Skip to main content

Fully Homomorphic Encryption with AES in Cloud Computing Security

  • Conference paper
  • First Online:
Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2018 (AISI 2018)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 845))

Abstract

With growing awareness and concerns in regards to cloud computing and information security with privacy protection, there is a need to increase a usage of security algorithms into data systems and processes. Homomorphic Encryption (HE) is the encryption scheme which accepts encrypted inputs and performs blind processing to achieve data confidentiality. HE is useful to transfer encrypted data in public area as it allows operations on the cipher text, which can provide the same results after calculations as working directly on raw data. In this paper, a Fully Homomorphic Encryption (FHE) system based on Advanced Encryption Standard (AES) is proposed. It can be applied to perform operations on encrypted data without decryption. The proposed scheme solves the problem of large cipher text usually associated with increased noise resulting from FHE usage.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mell, P., Grance, T.: The NIST Definition of Cloud Computing, vol. 800. National Institute of Standards and Technology, Gaithersburg (2011). no. 145

    Google Scholar 

  2. Marston, S., Li, Z., Bandyopadhyay, S.: Cloud computing—the business perspective. Decis. Support Syst. 51(1), 176–189 (2011)

    Article  Google Scholar 

  3. Suciu, G., Halunga, S., Apostu, A.: Cloud computing as evolution of distributed computing—a case study for slapos distributed cloud computing. Inf. Econ. 17(4), 109–122 (2013)

    Google Scholar 

  4. Ali, M., Khan, S.U., Vasilakos, A.V.: Security in cloud computing: opportunities and challenges. Inf. Sci. 305, 357–383 (2015)

    Article  MathSciNet  Google Scholar 

  5. Vurukonda, N., Rao, B.: A study on data storage security issues in cloud computing. Procedia Comput. Sci. 92, 128–135 (2016)

    Article  Google Scholar 

  6. Wang, Q., Wang, C., Ren, K., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847–859 (2011)

    Article  Google Scholar 

  7. Plantard, T., Susilo, W., Zhang, Z.: Fully homomorphic encryption using hidden ideal lattice. IEEE Trans. Inf. Forensics Secur. 8(12), 2127–2137 (2013)

    Article  Google Scholar 

  8. Rivest, R., Adleman, L., Dertouzos, M.: On data banks and privacy homomorphisms. In: Foundations of Secure Computation, pp. 169–179. Academia Press (1978)

    Google Scholar 

  9. Cheon, J.H., Kim, J.: A hybrid scheme of public-key en-cryption and somewhat homomorphic encryption. IEEE Trans. Inf. Forensics Secur. 10(5), 1052–1063 (2015)

    Article  Google Scholar 

  10. Coron, J.S., Naccache, D., Tibouchi, M.: Public key compression and modulus switching for fully homomorphic encryption over the integers. In: Pointcheval, D., Johansson, T. (eds.) Euro-Par 2012. LNCS, vol. 7237, pp. 446–464. Springer, Berlin (2012)

    Google Scholar 

  11. TFHE: Fast Fully Homomorphic Encryption Library over the Torus. https://github.com/tfhe/tfhe

  12. Djatmiko, M., Cunche, M., Boreli, R., Seneviratne, A.: Heterogeneous secure multi-party computation. In: Bestak, R., Kencl, L., Li, L.E., Widmer, J., Yin, H. (eds.) NETWORKING 2012. LNCS, vol. 7290, pp. 198–210. Springer, Berlin (2012)

    Chapter  Google Scholar 

  13. Orlandi, C., Nielsen, J.B., Nordholt, P.S., Burra, S.S.: A new approach to practical active-secure two-party computation. In: Safavi-Naini, R., Canetti, R. (eds.) Advances in Cryptology—CRYPTO 2012. LNCS, vol. 7417, pp. 681–700. Springer, Berlin (2012)

    Chapter  Google Scholar 

  14. Sugumar, R., Imam, S.B.: Symmetric encryption algorithm to secure outsourced data in public cloud storage. Indian J. Sci. Technol. 8(23) (2015)

    Google Scholar 

  15. Damgard, I., Keller, M.: Secure multiparty AES. In: Sion, R. (ed.) Financial Cryptography and Data Security. FC 2010. LNCS, vol. 6052, pp. 367–374. Springer, Berlin (2010)

    Chapter  Google Scholar 

  16. Naehrig, M., Lauter, K., Vaikuntanathan, V.: Can homomorphic encryption be practical? In: 3rd ACM Workshop on Cloud Computing Security Workshop (CCSW 2011), pp. 113–124. ACM, New York (2011)

    Google Scholar 

  17. Vaikuntanathan, V.: Computing blindfolded: new developments in fully homomorphic encryption. In: 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science, Palm Springs, CA, pp. 5–16 (2011)

    Google Scholar 

  18. Smart, N.P., Vercauteren, F.: Fully homomorphic encryption with relatively small key and ciphertext sizes. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 420–443. Springer, Berlin (2010)

    Google Scholar 

  19. Dijk, M.V., Gentry, C., Halevi, S., Vaikuntanathan, V.: Fully homomorphic encryption over the integers. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 24–43. Springer, Berlin (2010)

    Chapter  Google Scholar 

  20. Brakerski, Z., Vaikuntanathan, V.: Efficient fully homomorphic encryption from (standard) LWE. In: 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science, pp. 97–106. ACM Press, Palm Springs (2011)

    Google Scholar 

  21. Brakerski, Z., Vaikuntanathan, V.: Fully homomorphic encryption from ring-LWE and security for key dependent messages. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 505–524. Springer, Berlin (2011)

    Chapter  Google Scholar 

  22. Rizk, R., Alkady, Y.: Two-phase hybrid cryptography algorithm for wireless sensor networks. J. Electr. Syst. Inf. Technol. 2(3), 296–313 (2015)

    Google Scholar 

  23. Brakerski, Z., Gentry, C., Vaikuntanathan, V.: Fully homomorphic encryption without bootstrapping. In: 3rd Innovations in Theoretical Computer Science Conference, pp. 309–325. ACM Press, New York (2012)

    Google Scholar 

  24. Hilton, P., Holton, D., Pedersen, J.: A far nicer arithmetic. In: Mathematical Reflections, pp. 25–60. Springer, New York (1997)

    Google Scholar 

  25. Varia, M., Yakoubov, S., Yang, Y.: HEtest: a homomorphic encryption testing framework. In: A Homomorphic Encryption Testing Framework. Financial Cryptography and Data Security: FC 2015 International Workshops, pp. 213–230. Springer, Berlin (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rawya Rizk .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Alkady, Y., Farouk, F., Rizk, R. (2019). Fully Homomorphic Encryption with AES in Cloud Computing Security. In: Hassanien, A., Tolba, M., Shaalan, K., Azar, A. (eds) Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2018. AISI 2018. Advances in Intelligent Systems and Computing, vol 845. Springer, Cham. https://doi.org/10.1007/978-3-319-99010-1_34

Download citation

Publish with us

Policies and ethics