1,985 Hits in 2.5 sec

A Provably Secure Additive and Multiplicative Privacy Homomorphism* [chapter]

Josep Domingo-Ferrer
2002 Lecture Notes in Computer Science  
Privacy homomorphisms (PHs) are encryption transformations mapping a set of operations on cleartext to another set of operations on ciphertext.  ...  If addition is one of the ciphertext operations, then it has been shown that a PH is insecure against a chosen-cleartext attack.  ...  Thanks go to Stefan Brands and Josep Rifà for useful talks and comments.  ... 
doi:10.1007/3-540-45811-5_37 fatcat:s3bwp6qpazd2blr523lktts6qa

Efficient Multi-keyword Ranked Search over Outsourced Cloud Data based on Homomorphic Encryption

Mengxi Nie, Peng Ran, HaoMiao Yang, M. Kavakli, M.J.E. Salami, A. Amini, M.A.B.M. Basri, A.B. Masli, S.C.H. Li, M. Pal
2016 MATEC Web of Conferences  
While accessing or sharing information stored in the cloud, the main concern is to enhance the security of data. Different encryption techniques can be used to provide strict privacy requirements.  ...  Dual encrypting the data using Advanced Encryption Standard and Homomorphic Encryption scheme enables the data users to ensure the integrity of requested data.  ...  Dual Security with fully homomorphic encryption aims to bring forth the following objective-Dual encryption to provide additional security on stored data using AES encryption standard and Homomorphic encryption  ... 
doi:10.1051/matecconf/20165601002 fatcat:eqxwvrk2cvc5fhnzzvxiz6qrri

Survey of Various Homomorphic Encryption algorithms and Schemes

Payal V.Parmar, Shraddha B. Padhar, Shafika N. Patel, Niyatee I. Bhatt, Rutvij H. Jhaveri
2014 International Journal of Computer Applications  
But to process data located on remote server and to preserve privacy, homomorphic encryption is useful that allows the operations on the cipher text, which can provide the same results after calculations  ...  When the data is transferred to the public area, there are many encryption algorithms to secure the operations and the storage of the data.  ...  Few years later, in 2005, Dan Boneh, Eu-Jin Goh and Kobi Nissim [9] invented a system of provable security encryption, with which unlimited number of additions but only one multiplication can be performed  ... 
doi:10.5120/15902-5081 fatcat:x5y7cns7k5bbbjacyg3skl6xlu

Concise Survey on Privacy Preserving Techniques in Cloud
IARJSET - Science, Engineering and Technology

B.Banu priya, V. Sobhana, Mishmala Sushith
2015 IARJSET  
Homomorphic Authenticable Ring Signature (HARS), privacy-preserving public auditing System for data storage security are discussed.  ...  In this paper we have made a concise survey on various privacy preserving techniques in cloud.  ...  The direct addition of PDP or POR schemes to pillar data dynamics have security problems. The experiments display that the scheme is capable in aiding data dynamics with provable verification.  ... 
doi:10.17148/iarjset.2015.2206 fatcat:hk7ocm7hu5cqfdw6bbvmsrdhtq

Study on Auditing Approaches for Preserving Data Integrity in Cloud Storage

Anne Srijanya .K
2017 International Journal of Advanced Research in Computer Science and Software Engineering  
Cloud computing provides cloud storage a service in which data is maintained, managed and backed up remotely through a centralized large data centres and made available to user over a network.  ...  This paper makes comparative analysis over different approaches and choose the best approach for checking the integrity of the data.  ...  for ensuring possession of files on trusted storage Is a technique for ensuring both possession and retrievability Is a privacy preserving mechanism Uses or Utilizes Uses RSA based Homomorphic  ... 
doi:10.23956/ijarcsse/v7i3/0146 fatcat:h62qz456u5gdbeywefx6n66tku

A Survey of Public Provable Data Possession Schemes with Batch Verification in Cloud Storage

Sooyeon Shin, Taekyoung Kwon
2015 Journal of Internet Services and Information Security  
Remote data auditing refers to a sampling of the outsourced data to securely, frequently, and efficiently verify the correctness of the data in the cloud.  ...  We explain the concept of remote data auditing, and then describe system model and taxonomy of remote data auditing schemes, especially focusing on provable data possession schemes which support public  ...  Therefore, Zhu et al. proposed a cooperative provable data possession (CPDP) scheme based on homomorphic verifiable response (HVR) and hash index hierarchy to support dynamic scalability on multiple storage  ... 
doi:10.22667/jisis.2015.08.31.037 dblp:journals/jisis/ShinK15 fatcat:wqy6parzbndhvi2mt24anqcgle

Secured Data Storage for RDPC Protocol with Enhanced TPA Auditing Scheme Using MHT in Cloud Computing
IJIREEICE - Electrical, Electronics, Instrumentation and Control

responsible for keeping the data available and accessible.but the security of cloud storage is always the focus of several potential cloud clients,and huge impact for its widespread application.  ...  Multi Owner Authentication technique is by which we can secure the data Stored in the Cloud Server's Database.the security and routine analysis shows that the scheme is practical for real time.  ...  .  Provable security.  ... 
doi:10.17148/ijireeice.2014.21111 fatcat:735k3g5cavcmjhou7zsekffy64

Notes on non-interactive secure comparison in "image feature extraction in the encrypted domain with privacy-preserving SIFT"

Matthias Schneider, Thomas Schneider
2014 Proceedings of the 2nd ACM workshop on Information hiding and multimedia security - IH&MMSec '14  
Their fundamental building block is a new protocol for performing secure comparisons under additively homomorphic encryption that requires no interaction.  ...  Protocols for secure comparison are a fundamental building block of many privacy-preserving protocols such as privacy-preserving face recognition or privacy-preserving fingerprint authentication.  ...  Interactive Protocols using Additively Homomorphic Encryption Existing and provably secure protocols for secure comparisons can be used instead, e.g., [BK04, DGK08b, DGK08a, KSS09] .  ... 
doi:10.1145/2600918.2600927 dblp:conf/ih/SchneiderS14 fatcat:hifivsismre4law5jn6hpmmrp4

Multiplicative Homomorphic E-Auction with Formally Provable Security [chapter]

Kun Peng, Matt Henricksen
2013 Lecture Notes in Computer Science  
Another contribution of the new multiplicative homomorphic e-auction scheme is that it is the first e-auction scheme to provide formal and comprehensive security analysis to achieve formally provable security  ...  A new method, homomorphic e-auction based on multiplicative homomorphic encryption algorithm like ElGamal encryption is proposed in this paper.  ...  It satisfies all the security properties and is the only e-auction scheme to achieve formally provable security.  ... 
doi:10.1007/978-3-642-38530-8_1 fatcat:3cymq2zvtjdrfgx4rmbsh6fe7u


R. Ahila
2017 International Journal of Advanced Research in Computer Science  
Literature survey shows that the protocols are focused on different aspects such as dynamic data operations, privacy protection of the data, the high efficiency, the privacy protection of the identities  ...  Though cloud computing has various advantages to users, it brings new security challenging problems.  ...  The ID based is a combination of ID based cryptography technique with homomorphic auditor technique, it is provably secure in the random oracle model and has high security reduction in the cloud computing  ... 
doi:10.26483/ijarcs.v8i7.4377 fatcat:yl7umbggmbeshbex4tbviak23a

A Proposed Secure Cloud Environment Based on Homomorphic Encryption

Rasha Falih Hassan, Ali Makki Sagheer
2019 IARJSET  
In this paper, users' data is never kept in the form of plaintext on public cloud and proposed a Secure Cloud Environment Based on Homomorphic Encryption (SCEHE) to develop the security of cloud computing  ...  the user without decryption using the homomorphic encryption to be protected user's privacy.  ...  The encryption scheme of Shafi Goldwasser and Silvio Micali was suggested in 1982 was a provable security encryption method which reached a notable level of security, it was an additive Homomorphic encryption  ... 
doi:10.17148/iarjset.2019.6524 fatcat:kuk52a6rc5be5kxt6ck5nmoflq

Survey of Integrity Verification in Multi-Cloud Storage by Efficient Cooperative Provable Data Possession

Trilok SinghPardhi, Rajeev Pandey, Uday Chourasia
2014 International Journal of Computer Applications  
On the basis on homomorphic verifiable response and hash index hierarchy we projected a cooperative PDP (CPDP) method.  ...  We confirm the security of our method based on multi-prover zeroknowledge proof scheme, which can satisfy knowledge soundness, fullness , and zero-knowledge properties.  ...  Less Security -None of the cryptographic techniques is used on the cloud data Privacy-Preserving Audit And Extraction Of Digital Contents Please This paragraph is a repeat of 3.1 Please A growing  ... 
doi:10.5120/17836-8716 fatcat:lhlehqrhffh2noowhnubgvekze

A Homomorphic Crypto System for Electronic Election Schemes

Kannan Balasubramanian, M. Jayanthi
2016 Circuits and Systems  
The other homomorphic cryptosystems RSA and Elgamal are not considered, since they exhibit only multiplicative homomorphic property.  ...  This research investigates the applications of homomorphic encryption systems in electronic voting schemes. We make use of Paillier cryptosystem which exhibits additive homomorphic properties.  ...  In 1999 Pascal Paillier proposed a provable secure encryption system that was an additive Homomorphic encryption.  ... 
doi:10.4236/cs.2016.710272 fatcat:3wrlw7rc25hffm65vmaztsqxfa

An Improved Approach for Secure Data Aggregation in Wireless Sensor Networks

Vivaksha J., Sankita J.
2016 International Journal of Computer Applications  
In this paper, we investigate various approaches for data aggregation with a view to critically analyze the same and propose a new approach for secure data aggregation.  ...  However, due to the ubiquitous and pervasive deployment of the sensor nodes, the security concerns in WSNs are anyway critical.  ...  Given a, b  Q and k, k1, k2  K, we term a + b = Dk (Ek(a)  Ek(b)) additively homomorphic with a single secret key and a + b = Dk (k1,k2) (Ek1(a)  Ek2(b)) additively homomorphic with multiple secret  ... 
doi:10.5120/ijca2016908898 fatcat:7vrtid75cfduhga7szkcmlpwyy

Secure Audit Service by using TPA

Pradnya P.
2016 International Journal of Computer Applications  
Also, the auditing process should not bring in further more burdens to the user, a secure cloud storage for which integrate the technique of Homomorphic linear authenticator with random masking.  ...  Using Cloud Storage, users can remotely store their data and enjoy high quality applications and services from a shared pool of resources.  ...  When used directly, their protocol is not provably privacy preserving, and thus may leak user data information to the external auditor. Juels et al.  ... 
doi:10.5120/ijca2016909136 fatcat:3rtg2lrp2bhmneu33yhulh7oyi
« Previous Showing results 1 — 15 out of 1,985 results