analytics, enabling innovation and experimentation without large upfront
investments
7. Automatic Updates: Cloud services typically handle updates, patches, and security
enhancements, ensuring that your applications are up-to-date and secure without requiring
extensive manual intervention.

18
8. Reliability and Redundancy: Cloud providers often have redundant data centers and robust
backup solutions, enhancing reliability and minimizing data loss in case of hardware failures or
disasters.
9. Disaster Recovery: Cloud platforms offer improved disaster recovery solutions, allowing you to
recover data and services quickly after unexpected events.
10. Resource Efficiency: Cloud environments often optimize resource utilization, leading to better
energy efficiency and reduced environmental impact compared to traditional on-premises setups.
11. Collaboration: Cloud-based collaboration tools enable teams to work together seamlessly,
regardless of their geographical locations.
12. Security: Cloud providers invest heavily in security measures, employing encryption, access
controls, and compliance certifications to safeguard data and applications.
13. Reduced IT Maintenance: Cloud services handle hardware maintenance, updates, and
troubleshooting, freeing up IT staff to focus on strategic tasks.
14. Testing and Development: Cloud environments are ideal for creating testing and development
environments without the need for dedicated hardware.
15. Competitive Edge: Cloud computing empowers businesses to respond quickly to market
changes, adopt new technologies, and deliver services faster, providing a competitive advantage.
16. Pay-as-You-Go Pricing: The pay-as-you-go model allows businesses to only pay for what they
use, avoiding over provisioning and providing cost predictability.
17. Data Insights: Cloud-based analytics tools allow organizations to extract valuable insights from
data for better decision-making.
18. Remote Monitoring and Management: Cloud services enable remote monitoring and
management of resources, making it easier to maintain and optimize your systems.
19. Regulatory Compliance: Many cloud providers offer compliance certifications and tools that
can help businesses adhere to industry regulations.
20. Sustainability: Cloud services' resource optimization and energy-efficient designs contribute to
reduced energy consumption and a smaller carbon footprint.

2.3.2 Demerits of Cloud Storage


It is important to note that while cloud storage offers many benefits, there are also several
disadvantages and risks that organizations should consider before adopting this technology. Key
disadvantages and risks associated with utilizing cloud storage as posited by Galibus, (2016); Yan et
al., (2018); Kaur, (2019); Abdalla and Varol, (2019); Alshareef, (2023), includes;

19
1. Data Security and Privacy Concerns: Storing sensitive or confidential data in the cloud raises
concerns about unauthorized access, data breaches, and privacy violations. Organizations may worry
about losing control over their data, especially when it's hosted on third-party servers.
2. Dependency on Internet Connectivity: Cloud storage relies on a stable and fast internet
connection. If your internet connection is slow or unreliable, accessing and transferring data to and
from the cloud can be challenging and time-consuming.
3. Downtime and Outages: Cloud service providers can experience downtime and outages, which can
disrupt your access to data and applications. Even major cloud providers have experienced
significant downtime in the past, affecting their customers' operations.
4. Limited Control and Customization: Cloud storage services often provide standardized solutions,
which may not fully meet your organization's specific needs. You might have limited control over
the infrastructure and configuration, making it difficult to customize the environment to your
requirements.
5. Vendor Lock-In: Migrating data and applications to a different cloud provider or back to on-
premises infrastructure can be challenging due to compatibility issues and proprietary formats. This
can lead to vendor lock-in and hinder your flexibility to switch providers.
6. Data Transfer Costs: While many cloud providers offer free or low-cost data uploads, transferring
large volumes of data into or out of the cloud can incur significant data transfer costs. This is
especially relevant for organizations with large datasets.
7. Performance Variability: Cloud storage performance can be subject to variability due to factors
like network latency, shared resources, and server load. This can impact application responsiveness
and user experience.
8. Data Loss and Recovery: Although cloud providers implement backup and disaster recovery
mechanisms, data loss can still occur. Ensuring proper data backup and recovery strategies is crucial
to mitigate this risk.
9. Regulatory Compliance Challenges: Depending on your industry and location, regulatory
compliance requirements may restrict where and how you store data. It's important to ensure that
your cloud provider complies with relevant regulations.
10. Long-Term Costs: While cloud storage can offer cost savings in the short term, over the long term,
costs can accumulate as your storage needs grow. Organizations should carefully analyze pricing
models and consider the Total Cost of Ownership (CTO).
11. Service Discontinuation: Cloud providers might discontinue or change the services they offer. This
could lead to migration challenges and require you to reevaluate your storage strategy.

20
12. Data Residency and Sovereignty: Depending on your geographical location and the location of
your cloud provider's data centers, there could be legal and regulatory implications related to data
residency and sovereignty.
However, to address these disadvantages and risks, organizations should conduct a thorough risk
assessment, carefully choose their cloud service provider and develop a comprehensive cloud
strategy that includes security measures, data backup plans, and contingency plans for potential
issues. (Alshareef, 2023). It's important to weigh the pros and cons of cloud storage based on your
organization's specific needs, priorities, and risk tolerance (Kaur, 2019).

2.4 Security Issues in cloud computing


2.4.1 Data security in the Cloud
Security pertaining to data in the cloud presents greater complexity compared to conventional
systems (Nasarul 2017). Researchers (Kacha & Zitouni, 2018); (Orobosade et al., 2020); (Labati et
al., 2020); (Chandrasekaran, 2021), argued that merely offering Infrastructure as a Service (IaaS),
Platform Service (PaaS), or Software as a Service (SaaS) in the cloud falls short if the cloud provider
does not ensure enhanced security and confidentiality of customer data. Hence, for any cloud service
to garner user trust and encourage technology adoption, it must operate within a reliable and
trustworthy environment (Chandrasekaran, 2021). There are many security considerations associated
with cloud computing, which can be categorized into two primary types: security concerns related to
the cloud service provider and those related to the customer.
Within the context of cloud computing, data security revolves around the fusion of three
fundamental principles encapsulated in the CIA triangle: confidentiality, integrity, and availability
(Kacha & Zitouni, 2018; Omotosho 2019).

2.4.2 Data Confidentiality in the Cloud


According to Kaur, (2019); Sun, (2020), data confidentiality in cloud computing refers to the
protection of sensitive information stored, processed, or transmitted within cloud-based
environments from unauthorized access, disclosure, or modification. It involves implementing
various security measures and controls such as (RSA, DES, SDES, AES, 128-bit encryption) to
ensure that data remains confidential and accessible only to authorized users or entities. These
measures typically include encryption, access controls, data segregation, authentication mechanisms,
and compliance with relevant regulations and standards (Omotosho, 2019). The goal of cloud data
confidentiality is to safeguard sensitive data from unauthorized disclosure, ensuring the privacy and
integrity of information stored in the cloud (labati et al. 2020).

21
2.4.3 Data Integrity in the Cloud
Data integrity pertains to the assurance that data remains accurate, consistent, and unaltered
throughout its lifecycle within the cloud environment. It encompasses the preservation of data
reliability, ensuring that information retains its intended meaning and validity ( Frantha & Orsbone
2021). Data integrity is essential for maintaining trust and confidence in the cloud services utilized by
organizations. It ensures that data is not susceptible to unauthorized access, tampering, or corruption,
thereby safeguarding its integrity and reliability.
Achieving data integrity in cloud computing involves the implementation of various technical and
procedural measures. Encryption mechanisms are commonly employed to protect data both in transit
and at rest, ensuring confidentiality and mitigating the risk of unauthorized modifications.
Additionally, access controls and authentication mechanisms are enforced to restrict data access to
authorized users, reducing the likelihood of malicious alterations (Harfoushi & Obiedat 2018; Sun,
2020; Choudhary & Singh, 2022).
Furthermore, cloud service providers typically employ data redundancy and replication techniques to
enhance data durability and resilience against potential data loss or corruption events. Regular data
backups and integrity checks are performed to detect and mitigate any discrepancies or anomalies in
stored data (Omotosho, 2019).
Organizations leveraging cloud services are also responsible for implementing robust data integrity
policies and practices which includes defining clear data handling procedures, enforcing access
controls, and conducting regular audits to ensure compliance with regulatory requirements and
industry standards.
Data integrity in cloud computing is fundamental for maintaining the trustworthiness and reliability
of cloud-based data assets, enabling organizations to confidently leverage cloud services for their
data storage, processing, and management needs (Choudhary & Singh 2022).

2.4.4 Data Availability in the Cloud


Data availability in cloud computing refers to the accessibility and readiness of data resources to
users or applications whenever needed, without disruption or delay. It ensures that data stored or
processed in the cloud environment is consistently accessible and retrievable, meeting the
requirements of users, applications, and business operations (Musbahi, Rahmani & Hosseinzadeh,
2019; Choudhary & Singh, 2022).
Data availability is critical for ensuring uninterrupted access to data resources, supporting business
continuity, and enabling organizations to meet their operational and service level requirements
effectively. By leveraging redundant infrastructure, scalable solutions, and proactive maintenance

22
practices, organizations can ensure high levels of data availability in the cloud environment
(Bajaber, Alqulaity & Alotaibi, 2019).
Conventionally, data is encrypted before sending it to cloud provider, but to execute the calculations
the data should be decrypted every time they need to work on it. Until now it was impossible to
encrypt data and to trust a third party to keep them safe and able to perform distinct calculations on
them. So to allow the Cloud provider to perform the operations on encrypted data without decrypting
them requires using the cryptosystems based on Homomorphic Encryption (Ayman et al., 2020).

2.5 Homomorphic Encryption Overview


Homomorphic encryption is a cryptographic technique that allows computations to be performed on
encrypted data without first decrypting it (Mohammed & Dujan, 2021). In other words, it enables
computations on data while it is still in its encrypted form. The critical property of homomorphic
encryption is that the same output would be obtained from decrypting the operated cipher text as
from simply operating on the initial plain text (Rocha & Julio, 2019). This is particularly useful for
preserving the privacy and security of sensitive information, as it allows data to remain confidential
even during processing. Homomorphic encryption has applications in various fields, especially in
scenarios where privacy is crucial, such as secure cloud computing, confidential data processing, and
privacy-preserving machine learning. It allows data to be processed without revealing their content,
which is valuable in situations where sensitive information needs to be, protected (Ayman et al.,
2020). A cryptographic system possessing the characteristic outlined above is referred to as a
homomorphic encryption scheme. There are three types of homomorphic encryption schemes, which
includes; somewhat, partially and fully homomorphic encryption. Somewhat homomorphic
encryption allows mathematical operations involving addition and multiplication. However, its
capabilities are restricted to a specific number of operations due to the incremental addition of noise
with each operation. Beyond a certain threshold of added noise, data retrieval becomes unfeasible.
Conversely, partially homomorphic encryption facilitates an unrestricted number of operations;
however, it is confined to performing only a singular type of operation (Derfouf & Eleuldj, 2018).
Fully homomorphic encryption enables the application of both addition and multiplication
operations to the data, without any limitations on the number of times these operations can be
performed.

2.6 Homomorphic Encryption Schemes (HES)


This section provides an overview of the historical progression of homomorphic encryption,
elucidating its mechanisms, characteristics and applications where the involvement of HES is
beneficial. With homomorphic encryption, individuals can perform accurate operations on encrypted
23
values without needing knowledge of their content. This capability arises from the definition of the
encryption circuit as a group homomorphism, preserving operations within the group. A group
homomorphism enables the computation of equivalent results, whether operating on encrypted or
unencrypted values (Ayman et al., 2020). This adaptability addresses security concerns in numerous
applications where sensitive processing is outsourced to third parties that may not be fully trusted
(Choudhary & Singh 2022).
The concept of homomorphic encryption was first introduced by Rivest, Adleman, and Dertouzos
(1978a) through presentation of RSA encryption . Rivest et al., (1978b) also, introduced the concept
of privacy homomorphism as well by utilizing exponentiation and large integers, they crafted an
additive and multiplicative homomorphic circuit known as RSA. RSA establishes a secure public
key cryptosystem by leveraging the complexity associated with factoring large prime numbers. This
key serves the purpose of encrypting data and executing basic operations on them. Nevertheless,
substantial progress did not materialize until Gentry, (2009) a graduate student at Stanford
University made a significant breakthrough in 2009. Gentry's work showed that it was theoretically
possible to create a fully homomorphic encryption scheme. However, initial construction was
impractical due to its complexity and inefficiency.
After Gentry's breakthrough, researchers began working on more practical and efficient
homomorphic encryption schemes. Researchers like Marten van Dijk, Craig Gentry, Shai Halevi,
and Vinod Vaikuntanathan (DGHV) developed practical schemes that started to show promise in
terms of performance.
IBM released the first version of the Homomorphic Encryption Toolkit in 2011, providing a set of
tools for experimenting with and implementing homomorphic encryption. This toolkit played a
crucial role in making homomorphic encryption more accessible to researchers and developers.
Microsoft released the Simple Encrypted Arithmetic Library (SEAL) in 2013, an open-source
homomorphic encryption library. SEAL aimed to provide a more user-friendly and efficient
implementation of homomorphic encryption.
In 2014, the IEEE initiated the Standardization of Fully Homomorphic Encryption project, aiming to
create standards for fully homomorphic encryption. The project has been ongoing, with efforts to
standardize various aspects of homomorphic encryption for practical use.
IBM launched the IBM Cloud Homomorphic Encryption Services in 2018, offering a practical
implementation of homomorphic encryption for businesses to perform computations on encrypted
data in the cloud.
2.6.1 Advantages and Disadvantages of Homomorphic Encryption scheme

24
Homomorphic encryption schemes offer several advantages in scenarios where preserving the
privacy and security of data is paramount. Some of the key advantages as presented by IEEE Digital
Privacy 2024 include:
1. Privacy Preservation: Homomorphic encryption allows computations to be performed on
encrypted data without the need to decrypt it first. This means that sensitive data remains
confidential throughout the computation process, minimizing the risk of data exposure or
unauthorized access.
2. Secure Outsourcing of Computation: With homomorphic encryption, data owners can
securely outsource computations to third-party service providers or cloud platforms without
revealing the underlying data. This enables organizations to take advantage of cloud computing
resources while maintaining control over their sensitive data.
3. Data Confidentiality: Since computations are performed on encrypted data, unauthorized
parties-including service providers or cloud administrators -cannot access the plaintext data or the
intermediate results of computations. This ensures the confidentiality of data even when it's
processed by external entities.
4. Flexible Data Utilization: Homomorphic encryption supports various types of computations,
including addition, multiplication, and more complex operations depending on the specific
encryption scheme used. This flexibility allows for a wide range of applications, including data
analysis, machine learning, and secure data sharing.
5. Compliance with Privacy Regulations: In industries with strict data privacy regulations (such
as healthcare and finance), homomorphic encryption can help organizations comply with
regulations like HIPAA (Health Insurance Portability and Accountability Act) or GDPR
(General Data Protection Regulation) by ensuring that sensitive data is protected throughout
processing.
6. Reduced Data Transfer Risks: By performing computations on encrypted data locally or within
a secure environment, organizations can reduce the risk associated with transferring sensitive
data across networks. This minimizes the likelihood of data breaches or interception during
transit.
7. Protection against insider Threats: Homomorphic encryption helps mitigate the risk of insider
threats within organizations. Even administrators or employees with access to the computational
infrastructure cannot access the plaintext data or intermediate results, thus reducing the potential
for data misuse or unauthorized access.
Despite these advantages, it's important to consider that homomorphic encryption also comes
with challenges, such as computational overhead, complexity of implementation, and limitations
on supported operations. However, ongoing research and advancements in homomorphic
25
encryption techniques aim to address these challenges and further enhance the practical
applicability of this technology.

2.6.2 Categories of Homomorphic Encryption

There are various types of homomorphic encryption schemes, including partially homomorphic,
somewhat homomorphic and fully homomorphic encryption (Alaya, Laouamer & Msilini, 2022).
1. Partially Homomorphic Encryption (PHE): This type allows either addition or multiplication
operations to be performed on encrypted data, but not both. Examples include the Paillier
cryptosystem, which supports addition, and the ElGamal cryptosystem, which supports
multiplication.
2. Somewhat Homomorphic Encryption (SHE): SHE schemes support both addition and
multiplication operations on encrypted data but have limitations on the number of operations that
can be performed before decryption is required. The first fully homomorphic encryption scheme
proposed by Gentry was based on bootstrapping techniques applied to SHE schemes.
3. Fully Homomorphic Encryption (FHE): FHE allows both addition and multiplication
operations to be performed on encrypted data. This is a more advanced and complex form of
homomorphic encryption. FHE enables a broader range of computations to be carried out on
encrypted data, making it more versatile. However, fully homomorphic encryption is
computationally more intensive and has higher overhead compared to partially homomorphic
schemes.
Recently, there has been ongoing research to improve the efficiency and practicality of
homomorphic encryption. Various applications in secure data analysis, privacy-preserving
machine learning, and secure cloud computing have been explored (Mohammed & Al Attar,
2023).

2.6.3 Processes in Homomorphic Encryption Scheme

According to Alaya et. al. (2022); Mohammed and Al Attar, (2023), the process in a homomorphic
encryption scheme involves the following steps:
1. Key Generation: The first step involves generating public and private keys for encryption and
decryption. These keys are typically generated using well established cryptographic algorithms.
2. Encryption: Data that needs to be processed is encrypted using the public key. This results in cipher
text, which appears as random data and cannot be understood without the corresponding private key.
3. Homomorphic Operations: Homomorphic encryption schemes support specific mathematical
operations (e.g., addition or multiplication) on cipher texts that correspond to equivalent operations
26
on plaintexts. There are different types of homomorphic encryption schemes, such as partially
homomorphic encryption (which supports either addition or multiplication operations) and fully
homomorphic encryption (which supports both addition and multiplication operations).
4. Evaluation: In this step, the encrypted data undergoes computations or operations while remaining
encrypted. These operations are typically performed using specialized algorithms that leverage the
homomorphic properties of the encryption scheme.
5. Decryption: Once the computations are completed, the result is decrypted using the private key.
Only the entity possessing the private key can decrypt the result and obtain the final output.
6. Security Considerations: Throughout the process, it's crucial to ensure the security of the
encryption scheme. This includes protecting the keys, preventing attacks that could compromise the
confidentiality of the data or the integrity of the computations, and ensuring that the chosen
homomorphic encryption scheme meets the desired security requirements.
These processes collectively enable the use of homomorphic encryption to perform computations on
encrypted data securely, without exposing sensitive information. However, homomorphic encryption
typically incurs significant computational overhead compared to traditional (non-encrypted)
computations, which can affect performance and scalability in practical applications (Mohammed &
Al Attar, 2023).

(START HERE)

2.7 Related Work


The initial proposal for homomorphic encryption, introduced by Rivest et al., (1978a) was a form of
partially homomorphic encryption. Shortly after Rivest et al.'s (1978a) introduction of RSA
encryption, Rivest et al., (1978b) introduced the concept of privacy homomorphism.
Following that, Yao (1982); Goldwasser and Micali (1984); Elgamal, (1985) and Paillier (1999); each
contributed to the development of privacy homomorphic encryption (PHA) schemes.
Though, substantial progress was not achieved until 2009 when Gentry, a graduate student at
Stanford University, developed an algebraic homomorphic encryption scheme as part of his graduate
thesis. This algebraic scheme enables the computation of an unlimited number of additions and
multiplications, thereby enabling the evaluation of arbitrary functions using encrypted data.
The Gentry cryptosystem incorporates multiple stages, built upon the framework of the Somewhat
Homomorphic Encryption (SWHE) algorithm, utilizing ideal lattices. These lattices are constrained
to evaluate low-degree polynomials over encrypted data. This limitation partially arises due to the

27
noise present in each cipher text, which gradually increases until it reaches a point where the noise
renders the resulting cipher text undecryptable.
Dijk et al. (2010) introduced the DGHV algorithm, a fully homomorphic encryption scheme. This
algorithm enhances Gentry's cryptosystem by demonstrating that the somewhat homomorphic
components of ideal lattices can be replaced with a simpler homomorphic algorithm that operates
with integers. This algorithm is theoretically simpler when compared to Gentry's cryptosystem. This
straightforward algorithm possesses both additive and multiplicative homomorphic properties,
enabling it to perform low-complexity mathematical operations. Additionally, it can leverage
bootstrapping and squashing techniques to transform into a fully homomorphic encryption scheme.
In 2010, Gentry introduced a homomorphic encryption algorithm referred to as "Gen 10," in the
ACM publication which represented an advancement over prior work in cloud computing. This
algorithm, characterized by the structure , demonstrated notable improvements. The
variable denotes the encrypted message, serving as the cipher text, while represents the key, and
stands for an arbitrary numerical value. The encryption process exhibits homomorphic properties
with respect to addition, subtraction, and multiplication operations. There is a relationship between

and , where is the residue of modulo expressed . The encryption process in Gen
10 follows this approach: for keyGen, an arbitrary p-bit odd integer is selected. To encrypt a bit

, represents an arbitrary N-bit number such that . The resulting cipher text is

expressed as , where represents an arbitrary Q-bit number. The Decrypt function

yields , where is denoted as the integer C within the range ,

satisfying .

Various researchers, including Smart and Varcauteren (2010); Xiao, Bastani and Yen, (2012); Maha
and Said, (2014); Hayward and Chiang (2015); have suggested various applications for
homomorphic encryption within the context of cloud computing. However, most of these schemes
were insecure because they lack adequate measures to safeguarding cipher text recovery thus,
permitting plaintext leak out.
In the work of Jabbar and Najim (2017), they proposed a fully homomorphic encryption to secure
data in cloud environment. They analyzed some of the existing homomorphic encryption schemes
and discussed the use of SDC algorithm scheme in securing cloud computing data. Their work to
some extent addressed cipher text recovery. However, it lacks implementation of the algorithm.
Waleed, Al-Jobouri and Al-Zoubi, (2019), proposed Cloud Security Based on Homomorphic
Encryption. The proposed approach explored applications of fully homomorphic encryption scheme
in securing data in cloud environment but with less emphasis on the implementation of the scheme.

28
Furthermore, Korda, Ansong and Hodowu, (2021) introduced the SDC algorithm, a straightforward
fully homomorphic encryption technique inspired by Gentry’s cryptographic algorithm designed to
offer user-friendliness while minimizing reliance on end-client security measures. This framework
also provides the flexibility to manage cryptographic operations within a trusted infrastructure.
Additionally, it enables the transmission of encoded data to the public cloud without granting the
cloud the ability to decode the data it stores.
It is crucial to emphasize that the most of the works under review advocate for performing either
addition, multiplication, or both operations on encrypted data. However, none of them have
mentioned any cipher text recovery algorithms.
Studies revealed that, the cipher text recovery algorithm in the DGHV scheme involves transferring
the secret key to the server, posing significant instability concerns.
Despite the cipher text recovery algorithms of Gen 10; Smart and Varcauteren (2010), Xiao et al.
(2012), Maha and Said (2014), Kocabas and Soyata (2015), requiring the presentation of q to the
server, they utilize c mod q where q is an irregular number and c is the cipher text. However, the
plaintext still leaks.
Though, the works of Jabbar and Najim (2016); Waleed et al. (2019) provided frame work for cipher
text recovery but lacks implementation.
The algorithm proposed by Korda et al. (2021) addresses the issue of cipher text recovery without
any leakage of plaintext. Regardless of their decoding procedure relying on the secret key p, it's
worth noting that the recovery process utilizes the entirely unique whole number q. Therefore, it
satisfies both the requirement for cipher text recovery and simultaneously ensures information
security.
This research, Homomorphic Encryption Model for Data Security in Cloud Computing intends to
build upon the work of Korda et al.(2021), by leveraging on the SDC encryption algorithm which is
a modification of a fully homomorphic encryption model in securing data in the cloud environment.

29
REVISIT THIS

Chapter Three
3.1 Research Methodology and Data Analysis
Typically, standard encryption techniques are utilized to protect data during its transfer to the cloud.
An alternative approach involves encrypting the data prior to sending it to the Cloud service
provider. This necessitates decrypting the data at each operational stage, where the client typically
provides the private key to the server (Cloud provider) for decryption before executing the required
calculations. However, this process may impact the confidentiality and privacy of the data stored in
the Cloud (Alsufian et al., 2022).
This study suggests the development of an ecosystem framework for cloud computing, enabling the
execution of various operations on encrypted data without the need for decryption. This approach
aims to yield results comparable to working directly on the raw data during calculations.
Homomorphic Encryption systems enable the execution of operations on encrypted data without the
requirement of knowing the private key (i.e. without decryption), with the client being the sole
possessor of the secret key (Ayman et al., 2020). Upon decrypting the outcome of any operation, the
result is identical to conducting the calculation on the original raw data.
In this context, a straightforward method for enhancing data security in the cloud is proposed. This
approach involves the utilization of a public-key-based homomorphic authenticator, accompanied by
the implementation of a random masking privacy-preserving algorithm for secure data transmission.
The suggested model incorporates a bilinear aggregate signature, following Nishoni and Aldo's
(2020) recommendation. This inclusion aims to enable efficient key auditing, ensuring the
maintenance of ciphertext size without unnecessary expansion . It concurrently preserves all log files
while simultaneously verifying and synchronizing the data onto the cloud ((Nishoni and Aldo 2020).
The primary objective of the cloud service provider is to uphold and verify the integrity of data. If
minor alterations occur in the data, the data owner sends a corresponding report to the user. The
homomorphic authenticator algorithm is employed to uphold the integrity of the data. The
homomorphic authenticator algorithm is designed for digital signature applications, specifically for
securely "compressing" large files before encryption with a private (secret) key in a public-key
cryptosystem like the bilinear key aggregate system (Nishoni and Aldo 2020). Leveraging
cryptosystems based on Homomorphic Encryption allows cloud providers to execute operations on
encrypted data without the need for decryption (Alaya et al. 2022).
3.2 Homomorphic Encryption Applied to Cloud Computing Security

30
This research employs standard encryption method to safeguard both the operations and storage of
data when transferring it to the Cloud. The primary approach involves securing the data by
encrypting it before transmitting it to the Cloud provider. For data decryption before performing the
necessary calculations, the client must furnish the private key to the server (Cloud provider),
potentially impacting the confidentiality and privacy of the stored data in the Cloud. This study
introduces a model for conducting operations on encrypted data without the need for decryption,
ensuring that the outcomes of the calculations remain consistent with those obtained from processing
the raw data directly. Homomorphic Encryption model would be adopted to achieve the purpose.
3.3 Proposed Algorithm in Cryptosystems
Homomorphic Encryption systems enable the execution of operations on encrypted data without the
requirement of knowing the private key (i.e. without decryption), with the client being the sole
possessor of the secret key. Upon decrypting the outcome of any operation, the result is identical to
conducting the calculation on the original raw data (Ayman et al. 2020).
An encryption is Homomorphic, if: from Encryption (a), Enc(a) and Encryption (b), Enc(b) it is
possible to compute Enc(f (a, b)), where f can be: +, ×, ⊕ and without using the private key. Within
Homomorphic encryption, distinctions are made based on the operations it enables access to on raw
data, the additive Homomorphic encryption (only additions of the raw data) is the Pailler and
Goldwasser-Micalli (Alaya et al., 2022).
Ek is an encryption algorithm with key k.
Dk is a decryption algorithm.
Dk (Ek (n) × Ek (m)) = n×m or Enc (x⊗y) = Enc(x) ⊗ Enc(y)
DL (EL (n) × EL (m)) = n+m or Enc (x⊕y) = Enc(x) ⊗ Enc(y)
The first property is called additive homomorphic encryption, and the second is multiplicative
homomorphic encryption. An algorithm is fully homomorphic if both properties are satisfied
simultaneously.

Multiplicative Homomorphic Encryption (RSA cryptosystem):

Homomorphic Encryption exhibits a multiplicative property when there exists an algorithm capable

of computing Enc(x * y) based on Enc and Enc all without knowledge of the values of x and y
(Kartit 2022). Examples of this include the RSA and Elgamal algorithms.
According to Rivest et al.(1978), they illustrated the RSA algorithm, demonstrating it as an instance
of a multiplicative homomorphic scheme as shown below.
 Key Generation
Pick two large primes and such that ,
31
where is Euler’s totient function.

Pick an integer such that and gcd (coprime)

Public Key

Private Key

 Encryption

 Decryption

The multiplicative homomorphic characteristic of the RSA scheme can be described as follows (Burt
2021).

Suppose and are plaintext;

Then

(1)

Additive Homomorphic Encryption

Homomorphic Encryption possesses an additive property when there exists an algorithm capable of
computing Enc(x + y) based on Enc(x) and Enc(y), all without knowledge of the actual values of x
and y (Kartit 2022). Examples of this include the Pailler and Goldwasser-Micali algorithms.

Pailler (1999), illustrated the RSA algorithm, demonstrating it as an instance of a multiplicative


homomorphic scheme as shown below.

32
 Key Generation
Take two random primes and such that

Calculate

Select such that divides the order of

Public Key

Private Key
 Encryption

Where is picked randomly

 Decryption

Waleed et al. (2019) demonstrated the homomorphic characteristics of Paillier scheme in the
following manner;

(2)
In order to conduct addition and multiplication operations on encrypted data stored within the cloud
provider's infrastructure, the client necessitates possession of two distinct key generators: one
tailored for RSA encryption and another for Paillier encryption.
The El Gamal cryptosystem is also introduced and it is initially designed as a multiplicative
homomorphic encryption scheme. However, through modifications to the coding mode, it can be
adapted to function as an additive cryptosystem.

El Gamal Cryptosystem:

Let be a prime and take such that is a generator of

Take and such that ,


33
Where , and are public; a private.

Let be an undisclosed, arbitrary numerical value,

Then
The El Gamal Cryptosystem demonstrates the property of multiplicative homomorphic encryption as

thus; Let and be plain text, then

When the plaintext is placed in the exponent, the result is obtained thus;

Subsequently, the homomorphism exhibits additivity;

(3)

Fully Homomorphic Encryption:


For any computations performed on cloud-stored data, selecting fully homomorphic encryption becomes
imperative. This encryption method enables the execution of various operations on encrypted data without
requiring decryption.

34
REFERENCES
Abbas, M. S., Mahdi, S.S., & Hussien, S. A. (2020). Security improvement of Cloud Data Using Hybrid
Cryptography and Steganography. International Conference on Computer Science and Software Engineering (CSASE),
pp. 123-127, doi: 10.1109/CSASE48920.2020.9142072.

Abdalla, P.A., & Varol, A. (2019). Advantages to Disadvantages of Cloud Computing for Small-Sized
Business. Proceedings of 7th International Symposium on Digital Forensics and Security, Barcelos, Portugal, pp 1-6,
doi:10.1109/ISDFS.2019.8757549.

Ahmad, S. A., & Garko, A. B. (2020). A Hybrid Cryptographic Algorithm for Data Security in the Cloud.
© Afr. J. MIS 2(2):35–58.

Alaya, B., Laouamer, L., & Msilini, N. (2022). Homomorphic encryption systems statement: Trends and challenges. Computer
Science Review, vol. 36, p. 100235.

Aldossary, S., & Allen, W. (2016). Data Security, Privacy, Availability and Integrity in Cloud
Computing: Issues and Current Solutions. International Journal of Advanced Computer Science and Application, vol. 7,
no. 4, pp. 485-498, doi: 10.14569/IJACSA.2016.070464.
Alshareef, H. N. (2023). Current Development, Challenges and Future Trends in Cloud Computing: A
Survey. International Journal of Advanced Computer Science and Applications,( IJACSA), Vol. 14, No. 3, pp.329-338.

Alsufaian, R.A., AlQahtani, K.H., AlAjmi, R.M., Almoussa, R.A., AlGhamdi, R.A., & Nagy N. (2022).
Secure File Storage on Cloud using Hybrid Cryptography. International Conference on Computer Science and Software
Engineering (CSASE), PP, 1-4.

Ayman, A., Haneen, Z., & Eman, S. (2020). Survey on Homomorphic Encryption and Address of New Trend. International
Journal of Advanced Computer Science and applications (IJACSA), vol. 11, no. 7, pp.618-626.

Bajaber, W., Alqulaity, M., & Alotaibi, F. (2019). Different Techniques to Ensure High Availability in
Cloud Computing. International Journal of Advanced Research in Computer and Communication Engineering, vol. 6,
no. 11, pp. 1-16, doi: 10.17148/IJARCCE.2019.61102.

Basu, S., Bardhan, A., Gupita, K., & Saha, P. (2018). Cloud Computing Security Challenges & Solutions-A Survey. IEEE 8th
Annual Computing and Communication Workshop and Conference (CCWC), pp. 347-356, doi:
10.1109/CCWC.2018.8301700.

Bentafat, E., Mazhar, M., Rathore, & Bakiras, S. (2021). Towards Real-Time Privacy-Preserving Video
Surveillance. Computer Communications 180 (February):97–108.

Burt, J. (2021). Homomorphic Encryption Makes Real-World Gains, Pushed by Google, IBM, Microsoft.eSecurityPlanet.
https://www.esecurityplanet.com/compliance/homomorphic-encryption-makes-real-world gains/

Chandrasekaran, E. (2021). Essentials of Cloud Computing (Revised edition). Taylor & Francis Group LLC, CrC Press.

Choudhary, S., & Singh, N. (2022). Analysis of Security-Based Access Control Models for Cloud
Computing. International Journal of Cloud Applications and Computing, 12(1), 1–19. doi:10.4018/IJCAC.2022010104.

Derfouf, M., & Eleuldj, M. (2018). Cloud Secured Protocol based on Partial Homomorphic Encryptions. 4th International
Conference on Cloud Computing Technologies and Applications (Cloudtech), Brussels, Belgium, doi:
10.1109/CloudTech.2018.8713353.

35
Dijk, M. V., Gentry, C., Halevi, S., & Vaikuntanathan, V. (2010). Fully homomorphic encryption over
the Integers, In: Advances in Cryptology-Eurocrypt”, Springer, Germany, vol, 6110, pp. 24–43.

ElGamal, T. (1985). A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on
Information Theory, vol. 31, no. 4, pp. 469-472.

Frantha, J., & Orsbone, P. (2021). Data Integrity Challenges in Cloud Computing. 9th International
Conference on Recent Innovations in Science Engineering and Management, (ICRISEM-21), pp. 936-943.

Foote, K.D. (2021). Brief History of Cloud Computing. DATAVERSITY.


https://www.dataversity.net/brief-history-cloud- computing/ (accessed Jan. 04, 2023).

Galibus, T., Krasnoproshin, V., Albuqerque, R., & Pignaton de Freitas, E. (2016). Elements of Cloud
Storage Security, Concepts, Designs and Optimized Practices. Springer ebook, doi: 10.1007/978-3-319-44962-3.

Gentry, C., & Stanford University, Computer Science Department. (2009). A Fully Homomorphic
Encryption Scheme. Amsterdam University Press.

Gentry, C, (2010). Computing arbitrary functions of encrypted data. Communications of The ACM,
Vol. 53, no.3, pp. 97-105.

Goldwasser, S., & Micali, S. (1984). Probabilistic encryption. Journal of Computer and System Sciences,
vol. 28, no. 2, pp. 270-299.

Haghighat, H., Zonous, S., & Mottaleb, M. A. (2015). CloudID: Trustworthy Cloud-based and Cross-
Enterprise Biometric Identification. Expert Systems with Applications, vol. 42, no. 21, pp. 7905-7916, doi:
10.1016/j.eswa.2015.06.025.

Harfoushi, O., & Obiedat, R. (2018). Security in Cloud Computing using Hash Algorithm: A Neural
Cloud Data security model. Canadian Center of Science and Education, vol. 12, no. 6, doi: 10.5539/mas.v12n6p143.

Hayward, R., & Chiang, C. (2015). Parallelizing Fully Homomorphic Encryption for a Cloud
Environment. Journal of Applied Research and Technology, vol. 13, no. 2, pp. 245-252.

Helali, L., & Omri, M.N. (2021). A survey of data center consolidation in cloud computing systems.
Comput. Sci. Rev., vol. 39, p. 100366, Feb 2021, doi: 10.1016/j.cosrev.2021.100366.

IEEE Digital Privacy (2024) https://digitalprivacy.ieee.org/publications/topics/advantages-of-


homomorphic-encryption

Introduction – Homomorphic Encryption Standardization. (2018, December 6).


http://homomorphicencryption.org/introduction/

Jabbar, I., & Najim, S. (2017). Using Fully Homomorphic Encryption to Secure Cloud Computing.
Internet of Things and cloud Computing. http://www.sciencepublishinggroup.com/j/iotcc, 4(2): 13-18.

Kacha, L., & Zitouni, A. (2018). An Overview on Data Security in Cloud Computing. Conference Paper in Advances in
Intelligent Systems and Computing(AISC), Springer International Publishing, vol. 661, pp. 250-261, doi: 10.1007/978-3-
319-67618-0_23.

Kartit, A. (2022). New Approach Based on Homomorphic Encryption to Secure Medical Images
in Cloud Computing. Trends in Sciences, 19(9), 3970. doi:10.48048/tis.2022.3970.
Kaur, T. (2019). Cloud Computing: A Study of the Cloud Computing Services. International Journal for Research in Applied
Science & Engineering Technology (IJRASET), vol. 7, no. VI, pp. 1933-1938, doi: 10.22214/ijraset.2019.6325.

Korda, D.R., Ansong, E.D., & Hodowu, D.K.M. (2021). Securing Data in the Cloud usding SDC
Algorithm. International Journal of Computer Application, pp.24-29.
36
Kumar, S., Karnani, G., Gaur M.S., & Mishra, A. (2021). Cloud Security using Hybrid Cryptography
Algorithms. 2nd International Conference on Intelligent Engineering and Management (ICIEM), pp. 599-604, doi:
10.1109/ICIEM51511.2021.9445377.

Labati, R. D., Genovese, A., Piuri, V, Scotti, F., & Vishwakarma, S. (2020). Computational Intelligence in Cloud Computing. In:
Kovács L., Haidegger T., Szakál A. (eds) Recent Advances in Intelligent Engineering. Topics in Intelligent Engineering
and Informatics, vol 14. Springer, Cham. https://doi.org/10.1007/978-3-030-14350-3_6.

Laroui, M., Boubakr, N., Hassine, M., Moussa, A. C., Hossam, A., & Mohsen, G. (2021). Edge and Fog
Computing for IoT: A Survey on Current Research Activities & Future Directions.” Computer Communications
180(June):210–31.

Maha, T., & Said, E. H. (2014). Secure Cloud Computing through Homomorphic Encryption.
International Journal of asdvancements in Computing Technology (IJACT), pp.29–38.

Mekawie, N., & Yehia, K. (2021). Challenges of Deploying Cloud Computing in E-Health. Procedia
Computer Science181:1049–57. doi: 10.1016/J.PROCS.2021.01.300.

Mesbahi, M. R., Rahmani, A.M., & Hosseinzadeh, M. (2019). Reliability and high availability in cloud
computing environments: a reference roadmap. Human centric computing and information science (Cent. Comput. Inf.
Sci.), Springer, vol. 8, no. 20, pp. 6-16, doi: 10.1186/s13673-018-0143-8.

Microsoft. (2022,July 12). Microsoft SEAL: Fast and Easy-to-Use Homomorphic Encryption Library. Microsoft Research.
https://www.microsoft.com/en-us/research/project/microsoft-seal/

Mohammed, M.A., & Al Attar, T.N.A. (2023). Fully Homomorphic Encryption Scheme for Securing
Cloud Data. UHD Journal of Science and technology, Vol.7, issue 2, pp 40-49.

Mohammed, S. J., & Dujan, B.T. (2021). From cloud computing security towards homomorphic
encryption: A comprehensive review. TELKOMNIKA Telecommunication, Computing, Electronics and Control, vol.19,
no.4, pp. 1152 – 116.

Narayana, K. E., Kumar, S., & Jayashree, K. (2017). A Review on different types of Deployment Models in Cloud Computing.
International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE), vol. 5, no. 2, pp.
1475-1480, doi: 10.15680/IJIRCCE.2017. 0502029.

Nasarul, K. V. (2017). Review on Benefits and Security Challenges of Cloud Computing. International Journal of Computer
Science and Information Technologies, vol. 8, no. 2, pp. 224-228.

Nishoni, S., & Aldo, T. A. (2020). Secure Communication with Data Analysis and Auditing using
Bilinear Key Aggregate Cryptosystem in Cloud Computing. Materials Today: Proceedings 24:2358–65.

Omotosho, O. (2019). A Review on Cloud Computing Security. International Journal of Computer Science and Mobile
Computing (IJCSMC), vol. 8, no. 9, pp. 245-257, doi: 10.14257/ijgdc.2015.8.5.21.
Orobosade, A., Thompson, A., Alese, B., & Arome, J. (2020). Cloud Application Security using Hybrid
Encryption. Communications on Applied Electronics 7(33):25–31.

Paillier, P. (1999). Public-key cryptosystems based on composite degree residuosity classes, In: Advances
in Cryptology-Eurocrypt ’99”. Vol. 1592, Springer Berlin Heidelberg, pp. 223-238.

Rashid, A., & Chaturvedi, A. (2019). Cloud Computing Characteristics and Services A Brief Review.
International Journal of Computer Sciences and Engineering, vol. 7, no. 2, pp. 421-426.

Rivest, R. L., Adleman, L., & Dertouzos, M. L. (1978). On data banks and privacy homomorphisms. Foundations of Secure
Computation, 4(11), 169-180.

Rivest, R. L., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems.
Communications of the ACM, 21(2), 120–126. doi:10.1145/359340.359342

Rocha, V. F., & Julio, L. (2019). An Overview on Homomorphic Encryption Algorithms.” Institute of
Computing, UNICAMP.
37
Saygili, O. Y. (2020). The Introduction to Private Cloud using Oracle Exadata and Oracle Database. Taylor & Francis, doi:
10.1201/9780429020902.

Smart, N., & Vercauteren, F. (2010). Fully homomorphic encryption with relatively small key and
ciphertext sizes in Public Key Cryptography-PKC. 2010, Springer, pp. 420-443.

Sun, P. J. (2020). Security and privacy protection in cloud computing: Discussions and challenges. Journal of Network and
Computer Applications, vol. 160, 2020, doi: https://doi.org/10.1016/j.jnca.2020.102642.

Suthar, F., Khanna, S., & Patel, J. (2019). A Survey on Cloud Security Issues. International Journal of Computer Sciences and
Engineering (IJCSE), vol. 7, no. 3, pp. 120-123, doi: 10.26438/ijcse/v7i3.120123.

Taghipour, M., Mowloodi, E., Mahboobi, M., & Abdi, J. (2020). Application of Cloud Computing in
System Management in Order to Control the Process. vol. 3, pp.34–55, 2020, doi: 10.31058/j.mana.2020.33003.

Waleed, T.A., Al-Jobouri, Q., & Al-Zoubi, H. (2019). Cloud Security based on Homomorphic
Encryption. International Journal of Advanced Computer Science and Application, vol. 10, No.8, pp 300-307.

Widyastuti, D., & Irwansyah, I. (2018). Benefits and Challenges of Cloud Computing Technology
Adoption in Small and Medium Enterprises (SMEs), doi: 10.2991/bcm-17.2018.46.

Xiao, L., Bastani, O., & Yen, I. L. (2012). An Efficient Homorphic Encryption Protocol for Multi-User
Systems. IACR Cryptology, Bellevue, WA, 2012.

Yao, A. C. (1982). Protocols for Secure Computations. Proceedings of the 23rd Annual Symposium on
Foundations of Computer Science (SFCS ‘82)”. IEEE Computer Society, pp. 160-164.
Yan, l., Hao, X., Cheng, Z., & Zhou, R.(2018). Cloud computing security and privacy. Proceedings of the 2018 International
Conference on Big Data and Computing, pp. 119-123, doi: 10.1145/3220199.3220217.

38

You might also like