Reference07 Louk2015
Reference07 Louk2015
Computing
Maya Louk Hyotaek Lim
Department of Ubiquitous IT, Graduate School, Dongseo Division of Computer and Engineering, Dongseo
University University
Sasang-Gu, Busan 617-716, Korea Sasang-Gu, Busan 617-716, Korea
[email protected] [email protected]
Abstract—Multi cloud computing has become a new trend for data and applications in a public cloud is the simultaneous
complementing existing cloud computing today. Multi cloud usage of multiple clouds. In this paper will discuss about
computing is considered safer and more efficient in maintaining Mobile Multi Cloud Computing and its security and the
data regulation of user(s). The paper discusses the security of main values that must be concern for mobile user
mobile multi cloud computing (MMC) and the advantages for advantages. There is an evaluation in homomorphic
mobile user(s), beside that for the data security itself cover with
homomorphic encryption which predictable by many researchers
encryption scheme in mobile device provides in this paper
as the optimum method for cloud computing environment. The and the analysis of the scheme based on the mobile multi
implementation and evaluation of homomorphic encryption in cloud computing environment.
mobile cloud computing are discussed in this paper.
Keywords—Homomorphic Encryption, Mobile, Multi II. RELATED WORK
Cloud Computing, Security. There has been lot of effort and research to obtain
efficiently, effectively, securely for Cloud Computing usage
I. INTRODUCTION for Cloud Providers or Cloud Users. Cloud Computing
Cloud Computing is not a very new concept in IT, in fact itself moves to Multi Cloud based on the security aspects.
Cloud Computing is a more advanced version of the Data Mohammed A. Alzain, et al in Cloud Computing Security:
Processing Service Bureaus that we had 40 years ago. From Single to Multi-Clouds [3] contribute to give a logical
Nevertheless, the best known companies in the IT field offer explanation why we have to move from single cloud to
or will shortly offer Cloud Computing services to a range of multi-clouds, especially the main reason is security aspects.
customers from organizations of all sizes to individuals. The Multi-clouds has a lot of benefits for user data security in
paradigm of Cloud Computing can be described in simple the cloud computing. The security aspects of cloud
terms as offering particular IT services that are hosted on computing introduced by Frederick Carlson [2] and Jenas
the internet, the most common ones being Platform as a Matthias Bohli, et al [1] which contribute about security and
Service (PaaS), Infrastructure as a Service (IaaS) and privacy enhancing multicloud architectures. Those papers
Software as a service (SaaS). Cloud Computing is often give contribution for multi-clouds architectures for a better
marketed as an efficient and cheap solution that will replace cloud computing scheme for user data security. However,
the client-server paradigm. The paradigm shift the user data security needs an encryption scheme. Craig
involves/results in the loss of control over data as well as Gentry [7] for a fully Homomorphic Scheme for his
new security and privacy issues. For this reason caution is dissertation book contributes to give an encryption method
advised when deploying and using Cloud Computing in which known as the optimum method for cloud computing
enterprises. After all, the first big issue in data protection in usage. Kristin Lauter, et al [9] in Can Homomorphic
Europe arose at the end of the 1960’s, when a Swedish Encryption be Practical explain the possibilities to
company decided to have its data processing done by a implement and give some result for homomorphic
service bureau in Germany and the data protection encryption in the real system.
legislations in both countries were not alike. With Cloud
Computing rapidly gaining popularity, it is important to III. MOBILE MULTI CLOUD COMPUTING
highlight the resulting risks. As security and privacy issues Mobile Cloud Computing is a new distributed computing
are most important, they should be addressed before Cloud paradigm for mobile applications whereby the storage and
Computing establishes an important market share. the data processing are migrated from the mobiles to
In public clouds, all of the three common cloud service resources rich and powerful centralized computing data
layers (IaaS, Paas, SaaS) share the commonality that the centers in computational clouds. In mobile cloud computing,
end-users’ digital assets are taken from an intra these are transferred to cloud: intensive computing, data
organizational to an inter organizational context. This storage, information processing. Although cloud service
creates a number of issues, among which security aspects providers can offer benefits to users, security risks play a
are regarded as the most critical factors when considering major role in the cloud computing environment [21]. Users
cloud computing adoption. One idea on reducing the risk for of online data sharing or network facilities are aware of the
494
one data set into another while preserving relationships Homomorphic property
between elements in both sets. The term is derived from the Encrypt (m) x encrypt (n) = encrypt(m x n)
Greek words for "same structure." Because the data in a RSA allows only multiplication: other operations on
homomorphic encryption scheme retains the same structure, ciphertext (e.g +) break decryption
identical mathematical operations whether they are
performed on encrypted or decrypted data will yield Other scheme allow different operations (e.g. + and -)
equivalent results. Homomorphic encryption is expected to Algebra homomorphism allows x and +: much more
play an important part in cloud computing, allowing powerful but need to select appropriate homomorphic
companies to store encrypted data in a public cloud and take encryption scheme for application.
advantage of the cloud provider’s analytic services.
Homomorphic encryption is about encryption schemes IV. RESULT AND ANALYSIS
which allow computing with encrypted value without This implementation is going to be executed on android OS
decrypting them. For instance, given E(a) and E(b) (the platform using Samsung Galaxy S3, android version 4. This
encryption of a and b), you can compute E(a+b) without
knowing a, b nor the decryption key. Homomorphic Table 1. The Time Consumption result for homomorphic Encryption in
encryption schemes are very useful in voting schemes, with Mobile Multi-Clouds
the following structure: voters encrypt their votes, the file size Encryption Decryption
homomorphic property is used to add all votes together, and ± (kb) time (ms) time (ms)
the result is decrypted (with group decryption by a set of
authorities who need to gather together, in a very public way, 20 5 4
to perform a decryption). There are several homomorphic 50 12 10
encryption schemes, some have been known for decades
(e.g. El Gamal). They are efficient, and secure (as secure as
100 20 17
asymmetric encryption can be). Note that homomorphic 200 35 30
encryption solves the question of anonymous tallying, but 500 90 75
that's only a small part of a proper voting scheme.
Homomorphic encryption can also be used in digital cash 1000 196 180
systems, there again in order to ensure anonymity or some 2000 420 400
other properties. Fully homomorphic encryption is a term 5000 1500 1350
which was coined when were first found encryption
schemes which preserved two algebraic operations in a ring In this implementation, we are focusing on the
structure: namely, given E(a) and E(b), you can homomorphic encryption in user side for data security
compute E(a+b) and E(ab). It turns out that with those two which put in the multi-cloud, our research is focusing on the
operations, you can compute just about everything. This is time consumption while do the encryption locally in the
where the "cloud" gets into the picture: the cloud is environment. Otherwise, the result of this experiment till
powerful, but not trustworthy; hence, you could encrypt improving, but from this result, we can admit that
your data, send it to the cloud which performs the homomorphic encryption has a fast encryption method for
computation you want to do, and then decrypt the result. cloud computing and also has strong method for secure the
Homomorphism Scheme: data itself compare to other scheme (explained in
Here is the simple explanation and its example: Homomorphic scheme).
Groups (,⊕) and (,⊗) relation ∶ →
F is a group homomorphism in P and C, if: ∀ , ∈ Table 2. The Comparison Table with Existed works
: ( ⊕ ) = () ⊗ () especially ∀ , ∈ : ⊕ Half Full
= (() ⊗ ()) System Applications
Homomorphic Homomorphic
Public key (z,y) and Data on cloud
Select p=a, q=b HE ü
computing
P X q= y= N RSA Internet
µ(N)=µ(y)=(p-1)x(q-1)=120 ü
(1978) Banking
select e with gcd (e,120)=1 BGV Integer of
e=z ü
[19] Polynomials
private key (w,y) Multi-party
calculate e x d ≡ 1 mod µ(N): computation,
e x d + K x µ (N) = 1 = gcd (e, µ(N)) AHEE
ü electronic
= z x d + K x 120 = 1 = gcd (z, 120) [20]
voting and
D = w, k = -9 mobile cipher
Encryption in RSA:
. −
495
Table 2 consist of the comparison of our project with some [5] Sanaei, Zohreh, et al. "Heterogeneity in mobile cloud
related project, our project name is Homomorphic computing: taxonomy and open challenges." Communications
Encryption (HE). BGV is an asymmetric encryption scheme Surveys & Tutorials, IEEE 16.1 (2014): 369-392.
which can be used for the encryption of the bits. Dealing [6] Ahmad, Azeem, Muhammad Mustafa Hassan, and Abdul
with integer vectors (whose security is dependent on the Aziz. "A Multi-token Authorization Strategy for Secure
hardness of decisional LWE (Learning with Errors) and Mobile Cloud Computing." Mobile Cloud Computing,
dealing with the integer polynomials (whose security is Services, and Engineering (MobileCloud), 2014 2nd IEEE
dependent on the hardness of the decisional R-LWE (Ring International Conference on. IEEE, 2014.
LWE). The security of the AHEE is IND-CPA which is the [7] Gentry, Craig. A fully homomorphic encryption scheme. Diss.
highest level of the security of AHEE. Additive Stanford University, 2009.
homomorphism of this algorithm refers the same k for [8] Gentry, Craig. "Fully homomorphic encryption using ideal
encryption but uses the random number of k in E1 which lattices." STOC. Vol. 9. 2009.
makes AHEE able to resist plaintext attack. In this project, [9] Naehrig, Michael, Kristin Lauter, and Vinod Vaikuntanathan.
we make a Homomorphic Encryption for mobile version "Can homomorphic encryption be practical?." Proceedings of
which connects to Multi Cloud Computing. One more the 3rd ACM workshop on Cloud computing security
important thing to complete this task is run a single
workshop. ACM, 2011.
command in cloud computing to the encrypted file without
[10] InformationWeek. (March 3 2012). 6 Reasons to Use multiple
decrypted to prove that Homomorphic Encryption could
cloud providers. Retrieved from
protect the data while it’s given some tasks.
http://www.informationweek.com/cloud/infrastructure-as-a-
V. CONCLUSION service/6-reasons-to-use-multiple-cloud-providers/d/d-
id/1103644?
Multi-clouds is one of optimal solution for data security and
efficiency and effectively than single cloud. The technology [11] GCN Technology, Tools and Tactics for Public Sector IT.
is changing over the time, mobile cloud is becoming a trend (June 13 2013). New Encryption Method Promises End-to-
among the user. This paper gives a research in mobile multi- End Cloud Security. Retrieved from
cloud computing (MMC) and the data security from user http://gcn.com/articles/2013/06/13/encryption-end-to-end-
side through homomorphic encryption. Homomorphic cloud-security.aspx?admgarea=TC_Cloud
encryption claimed by many research as an optimal [12] Khan, Abdul Nasir, et al. "Towards secure mobile cloud
encryption for cloud computing environment. This paper computing: A survey."Future Generation Computer
prove the result performance in homomorphic encryption Systems 29.5 (2013): 1278-1299.
suitable for mobile multi-cloud computing. Future works for [13] AlZain, Mohammed Abdullatif, Ben Soh, and Eric Pardede.
the researcher in this paper is improving the performance "MCDB: Using Multi-clouds to Ensure Security in Cloud
security aspects in mobile multi cloud computing and Computing." Dependable, Autonomic and Secure Computing
improve the encryption itself and research for the space or (DASC), 2011 IEEE Ninth International Conference on. IEEE,
memory consumption for mobile environment. 2011.
[14] Wang, Cong, et al. "Privacy-preserving public auditing for
ACKNOWLEDGMENT data storage security in cloud computing." INFOCOM, 2010
This research was supported by the National Research Proceedings IEEE. Ieee, 2010.
Foundation of Korea under Grant 2011-0009349. [15] Subashini, Subashini, and V. Kavitha. "A survey on security
issues in service delivery models of cloud
computing." Journal of Network and Computer
REFERENCES
Applications 34.1 (2011): 1-11.
[1] Bohli, J-M., et al. "Security and privacy-enhancing multicloud [16] Ramgovind, S., Mariki M. Eloff, and E. Smith. "The
architectures."Dependable and Secure Computing, IEEE management of security in cloud computing." Information
Transactions on 10.4 (2013): 212-224. Security for South Africa (ISSA), 2010. IEEE, 2010.
[2] Carlson, Frederick R. "Security Analysis of Cloud [17] Reddy, A. Rama Mohan. "Data Security in Cloud based on
Computing." arXiv preprint arXiv:1404.6849 (2014). Trusted Computing Environment."
[3] AlZain, Mohammed Abdullatif, et al. "Cloud computing [18] Santos, Nuno, Krishna P. Gummadi, and Rodrigo Rodrigues.
security: from single to multi-clouds." System Science "Towards trusted cloud computing." Proceedings of the 2009
(HICSS), 2012 45th Hawaii International Conference on. conference on Hot topics in cloud computing. 2009.
IEEE, 2012. [19] Fau, Simon, et al. "Towards practical program execution over
[4] Naehrig, Michael, Kristin Lauter, and Vinod Vaikuntanathan. fully homomorphic encryption schemes." P2P, Parallel, Grid,
"Can homomorphic encryption be practical?." Proceedings of Cloud and Internet Computing (3PGCIC), 2013 Eighth
the 3rd ACM workshop on Cloud computing security International Conference on. IEEE, 2013.
workshop. ACM, 2011. [20] Smid, Miles E., and Dennis K. Branstad. "Response to
comments on the NIST proposed Digital Signature Standard."
496
Advances in Cryptology—Crypto‘92. Springer Berlin
Heidelberg, 1993.
[21] J. Viega, "Cloud computing and the common man", Computer,
42, 2009, pp. 106-108.
[22] H.Mei, J. Dawei, L. Guoliang and Z. Yuan, "Supporting
Database Applications as a Service", ICDE'09:Proc.
25thIntl.Conf. on Data Engineering, 2009, pp. 832-843.
[23] C. Wang, Q. Wang, K. Ren and W. Lou, "Ensuring data
storage security in cloud computing", ARTCOM'10: Proc. Intl.
Conf. on Advances in Recent Technologies in
Communication and Computing, 2010, pp. 1-9.
[24] M. Vukolic,"The Byzantine empire in the intercloud", ACM
SIGACT News, 41,2010, pp. 105-111.
497