• Login
  • Help Guide
View Item 
  •   JOOUST IR Home
  • Journal Articles
  • School of Informatics & Innovative Systems
  • View Item
  •   JOOUST IR Home
  • Journal Articles
  • School of Informatics & Innovative Systems
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.

Suitability of Fully Homomorphic Encryption for Securing Cloud Computation

Thumbnail
Publication Date
2014
Author
Omollo, Richard
Omolo, Ongati
Raburu, George
Okelo, Bernard
Type
Article
Metadata
Show full item record
Abstract/Overview

The place of cloud computing as an emerging technological paradigm enjoys incontestable status in the field of digital resource management. Computational effort in such cloud environment involves processing of data hosted under preferred deployment model. A computational requirement on the critical data resident in cloud environment is to adequately address security concerns for both cloud users and providers. Fully Homomorphic Encryption (FHE) has been employed to introduce computational complexity when processing data in the cloud without compromising its security. Previous implementations of fully homomorphic encryption scheme have enabled successful operations on such encrypted data without revealing its secret key. However, this scheme introduce computational defect since the encrypted data becomes very large causing heavy burden onto computing assets in question. In this paper, we appreciate this implementation weakness and address it by incorporating a new technique whereby we defined addition-composition operation such that η() = η()  η() where  is a composite function. Our approach not only tightens the security requirement on processed data but also lessen computational overheads, which make it ideal for cloud computation. Again, we are able to demonstrate superiority of our approach against previous variants of fully homomorphic encryption that has been implemented.

Subject/Keywords
Cloud computation; Fully homomorphic encryption; Data security; Technique
Permalink
http://ir.jooust.ac.ke:8080/xmlui/handle/123456789/9528
Collections
  • School of Informatics & Innovative Systems [119]

Browse

All of JOOUST IRCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

My Account

LoginRegister

Statistics

View Usage Statistics

Contact Us

Copyright © 2023-4 Jaramogi Oginga Odinga University of Science and Technology (JOOUST)
P.O. Box 210 - 40601
Bondo – Kenya

Useful Links

  • Report a problem with the content
  • Accessibility Policy
  • Deaccession/Takedown Policy

TwitterFacebookYouTubeInstagram

  • University Policies
  • Access to Information
  • JOOUST Quality Statement