Nothing Special   »   [go: up one dir, main page]

Skip to main content

Enhanced Database Security Using Homomorphic Encryption

  • Conference paper
  • First Online:
Information Science and Applications 2017 (ICISA 2017)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 424))

Included in the following conference series:

Abstract

When sensitive data is stored on publicly available areas, privacy of that data becomes a concern. Organizations may wish to move data to public servers so the data is more accessible by their employees or consumers. It is important that this data be encrypted to ensure it remains confidential and secure. When this data is encrypted, it becomes difficult or impossible to perform calculations on a publicly stored database. A solution to this is homomorphic encryption, which allows an unlimited number of computations on encrypted data. This project analyzes an N-tier rotation scheme which allows an unlimited number of addition and subtractions of encrypted data, along with an unlimited number of scalar multiplications and divisions. This scheme is inspired by a combination lock and features multiple levels of security depth. The result of the proposed algorithm is a fast encryption scheme which allows data to be manipulated post encryption.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  • Barthelemy, L.: A brief survey of fully homomorphic encryption, computing on encrypted data, Quarkslab’s blog (2016). http://blog.quarkslab.com/a-brief-survey-of-fully-homomorphic-encryption-computing-on-encrypted-data.html

  • CIA, the world factbook, world (2016). https://www.cia.gov/library/publications/the-world-factbook/geos/xx.html

  • Gentry, C.: A fully homomorphic encryption scheme, Ph.D. Dissertation, Department of Computer Science, Stanford University, September 2009a

    Google Scholar 

  • Gentry, C.: Fully homomorphic encryption using ideal lattices. In: STOC 2009, Proceedings of the 41st Annual ACM Symposium on Theory of Computing, pp. 169–178 (2009b)

    Google Scholar 

  • Gentry, C., Halevi, S., Smart, N.P.: Homomorphic evaluation of the AES circuit. In: Cryptography ePrint Archives, Report 2012/099 (2012)

    Google Scholar 

  • Howard, R: Parallel processing of fully homomorphic encryption for a cloud environment. In: A thesis Submitted to the Graduate School of University of Arkansas at Little Rock, p. 38, May 2013

    Google Scholar 

  • Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Proceedings of the 18th EUROCRYPT, pp. 223–238, Prague, Czech Republic, May 1999

    Google Scholar 

  • Pfleeger, C., Pfleeger, S.: Security in Computing. Prentice Hall PTR, Upper Saddle River (2006)

    MATH  Google Scholar 

  • Lauter, K., Naehrig, M., Vaikuntanathan, V.: Can homomorphic encryption be practical? In: Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop, pp. 113–124 (2011)

    Google Scholar 

  • Rivest, R.L., Adleman, L., Dertouzos, M.L.: On data banks and privacy homomorphism. Found. Secure Comput. 4(11), 169–180 (1978)

    MathSciNet  Google Scholar 

  • Warren, L.V.: AddSubMulDivia: Volume 5 – Homomorphic Shape Encryption, Kindkle edn. Amazon Digital Services LLC, Seattle (2016)

    Google Scholar 

  • Wooldridge, Nivens, Chiang: Securing databases with a combination of encryption and information hiding. Computer Science Department at the University of Arkansas at Little Rock (2016)

    Google Scholar 

Download references

Acknowledgments

We would like to make a special thanks to the Arkansas Department of Higher Education for providing funding for this research via the Student Undergraduate Research Fellowship. We would also like to thank the University of Arkansas at Little Rock for providing resources and a location for working.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Connor Røset .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Røset, C., Warren, V., Chiang, CC. (2017). Enhanced Database Security Using Homomorphic Encryption. In: Kim, K., Joukov, N. (eds) Information Science and Applications 2017. ICISA 2017. Lecture Notes in Electrical Engineering, vol 424. Springer, Singapore. https://doi.org/10.1007/978-981-10-4154-9_44

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-4154-9_44

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-4153-2

  • Online ISBN: 978-981-10-4154-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics