Hybrid Cryptosystem Using Homomorphic Encryption and Elliptic Curve Cryptography

Prabakeran Saravanan*, Hemanth Kumar R.**, Arvind T.***, Bharath Narayanan ****
* Assistant Professor, Department of Computer Science, K.C.G College of Technology, Chennai, Tamil Nadu, India.
**-****Student, Department of Computer Science, K.C.G College of Technology, Chennai, Tamil Nadu, India.
Periodicity:March - May'2019
DOI : https://doi.org/10.26634/jcom.7.1.15667

Abstract

Providing security and privacy for the cloud data is one of the most difficult tasks in recent days. The privacy of the sensitive information ought to be protecting from the unauthorized access for enhancing its security. Security is provided using traditional encryption and decryption process. One of the drawbacks of the traditional algorithm is that it has increased computational complexity, time consumption, and reduced security. The authors have proposed a scheme where the original data gets encrypted into two different values. Elliptical Curve Cryptography (ECC) and Homomorphic are combined to provide encryption. The data in each slice can be encrypted by using different cryptographic algorithms and encryption key before storing them in the cloud. The objective of this technique is to store data in a proper secure and safe manner in order to avoid intrusions and data attacks meanwhile it will reduce the cost and time to store the encrypted data in the Cloud Storage.

Keywords

Security, Privacy Preservation, Homomorphic, Encryption, Decryption, Key Generation.

How to Cite this Article?

Saravanan, P., Kumar, R.H., Arvind, T., Narayanan, B. (2019). Hybrid Cryptosystem Using Homomorphic Encryption and Elliptic Curve Cryptography Algorithm, i-manager's Journal on Computer Science, 7(1), 36-42. https://doi.org/10.26634/jcom.7.1.15667

References

[1]. Bansal, V. P., & Singh, S. (2015, December). A hybrid data encryption technique using RSA and Blowfish for cloud computing on FPGAs. In 2015 2nd International Conference on Recent Advances in Engineering & Computational Sciences (RAECS) (pp. 1-5). IEEE.
[2]. El Makkaoui, K., Beni-Hssane, A., & Ezzati, A. (2016, September). Can hybrid Homomorphic Encryption schemes be practical? In 2016 5th International Conference on Multimedia Computing and Systems (ICMCS) (pp. 294-298). IEEE.
[3]. Gunjal, Y. S., Gunjal, M. S., & Tambe, A. R. (2018, February). Hybrid attribute based encryption and customizable authorization in cloud computing. In 2018 International Conference on Advances in Communication and Computing Technology (ICACCT) (pp. 187-190). IEEE.
[4]. Jivane, A. B. (2017, September). Time efficient privacy-preserving multi-keyword ranked search over encrypted cloud data. In 2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI) (pp. 497-503). IEEE.
[5]. Lee, N. Y., Chen, Z. L., & Chen, F. K. (2013, July). Cloud server aided computation for elgamal elliptic curve cryptosystem. In 2013 IEEE 37th Annual Computer Software and Applications Conference Workshops (pp. 11-15). IEEE.
[6]. Nivedhaa, R., & Justus, J. J. (2018, April). A secure erasure cloud storage system using advanced encryption standard algorithm and proxy re-encryption. In 2018 International Conference on Communication and Signal Processing (ICCSP) (pp. 0755-0759). IEEE.
[7]. Song, X., & Wang, Y. (2017, December). Homomorphic cloud computing scheme based on hybrid homomorphic encryption. In 2017 3rd IEEE International Conference on Computer and Communications (ICCC) (pp. 2450-2453). IEEE.
[8]. Sude, A., & Shinde, V. D. (2017, August). Authenticated CRF based improved ranked multi-keyword search for multi-owner model in cloud computing. In 2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA) (pp. 1-6). IEEE.
[9]. Thangapandiyan, M., Anand, P. R., & Sankaran, K. S. (2018, April). Enhanced cloud security implementation using modified ECC algorithm. In 2018 International Conference on Communication and Signal Processing (ICCSP) (pp. 1019-1022). IEEE.
[10]. Yun, A., Cheon, J. H., & Kim, Y. (2010). On homomorphic signatures for network coding. IEEE Transactions on Computers, 59(9), 1295-1296.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.