Homomorphic Cryptosystems for Data Security in Cloud Storage
Vidyullata Devmane1, B. K. Lande2, Dilendra Hiran3, Jyoti Joglekar4
1Vidyullata Devmane*, Ph.D Scholar, Department of Computer Engineering, PAHERU Udaipur, Rajasthan, India.
2Dr. B. K. Lande, Professor, Department of Electronics, Datta Meghe College of Engineering, Airoli, Navi Mumbai, India.
3Dr. Dilendra Hiran Professor, Pacific Academy Higher Education Research University, Udaipur, Rajasthan, India.
4Dr. Jyoti Joglekar, Professor, Department of Computer Engineering, K. J. Somaiya College of Engineering, Mumbai, India.
Manuscript received on November 22, 2019. | Revised Manuscript received on December 15, 2019. | Manuscript published on December 30, 2019. | PP: 3164-3166 | Volume-9 Issue-2, December, 2019. | Retrieval Number: B4218129219/2019©BEIESP | DOI: 10.35940/ijeat.B4218.129219
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Cloud Computing enables users to use remote resources thus reduces the burden on local storage. However, the use of such services gives rise to new set of problems. The users have no control over the data which they have stored on those storages so to achieve data authentication with confidentiality is utmost important. As every user may not have that expertise so they can request for data verification task to Trusted Verifier (TV) which will be an authorized party to check the intactness of outsourced data. Since the data owner stores the data on the cloud in an encrypted format, it becomes difficult to check the integrity of the data without decrypting. But by using homomorphic encryption schemes the integrity checking can be made possible without original copy. In this paper, we have given implementation and performance details of two homomorphic encryption schemes, Rivest Shamir Adleman (RSA) and Paillier. The RSA is multiplicative homomorphic scheme where the Paillier is additive homomorphic scheme. Both the algorithms are partially homomorphic thus limited in their functions. Due to homomorphic property of these algorithms, original contents will not get revealed in the verification process. This framework will achieve authentication of data by maintaining confidentiality.
Keywords: Homomorphic algorithms, Data Integrity in Cloud Storage, Trusted Verifier.