Privacy preserving for public key based fully homomorphic encryption (fhe) scheme in cloud computing

Page 1

Scientific Journal of Impact Factor (SJIF): 5.71

e-ISSN (O): 2348-4470 p-ISSN (P): 2348-6406

International Journal of Advance Engineering and Research Development Volume 5, Issue 03, March -2018

PRIVACY PRESERVING FOR PUBLIC KEY BASED FULLY HOMOMORPHIC ENCRYPTION (FHE) SCHEME IN CLOUD COMPUTING P.Pushpa1 , Dr.G.N.K. Suresh Babu 2 1

Research Scholar, Research and Development Centre, Bharathiar University, Coimbatore, India. Professor, Department of Computer Applications, Acharya Institute of Technology, Bangalore, India.

2

ABSTRACT-The distributed computing is another figuring model which originates from lattice processing, disseminated registering, parallel processing, virtualization innovation, utility figuring and other PC advancements and it has more favorable position characters, for example, extensive scale calculation and information stockpiling, virtualization, high expansibility, high unwavering quality and low value benefit. The security issue of distributed computing is essential and it can keep the fast improvement of distributed computing. In this paper, the proposed technique is utilized for information stockpiling and recovers in secure way. FHE plot is utilized to scramble the information and furthermore give indication to store the information in distributed storage. Keywords: Data sharing, FHE plot, Encryption, security, information stockpiling, recover. I.

INTRODUCTION

Distributed computing is a language, as it were another processing model, in which the general population Internet is utilized to associate with supplier's facilitated organize, foundation, stage as well as applications to use dependable administrations. Cloud has left all other circulated registering structures/systems a long ways behind both in rivalry and as far as notoriety and achievement. Distributed computing is considered as the subsequent stage in the advancement of on-request data innovation which joins an arrangement of existing and new procedures from look into zones, for example, benefit situated models (SOA) and virtualization. With the quick advancement of flexible distributed computing innovation and administrations, it is standard for clients to use distributed storage administrations to impart information to others in a companion circle, e.g., Dropbox, Google drive, and AliCloud [1]. For this situation the security is a critical normal for the sharing of information in the distributed computing condition. The mutual information in cloud server may contain clients' touchy data, for example, individual profile, money related information and wellbeing records. So the data should be very much shielded from the outsider [3]. As the responsibility for information is isolated from the organization of them [2], the cloud servers may move clients' information to other cloud servers in outsourcing or offer them in cloud looking [4]. Along these lines, it turns into a major test to ensure the protection of those common information in cloud, particularly in cross-cloud and huge information condition [5]. Keeping in mind the end goal to address this difficulty, it is important to outline a complete answer for help client characterized approval period and to give fine-grained get to control amid this period. The mutual information ought to act naturally decimated after the client characterized lapse time. The information ought to be gotten to by just the approved client. Unmistakably the security issue has assumed the most essential part in frustrating Cloud registering acknowledgment. Without question, putting your information, running your product on another person's hard plate utilizing another person's CPU seems overwhelming to many. Surely understood security issues, for example, information misfortune, phishing, and botnet (running remotely on an accumulation of machines) posture genuine dangers to association's information and programming. In addition, the multi-occupancy show and the pooled processing assets in distributed computing has presented new security challenges that require novel procedures to handle with. For instance, programmers can utilize Cloud to arrange botnet as Cloud regularly gives more dependable foundation administrations at a moderately less expensive cost for them to begin an attack.[6]

@IJAERD-2018, All rights Reserved

992


International Journal of Advance Engineering and Research Development (IJAERD) Volume 5, Issue 03, March-2018, e-ISSN: 2348 - 4470, print-ISSN: 2348-6406 II. LITERATURE REVIEW The cloud framework is running in the web and the security issues in the web additionally can be found in the cloud framework. The cloud framework isn't distinctive the conventional framework in the PC and it can meet other uncommon and new security issues. The conventional security issues, for example, security vulnerabilities, infection and hack assault can likewise make dangers to the cloud framework and can lead more genuine outcomes on account of property of distributed computing. The information protection is additionally one of the key worries for Cloud registering. A security controlling board of trustees ought to likewise be made to help settle on choices identified with information protection. Prerequisite: This will guarantee that your association is set up to meet the information protection requests of its clients and controllers. Information in the cloud is typically universally circulated which raises worries about locale, information introduction and protection. Associations stand a danger of not following government strategies as would be clarified further while the cloud sellers who uncover touchy data hazard lawful obligation. Virtual co-tenure of touchy and non-delicate information on a similar host additionally conveys its own potential dangers [8]. Information assurance is the most imperative security issue in Cloud registering. In the specialist organization's server farm, ensuring information protection and overseeing consistence are basic by utilizing encoding and overseeing encryption keys of information in exchange to the cloud. Encryption keys share safely amongst Consumer and the cloud specialist co-op and encryption of portable media is a critical and regularly neglected need. PaaS based applications, Data very still is the financial aspects of distributed computing and a multitenancy engineering utilized as a part of SaaS. At the end of the day, information, when put away for use by a cloud-based application or, handled by a cloudbased application, is blended with other clients' information. In distributed computing, information co-area has some critical confinements. Out in the open and money related administrations zones including clients and information with various dangers. The far reaching information grouping will represent how that information is scrambled, who approaches and chronicled, and how advances are utilized to anticipate information misfortune. At the cloud supplier, the best practice for securing information very still is cryptographic encryption and delivery self-encoding is utilized by hard drive makers. Self-encoding furnishes robotized encryption with execution or insignificant cost affect [9]. Chen and Tzeng [10] proposed a procedure in view of the common key deduction strategy for securing information sharing among a gathering. The strategy utilizes a parallel tree for the calculation of keys. Be that as it may, the computational cost of the proposed plot is high as the rekeying system is vigorously utilized in the proposed conspire. Additionally, the plan isn't custom-made for open cloud frameworks on the grounds that specific activities require concentrated intercessions. Cao et al. [11] propose a protection safeguarding multi-catchphrase look conspire that backings positioned comes about by embracing secure k-closest neighbors (kNN) strategy in accessible encryption. The proposition can accomplish rich functionalities, for example, multi-watchword and positioned comes about, yet requires the calculation of significance scores for all reports contained in the database. This task acquires gigantic calculation over-burden to the cloud server and is in this manner not appropriate for extensive scale datasets. Hayes [12] brings up an intriguing wrinkle here, ''permitting an outsider support of take authority of individual archives brings up cumbersome issues about control and possession: If you move to a contending specialist organization, would you be able to take an information with you? Would you be able to lose access to archives in the event that you neglect to pay a bill?''. The issues of protection and control can't be understood, yet only guaranteed with tight administration level assentions (SLAs) or by keeping the cloud itself private. Xin dong et.al [13] (2014), proposed a powerful, adaptable and adaptable protection saving information arrangement with semantic security. They utilized two methods Ciphertext approach characteristic based encryption (CPABE) and Identity based Encryption (IBE) that gave a tried and true and secure cloud information sharing administration that permits dynamic information access to clients. Their plan guarantees vigorous information sharing, jelly protection of cloud clients and backings productive and secure dynamic tasks which incorporates document creation, client renouncement and alteration of client qualities. This plan additionally upholds fine-grained get to control, full conspiracy protection and in reverse mystery. Despite the fact that distributed computing is monetarily appealing to clients and undertakings, it doesn't ensure clients protection and information security. The proposed conspire gives semantic security to information partaking in distributed computing through the non specific bilinear gathering model and furthermore forces in reverse mystery and access benefit privacy. The execution examination of this plan acquires a little overhead contrasted with existing plans.

@IJAERD-2018, All rights Reserved

993


International Journal of Advance Engineering and Research Development (IJAERD) Volume 5, Issue 03, March-2018, e-ISSN: 2348 - 4470, print-ISSN: 2348-6406 III. PROBLEM IDENTIFICATION 

 

Encryption does not thoroughly deal with the issue of guaranteeing data insurance against untouchable assessing yet just reductions it to the psyche boggling key organization region. Unapproved data spillage still remains possible on account of the potential presentation of unscrambling keys. In specific, essentially downloading every one of the information for its uprightness confirmation isn't a pragmatic arrangement because of the cost in I/O and transmission cost over the system. Also, it is consistently deficient to perceive the data degradation just while getting to the data, as it doesn't give clients rightness confirmation for those unaccessed data and might be past the point where it is conceivable to recover the data adversity or damage. IV. RESEARCH METHODOLOGY

In the proposed conspire; the greater part of figuring work is done on the encoded information while the client participates in positioning, which ensures top k multi-keys gives proficient recovery of information over scrambled information with high security and commonsense effectiveness. The proposed work process appeared beneath in figure 1.

Fully Homomorphic Encryption Scheme

Sending encrypted data

Encryption Generate

DecryptHint the data

Cloud Storage

Secret Key Decryption Data owners

Checking valid user

Retrieve hint

Figure 1 Proposed architecture Stage 1: The client will send the information to the FHE cryptosystem where the information will be kept up with security the plan will give a safe information sharing. Stage 2: The client will choose the information for encryption and the encryption rules are connected to the chosen information .at that point the plain content will be changed over into figure content with producing the indication. Stage 3: After the transformation of figure message, the encoded information will be put away in the server. Once the secured information is handled the clue is produced, which is sent to the client singular email id. Stage 4: In this progression the client will enter the secret key to the gateway they enlisted so then the server will process the contributing watchword and it checks for the approval. Stage 5: The client will send the information to unscramble with the assistance of the clue given and the dynamic procedure will occur for information decoding. Stage 6: If it is a legitimate client the information will be unscrambled and the security key will be changed for information security .If it is an invalid client it will prevent from additionally handling of information. FULLY HOMOMORPHIC ENCRYPTION: A cryptosystem that helps subjective calculation on cyphertexts is called as fully homomorphic encryption (FHE) and is considerablyhigh effective. Such a strategyallows the projects growth for any attractive effectiveness, which can be keepingin succession on scrambled contributions to build an encryption of the result. Meanwhile such a program

@IJAERD-2018, All rights Reserved

994


International Journal of Advance Engineering and Research Development (IJAERD) Volume 5, Issue 03, March-2018, e-ISSN: 2348 - 4470, print-ISSN: 2348-6406 require never unscramble its sources of info, it can be controlled by an untrusted party without uncovering its information sources and inner state. 

Key Encryption: BlowFish calculation is utilized for scrambling the crude information and is sent for key age which is put away in private cloud.

Manipulation of clue content: By utilizing the FHE cryptosystem the insight is produced. It comprises of three calculations 1) Query Generation 2) Response Generation 3) Response Retrieval

Dynamic Decryption: By utilizing the single mystery key the relating figure content class can be unscrambled. A similar BlowFish calculation is utilized for unscrambling of figure content.

The presence of a productive and completely homomorphic cryptosystem would have extraordinary down to earth suggestions in the outsourcing of private calculations. The utility of completely homomorphic encryption has been for some time perceived. The issue of building such a plan was first proposed inside a time of the advancement of RSA. FHE plot comprises of four calculations as takes after: 1.

2.

3. 4.

KeyGen(F, λ) → (PK, SK): The randomized key age calculation creates two keys, open and private, in light of the security parameter λ. The general population key encodes the objective capacity F and is sent to the specialist to figure F. Then again, the mystery key is kept private by the customer. ProbGenSK(x) → (σx, τx): The issue age calculation encodes the capacity input x into two esteems, open and private, utilizing the mystery key SK. People in general esteem σx are given to the specialist to figure F(x) with, while the mystery esteem τx is kept private by the customer. ComputePK(σx) → σy: The specialist processes an encoded esteem σy of the capacity's yield y = F(x) utilizing the customer's open key PK and the encoded input σx. VerifySK(τx,σy) → y ∪⊥: The check calculation changes over the specialist's encoded yield σy into the genuine yield of the capacity F utilizing both the mystery key SK and the mystery "deciphering" τx. It yields y = F(x) if the σy speaks to a legitimate yield of F on x, or yields ⊥ something else.

BLOWFISH ALGORITHM: Blowfish symmetric piece figure count scrambles square data of 64-bits at a time.it will takes after the feistel framework and this computation is confined into two areas. 1. Key-extension 2. Data Encryption Key-extension: It will change over a key of at most 448 bits into a few subkey exhibits totaling 4168 bytes. Blowfish utilizes huge number of subkeys. These keys are creating prior to any information encryption or decoding. The p-exhibit comprises of 18, 32-bit subkeys: P1,P2,… … .,P18. Four 32-bit S-Boxes comprises of 256 sections each: S1,0, S1,1,… … . S1,255, S2,0, S2,1,… … .. S2,255, S3,0, S3,1,… … .. S3,255, S4,0, S4,1,..............S4,255. Information Encryption: It is having a capacity to repeat 16 times of system. Each round comprises of key-subordinate change and a key and information subordinate substitution. All tasks are XORs and increments on 32-bit words. The main extra activities are four ordered cluster information query tables for each round.

@IJAERD-2018, All rights Reserved

995


International Journal of Advance Engineering and Research Development (IJAERD) Volume 5, Issue 03, March-2018, e-ISSN: 2348 - 4470, print-ISSN: 2348-6406

Algorithm: Blowfish Encryption Divide x into two 32-bit halves: xL, xR For i = 1to 16: xL = XL XOR Pi xR = F(XL) XOR xR Swap XL and xR Swap XL and xR (Undo the last swap) xR = xR XOR P17 xL = xL XOR P18 Recombine xL and xR V.

PERFORMANCE ANALYSIS

The execution investigation of proposed inquire about is performed by FHE conspire the parameters are encryption/unscrambling time, computational time, correspondence overhead, document stockpiling and record recover and security examination. Security analysis The security investigation is ascertained amid the execution of the framework which delivered high security to the information sharing among information proprietor and information client. The figure 2 demonstrates the security investigation beneath.

Time (s) 4 3.5 3 2.5

FHE scheme

2 1.5

STRE mechanism

1 0.5

No of file

0 Video File

Image File

Word File

PDF document file

File 5

Figure 2 Security investigation Encryption/ Decryption Time: The time taken to encode the information record from configuration to another organization i.e. ordinary plain content to ciphertext and the changed over message ciphertext to unique plaintext. The underneath figure 3 and 4 demonstrates the encryption/unscrambling time.

@IJAERD-2018, All rights Reserved

996


International Journal of Advance Engineering and Research Development (IJAERD) Volume 5, Issue 03, March-2018, e-ISSN: 2348 - 4470, print-ISSN: 2348-6406

Time (s) 3.5 3 2.5 2

FHE scheme

1.5

STRE mechnaism

1 0.5 0 video File

Image File

Word File

No of files PDF document

Figure 3 Encryption time

3 2.5 2 1.5 FHE Scheme 1

STRE mechanism

0.5 0 Video file

Image file

Word file

PDF Document

Figure 4 Decryption time Computational time: The calculation time is computed by the way toward setting aside opportunity to figure the encryption and unscrambling process, additionally recover. The underneath figure 5 demonstrates the calculation time for document while handling.

@IJAERD-2018, All rights Reserved

997


International Journal of Advance Engineering and Research Development (IJAERD) Volume 5, Issue 03, March-2018, e-ISSN: 2348 - 4470, print-ISSN: 2348-6406 5 4.5 4 3.5 3 2.5

FHE scheme

2

STRE mechanism

1.5 1 0.5 0 Video file

Image File

Word File

PDF document

Figure 5 Computational time Communication overhead: The correspondence overhead is computed by more record in the line while handling. They can be decrease noteworthy level. The underneath figure demonstrates the correspondence overhead among the cloud clients.

5 4.5 4 3.5 3 2.5

FHE Scheme

2

STRE Mechanism

1.5 1 0.5 0 User 1

User 2

User 3

User 4

Figure 6 Communication overhead File storage and retreival: The document stockpiling and record recover is procedure of sharing the document in the cloud, and recovered by the clients by utilizing the key. The underneath figure 7 demonstrates the File stockpiling and document recover.

@IJAERD-2018, All rights Reserved

998


International Journal of Advance Engineering and Research Development (IJAERD) Volume 5, Issue 03, March-2018, e-ISSN: 2348 - 4470, print-ISSN: 2348-6406

Time (S) 4.5 4 3.5 3 FHE Scheme

2.5

STRE Mechanism

2 1.5 1 0.5

No. of Files

0 Word File

PDF File

Image File

Video File

Figure 7 File Storage 2.5 2 1.5 FHE Scheme 1

STRE mechanism

0.5 0 Word File

PDF File

Image file

Video file

Figure 8 File Retrieve Parameters

STRE mechanism

FHE Scheme

Security analysis

83%

92%

Encryption time

69.2s

86.9s

Decryption time

72.6s

89.1s

Computation time

73.9s

91.5s

File retrieve

69.2s

89.8s

File storage

86.5s

92.6s

Communication overhead

65.3s

28.9s

Table 1 Shows comparison of STRE mechanism and FHE scheme

@IJAERD-2018, All rights Reserved

999


International Journal of Advance Engineering and Research Development (IJAERD) Volume 5, Issue 03, March-2018, e-ISSN: 2348 - 4470, print-ISSN: 2348-6406 VI. CONCLUSION Distributed computing is a tremendous prospect both for the organizations parties have the capacity to have their own particular reward from distributed computing. An interminable potential effects of distributed computing can't be concealed just for the security problems reason – the unending examination and research for vigorous, consistent and security models for distributed computing may be the main way of motivation. The proposed conspire FHE is adaptable and safely recover from the distributed storage while sharing the information in the cloud condition, in the meantime the correspondence overhead is diminished noteworthy level. REFERENCE 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13.

B. Wang, B. Li, and H. Li, “Oruta: Privacy-preserving public auditing for shared data in the cloud,” Cloud Computing, IEEE Transactions on, vol. 2, no. 1, pp. 43–56, 2014 J. Xiong, F. Li, J. Ma, X. Liu, Z. Yao, and P. S. Chen, “A full lifecycle privacy protection scheme for sensitive data in cloud computing,” Peer-to-Peer Netw. Appl., Jun. 2014, DOI:10.1007/ s12083-014- 0295-x. J. Xiong, Z. Yao, J. Ma, X. Liu, Q. Li, and J. Ma, “Priam: Privacy preserving identity and access management scheme in cloud,” KSII Trans. Internet Inf. Syst., vol. 8, no. 1, pp. 282–304, 2014. P. Jamshidi, A. Ahmad, and C. Pahl, “Cloud migration research: A systematic review,” IEEE Trans. Cloud Comput., vol. 1, no. 2, pp. 142–157, Jul.–Dec. 2013. R. Lu, H. Zhu, X. Liu, J. K. Liu, and J. Shao, “Toward efficient and privacy-preserving computing in big data era,” IEEE Netw., vol. 28, no. 4, pp. 46– 50, Jul./Aug. 2014. S. Ramgovind, M. M. Eloff, E. Smith. “The Management of Security in Cloud Computing” In PROC 2010 IEEE International Conference on Cloud Computing 2010. Prince Jain,” Security Issues and their Solution in Cloud Computing” International Journal of Computing & Business Research, 2012. Ronald L. Krutz, Russell Dean Vines “Cloud SecurityA Comprehensive Guide to Secure Cloud Computing”, Wiley Publishing, Inc.,2010 A. Williamson, “Comparing cloud computing providers,” Cloud Comp. J., vol. 2, no. 3, pp. 3–5, 2009. Y. Chen and W. Tzeng, “Efficient and provably-secure group key management scheme using key derivation,” in Proc. IEEE 11th Int. Conf. TrustCom, 2012, pp. 295–302 N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, „„Privacy-preserving multikeyword ranked search over encrypted cloud data,‟‟ IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 1, pp. 222–233, Jan. 2014. Hayes B. Cloud computing. Commun ACM 2008:9–11 Xin Dong a, Jiadi Yu a, Yuan Luo , Yingying Chen, Guangtao Xue , Minglu Li, “Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing,” ScienceDirect journal homepage: www.elsevier.com/locate/cose computers & s e c u rity 4 2 ( 2 0 1 4 ) 1 5 1 e1 6 4, Elsevier Ltd 2013.

@IJAERD-2018, All rights Reserved

1000


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.