Energy Aware Multi-Modal Homomorphic Security Mechanism for Small Scale Private Cloud Systems

Authors

  • Sindhu V. Research Scholar, Bharathiyar university, Coimbatore, India
  • Rajeswari Mukesh SRM Institute of Science and Technology, Ramapuram, Chennai, India

Keywords:

Security, Homomorphic encryption, deduplication, Digital Signature, cloud systems and energy cost

Abstract

The small scale private cloud systems are widely required for many start-up companies and individual’s technology solutions. Comparing to large-scale cloud computing platforms, small scale private networks are expecting limited resources at platform-level, software-level and infrastructure-level. At the same time, people or company requires minimal computation load, energy consumption rate with optimal security features. In this regard, various techniques are developed for supporting small scale systems. Anyhow, the available techniques are not aware of more crucial energy sensitive security procedures. On the scope, the proposed Energy aware   Multi-Modal Homomorphic model (EMMH) using light-weight VM assisted encryption techniques. This proposed model assures secure data transmission based on the phases such as data deduplication, Elliptic Curve Cryptography with Digital Signature (ECCDS), Secure Hashing (SHA), random bit inclusions, data extraction and cost validation procedures. The proposed model has been implemented and the results show the proposed model is performing 5% to 12% better than existing techniques.

Downloads

Download data is not yet available.

References

B. Joshi, B. Joshi, A. Mishra, V. Arya, A. K. Gupta, et al., “A comparative study of privacy-preserving homomorphic encryption techniques in cloud computing,” International Journal of Cloud Applications and Computing (IJCAC), vol. 12(1), pp. 111, 2022.

K. Munjal and R. Bhatia, “A systematic review of homomorphic encryption and its contributions in healthcare industry,” Complex & Intelligent Systems, vol. 3, pp. 128, May 2022.

M. Joseph and G. Mohan, “Design a hybrid optimization and homomorphic encryption for securing data in a cloud environment,” International Journal of Computer Networks and Applications (IJCNA), vol. 9(4), pp. 38795, July 2022.

T. Hidayat, D. S. Franky and R. Mahardiko, “Forecast analysis of research chance on AES algorithm to encrypt during data transmission on cloud computing,” In 2020 2nd International Conference on Broadband Communications, Wireless Sensors and Powering (BCWSP), IEEE, pp. 163 166, September 2020.

J. Liu, B. Zhao, J. Qin, X. Zhang and J. Ma, “Multi-keyword ranked searchable encryption with the wildcard keyword for data sharing in cloud computing,” The Computer Journal. vol. 66(1), pp. 18496, January 2023.

S. A. Aljawarneh and M. O. Yassein, “A conceptual security framework for cloud computing issues,” International Journal of Intelligent Information Technologies (IJIIT), vol. 12(2), pp. 1224, April 2016.

S. Choudhary and N. Singh, “Analysis of security-based access control models for cloud computing,” International Journal of Cloud Applications and Computing (IJCAC), vol. 12(1), pp. 19, January 2022.

T. Budhwani, P. Tejaswini, A. Chowdhury, D. B. Bolli, F. Uddin et al., “An analysis of cloud security,” Int. Res. J. Eng. Technol., 9(2), 2022.

M. Kara, A. Laouid, M. A. Yagoub, R. Euler, S. Medileh et al., “A fully homomorphic encryption based on magic number fragmentation and El‐Gamal encryption: Smart healthcare use case,” Expert Systems, vol. 39(5), pp. e12767, June 2022.

R. Kiesel, M. Lakatsch, A. Mann, K. Lossie, F. Sohnius et al., “Potential of homomorphic encryption for cloud computing use cases in manufacturing,” Journal of Cybersecurity and Privacy, vol. 3(1), pp. 4460, February 2023.

X. Li, H. Li, J. Gao and R. Wang, “Privacy preserving via multi-key homomorphic encryption in cloud computing,” Journal of Information Security and Applications, vol. 74, pp. 103463, May 2023.

M. Kara, A. Laouid, M. Hammoudeh and A. Bounceur, “One digit checksum for data integrity verification of cloud-executed homomorphic encryption operations,” Cryptology ePrint Archive, 2023.

W. Jung, E. Lee, S. Kim, J. Kim, N. Kim, et al., “Accelerating fully homomorphic encryption through architecture-centric analysis and optimization,” IEEE Access, vol. 9, pp. 98772-89, July 2021.

A. Bhowmik and S. Karforma, “Isomorphic encryption and coupled ANN with Mealy machine: a cutting edge data security model for cloud computing environment,” Knowledge and Information Systems, vol. 65(1), pp. 13362, January 2023.

C. Rupa and M. A. Shah, “Novel secure data protection scheme using Martino homomorphic encryption,” Journal of Cloud Computing, vol. 12(1), pp.12, December 2023.

C. Rout, S. Sethi, R. K. Sahoo and J. Chandrakanta Badajena, “Empirical analysis of the impact of homomorphic encryption on cloud computing,” Intelligent Systems and Applications: Select Proceedings of ICISA 2022, vol. 1, pp. 10720, January 2023.

N. Vijayaraj and S. Arunagiri, “Demultiplexer design using photonic crystal ring resonator with high quality factor and less footprint for DWDM application,” Opt Quant Electron, vol. 54, pp. 465, 2022. https://doi.org/10.1007/s11082-022-03817-2

Nivethitha, et.al., “Conceptual approach on smart car parking system for industry 4.0 internet of things assisted networks”, in Measurement: Sensors, Vol. 24, December 2022, https://doi.org/10.1016/j.measen.2022.100474

P. Elumalaivasan et. al., “CBIR- Retreival of Images using Median Vector Algorithm”, International Conference on Green Computing, Communication and Conservation of Energy, ICGCE 2013, pp. 1–5, 2013,

https://doi.org/10.1109/ICGCE.2013.6823389

S. Suthir and S. Janakiraman, “SNT Algorithm and DCS Protocols coalesced a Contemporary Hasty File Sharing with Network Coding Influence”, Journal of Engineering Research, vol. 6, issue 3, pp. 5469, 2018.

E. N. Oh, M. R. Baharon, S. M. Yassin, A. Idris and A. MacDermott, “Preserving data privacy in mobile cloud computing using enhanced homomorphic encryption scheme,” Journal of Physics: Conference Series, vol. 2319, no. 1, pp. 012024, August 2022. IOP Publishing.

M. M. Salim, I. Kim, U. Doniyor, C. Lee and J. H. Park, “Homomorphic encryption based privacy-preservation for iomt,” Applied Sciences, vol. 11(18), pp. 8757, September 2021.

C. Jayashri, et. al., “Big data transfers through dynamic and load balanced flow on cloud networks”, 3rd IEEE International Conference on Advances in Electrical and Electronics, Information, Communication and Bio-Informatics, pp. 342–346, 2017. https://doi.org/10.1109/AEEICB.2016.7538376.

W. Ren, X. Tong, J. Du, N. Wang, S. C. Li, et al., “Privacy-preserving using homomorphic encryption in mobile IoT systems,” Computer Communications, vol. 165, pp. 105-11, January 2021.

S. Suthir, et. al., “A contemporary network security technique using smokescreen SSL in huddle network server,” 2nd International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB), pp. 673676, 2016. https://doi.org/10.1109/AEEICB.2016.7538376

S. J. Mohammed and D. B. Taha, “Performance evaluation of RSA, ElGamal, and Paillier partial homomorphic encryption algorithms,” In 2022 International Conference on Computer Science and Software Engineering (CSASE), IEEE, pp. 8994, March 2022.

H. Fang and Q. Qian, “Privacy preserving machine learning with homomorphic encryption and federated learning,” Future Internet. vol. 13(4), pp. 94, April 2021.

Vijayaraj Nivethitha and A. Sivasubramanian, “Intensification and interpretation of performance in 5G adopting millimeter wave: a survey & future research direction,” International Arab Journal of Information Technology, vol. 20, No. 4, July 2023.

Taha Junaid, et.al., “A comparative analysis of transformer based models for figurative language classification,” Computers and Electrical Engineering, vol. 101, July 2022, https://doi.org/10.1016/j.compeleceng.2022.108051

S. A. Sheik and A. P. Muniyandi, “Secure authentication schemes in cloud computing with glimpse of artificial neural networks: A review,” Cyber Security and Applications, vol. 1, pp. 100002, December 2023.

C. L. Stergiou, E. Bompoli and K. E. Psannis, “Security and privacy issues in iot-based big data cloud systems in a digital twin scenario”, Applied Sciences, vol. 13(2), pp. 758, January 2023.

H. Yin, W. Zhang, H. Deng, Z. Qin and K. Li. “An attribute-based searchable encryption scheme for cloud-assisted IIoT” IEEE Internet of Things Journal, February 2023.

M. Kara, A. Laouid, A. Bounceur, M. Hammoudeh, M. Alshaikh, “Perfect Confidentiality through Unconditionally Secure Homomorphic Encryption Using OTP With a Single Pre-Shared Key,” Journal of Information Science & Engineering, vol. 39(1) January 2023.

H. Kang and J. Deng, “A cross encryption scheme for data security storage in cloud computing environment,” Int. J. Internet Protocol Technology, 16(1) pp. 1, 2023.

D. Prabhu and Vijay Bhanu, “Privacy preserving steganography based biometric authentication system for cloud computing environment”, Measurement: Sensors Journal, vol 24, December 2022. https://doi.org/10.1016/j.measen.2022.100511

D. Prabhu and Vijay Bhanu, “Design of multiple share creation with optimal signcryption based secure biometric authentication system for cloud environment”, International Journal of Computers and Applns., 44(11), pp. 1047–1055, 2022. https://doi.org/10.1080/1206212X.2022.2103890

C. Vijayalakshmi, et. al., “A survey on solving dilemmas of adapting blockchain in different applications”, 1st International Conference on Recent Advances in Manufacturing Engineering Research, ICRAMER 2021, AIP Conference Proceedings, vol. 2460, pp. 070011, 2022. https://doi.org/10.1063/5.0095701

Archana, M., Kavitha, S., & Vathsala, A. . (2023). Auto Deep Learning-based Automated Surveillance Technique to Recognize the Activities in the Cyber-Physical System. International Journal on Recent and Innovation Trends in Computing and Communication, 11(2), 35–42. https://doi.org/10.17762/ijritcc.v11i2.6111

Anna, G., Hernandez, M., García, M., Fernández, M., & González, M. Optimizing Course Recommendations for Engineering Students Using Machine Learning. Kuwait Journal of Machine Learning, 1(1). Retrieved from http://kuwaitjournals.com/index.php/kjml/article/view/104

Dhabliya, D. (2021). Delay-tolerant sensor network (DTN) implementation in cloud computing. Paper presented at the Journal of Physics: Conference Series, , 1979(1) doi:10.1088/1742-6596/1979/1/012031 Retrieved from www.scopus.com

Downloads

Published

16.07.2023

How to Cite

V., S. ., & Mukesh, R. . (2023). Energy Aware Multi-Modal Homomorphic Security Mechanism for Small Scale Private Cloud Systems. International Journal of Intelligent Systems and Applications in Engineering, 11(3), 918–929. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/3347

Issue

Section

Research Article