Ensuring privacy and confidentiality of data on the cloud using an enhanced homomorphism scheme
نویسندگان
چکیده
Cloud computing is one of the widest phenomena embraced in information technology. This result from numerous advantages associated with it making many organizations and individuals offload their data to cloud. Encryption schemes restrict access unauthorized clients, helping attain confidentiality privacy. The modification ciphertext clients’ on cloud demand downloading, deciphering, editing, finally uploading back by sharing private key service provider tedious. application homomorphism, allows computation be performed no decipher activity which helps avoid surfacing sensitive client stored In this paper, an Enhanced Homomorphism Scheme (EHS) proposed based Good Prime Numbers (GPN), Linear Congruential Generator (LCG), Fixed Sliding Window Algorithm (FSWA), Gentry’s homomorphism scheme. A dataset Kaggle database was used test algorithm. variety tests were conducted using algorithm such as Uniqueness ciphertext, addition multiplication property full execution times 2^n (n ∈ 2,3,4,5) sizes. comparison time EHS New Fully (NFHS), (EHES). From comparison, had lowest encryption when a size 24kb executed but higher decryption 567.6667 ± 96.38911when 8kb used. On other hand, 32kb, EHES highest 1274ms having 551.2222 82.68746 indicating percentage decrease 56.73%. confirms that are dependent not size.
منابع مشابه
Privacy and Security of Big Data in THE Cloud
Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...
متن کاملPrivacy and Security of Big Data in THE Cloud
Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...
متن کاملan investigation into the impact of m-game-enhanced blended module of teaching and learning on iranian students english literacy skills and subskills learning
پژوهش حاضر با پیوند رسانه های قدیمی و جدید یاد دهی و یادگیری _طرح داستان و بازی های همراه ــ در یک پو دمان ترکیبی، در صدد قیاس شیوه ی یاد دهی و یادگیری مبتنی بر بازی مهارت های فرعی و اصلی واژگان، خواندن و نوشتار سواد انگلیسی با شیوه های مرسوم آن بود. به این منظور با کاربرد یک طرح سه گانه همراه با الگوی نظام آموزشی (تومی، 2010)، بازی های از پیش ساخته شده و بومی قابل عرضه از طریق ارتباطات سیّار (ب...
on the relationship between using discourse markers and the quality of expository and argumentative academic writing of iranian english majors
the aim of the present study was to investigate the frequency and the type of discourse markers used in the argumentative and expository writings of iranian efl learners and the differences between these text features in the two essay genres. the study also aimed at examining the influence of the use of discourse markers on the participants’ writing quality. to this end the discourse markers us...
15 صفحه اولPrivacy enhanced data outsourcing in the cloud
How to secure outsourcing data in cloud computing is a challenging problem, since a cloud environment cannot been considered to be trusted. The situation becomes even more challenging when outsourced data sources in a cloud environment are managed by multiple outsourcers who hold different access rights. In this paper, we introduce an efficient and novel tree-based key management scheme that al...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Informatica
سال: 2022
ISSN: ['0350-5596', '1854-3871']
DOI: https://doi.org/10.31449/inf.v46i8.4305