97
Views
0
CrossRef citations to date
0
Altmetric
Articles

Secure storage and accessing the data in cloud using optimized homomorphic encryption

, &
Pages 90-98 | Received 05 Jan 2022, Accepted 12 May 2022, Published online: 29 May 2022
 

Abstract

Different efforts have been undertaken to customizing a security and privacy concern in cloud data access. Therefore, the security measures are reliable and the data access was verified as the major problem in the cloud environment. To overcome this problem, we proposed an efficient data access control using optimized homomorphic encryption (HE). Because users outsource their sensitive information to cloud providers, data security and access control is one of the most difficult ongoing cloud computing research projects. Existing solutions that rely on cryptographic technologies to address these security issues result in significant complexity for both data and cloud service providers. The experimental results show that the key generation is 7.6% decreased by HE and 14.14% less than the proposed method. The encryption time is 11.34% less than the optimized HE and 23.28% decreased by ECC. The decryption time is 13.18% and 24.07% when compared with HE and ECC respectively.

Acknowledgments

The author with a deep sense of gratitude would thank the supervisor for his guidance and constant support rendered during this research.

Disclosure statement

No potential conflict of interest was reported by the author(s).

Research funding

No Financial support

Competing interests

This paper has no conflict of interest for publishing

Additional information

Notes on contributors

S. Gnana Sophia

S Gnana Sophia is an Assistant professor of the Computer Applications Department at Scott Christian College, Nagercoil, Tamilnadu, India. She received her Bachelor’s degree in Computer Science from Manonmaniam Sundaranar University, Tirunelveli and a Master’s degree in Computer Science from Bharathidasan University, Trichy, Tamilnadu. She had fifteen years of work experience in the field of teaching and arranged/organized many conferences, seminars, workshops and various other events. He has published many refereed journal articles/conference papers. His research interest includes Cloud-based Encryption Technologies.

K. K. Thanammal

K.K.Thanammal received the M.Sc (Computer Science) Degree from Bharathidasan University, Tiruchirappalli in 1992, M.Phil (Computer Science) Degree from Manonmaniam Sundaranar University, Tirunelveli in 1999, M.Tech (Computer Science) Degree from Vinayaka Mission University, Salem in 2007 and Ph.D. (Computer Science) Degree from Manonmaniam Sundaranar University, Tirunelveli in 2015. She is working as Associate Professor in the Computer Science Department at S.T.Hindu College, Nagercoil since 1993. She has 27 years of teaching experience. She has published seven papers in journals and presented in seven National and International Conferences. Her current research interest focuses on Image Processing, Neural Networks, Medical imaging, and Cloud based Encryption Technologies.

S. S. Sujatha

S.S. Sujatha completed her MCA degree in Alagappa University, Karaikudi in 1993, M.Phil (Computer Science) Degree from Manonmaniam Sundaranar University, Tirunelveli in 2003, She completed her doctorate degree at Mother Teresa University, in 2014. She is working as Associate Professor in the Computer Science Department at S.T.Hindu College, Nagercoil since 1994. She has published eighteen papers in journals and presented in three International Conferences. Her current research interest focuses on Image Processing, Data Mining, Cloud Computing and Cloud based Encryption Technologies.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.