Optimizing Fully Homomorphic Encryption Algorithm using RSA and Diffie- Hellman Approach in Cloud Computing

Authors

  • Negi A Computer Science & Engineering, Faculty of Technology, Uttarakhand Technical University, Dehradun, India
  • Goyal A Computer Science & Engineering, Faculty of Technology, Uttarakhand Technical University, Dehradun, India

DOI:

https://doi.org/10.26438/ijcse/v6i5.215220

Keywords:

Cloud Computing, Diffie Hellman Algorithm, RSA Algorithm, Fully Homomorphic Encryption, Security

Abstract

Cloud computing is a technology where user can store their data and any application software on it. With the use of this technology user need not to worry about the cost of hardware installation and their maintenance cost. Hence, the cloud computing security becomes the current research focus. To secure the cloud data, Encryption Scheme is used. Different encryption techniques used for security purpose like Fully Disk Encryption and Fully Homomorphic Encryption. FDE encrypts the entire disk and FHE encrypts the particular functions. FHE is used to secure the cloud data from exploitation during the computation. In this research paper, FHE encryption scheme is optimized in which the Encryption Time, Probability of Attacks and Space Used by encrypted data is reduced using RSA and Diffie- Hellman Algorithm. RSA Algorithm is applied to improve performance of FHE schemes. The Diffie- Hellman algorithm is also applied for the secure channel establishment in the fully homomorphic encryption It has been analyzed that RSA algorithm based FHE performs well as compared to Diffie- Hellman algorithm.

References

http://www.google.com/sans.org/rr/encryption/algorithm.php the Diffie-Hellman Algorithm Riley Lochridge April 11, 2003

Craig Gentry, 2009,”full homomorphic encryption scheme”

John Harauz ,Lori M. Kaufman,Bruce Potter,” Data Security in the World of Cloud Computing ” IEEE Security and Privacy July 2009. pp. 61-64

van Dijk, M., Gentry, C., Halevi, S., Vaikuntanathan, V (2010) Fully homomorphic encryption over the integers. In Gilbert, H., ed.: EUROCRYPT. Volume 6110 of Lecture Notes in Computer Science., Springer

Geethu Thomas, 2010,"Cloud Computing security using Encryption Technique"

Sean Carlin, Kevin Curran, 2011 “Cloud Computing Security” International Journal of Ambient Computing and Intelligence, pp 14-19

Shui Han, Jianchuan Xing, 2011 “Ensuring Data Storage Through A Novel Third Party Auditor Scheme in Cloud Computing” IEEE computer science & Technology, pp 264-268

Dawn Song, Elaine Shi, 2012 “Cloud Data Protection for the Masses” IEEE Computer Society, pp 39-45

Deyan Chen, Hong Zhao, 2012” Data Security and Privacy Protection Issues in Cloud Computing” International Conference on Computer Science and Electronics Engineering, pp 647-651

Deepanchakaravarthi Purushothaman1 and Dr.Sunitha Abburu2 ,2012” An Approach for Data Storage Security in Cloud Computing” IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 2, No 1.

Dian-Yuan Han, Feng-qing Zhang, 2012 “Applying Agents to the Data Security in Cloud Computing” International Conference on Computer Science and Information Processing(CSIP), pp 1126-1128

Dr Nashaat el-Khameesy,Hossam Abdel Rahman, 2012 “A Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems” vol-3

Simarjeet Kaur, 2012 “VSRD-IJCSIT, Vol. 2 (3), 2012, 242-249. Cryptography and Encryption In Cloud Computing, pp 242-249

Young-Gi Min, Hyo-Jin Shin and Young-Hwan Bang, 2012 “Cloud Computing Security Issues and Access Control Solutions” Journal of Security Engineering, pp 135-140

Yu, Z., Wang, C., Thomborson, C., Wang, J., Lian, S., & Vasilakos, A. V. (2012). A novel watermarking method for software protection in the cloud. Software: Practice and Experience, 42(4), 409-430.

Ankur Mishra, Ruchita Mathur, Shishir Jain, Jitendra Singh Rathore, 2013 “Cloud Computing Security” International Journal on Recent and Innovation Trends in Computing and Computation, pp 36-39

Bhavna Makhija, Vinit Kumar Gupta, 2013 “Enhanced Data Security in Cloud Computing with Third Party Auditor”, International Journal of Advanced Research in Computer Science and Software Engineering, pp 341-345

Barron, C., Yu, H., & Zhan, J., 2013 “Cloud Computing Security Case Studies and Research”. Proceedings of the World Congress on Engineering 2013 Vol II

Sanjoli Singla, Jasmeet Singh, 2013 “Cloud Data Security using Authentication and Encryption Technique” International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 7, July 2013, pp 2232-2235

Punithasurya K, Esther Daniel, Dr. N. A. Vasanthi, 2013 “A Novel Role Based Cross Domain Access Control Scheme for Cloud Storage” International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 3, March 2013, pp 942-946

Vimmi Pandey, 2013 “Securing the Cloud Environment Using OTP” International Journal of Scientific Research in Computer Science and Engineering vol-1, Issue-4

Anjana Chaudhary, Ravinder Thakur, Manish Mann, 2014 "Security in Cloud Computing by using Homomorphic Encryption Scheme with Diffie-Hellman Algorithm "International Journal of Advanced Computational Engineering and Networking Volume-2, Issue-10, Oct-2014, pp 2320-2106

Peidong Sha, Zhixiang Zhu, 2016 "The Modification of RSA algorithm to Adapt Fully Homomorphic Encryption Algorithm in Cloud Computing" IEEE CCIS2016

Matlab Tutorial by Tutorials Point https://www.tutorialspoint.com/matlab/matlab_overview.htm

Will Garner “Diffie-Hellman Key Exchange” ppts.

Downloads

Published

2025-11-13
CITATION
DOI: 10.26438/ijcse/v6i5.215220
Published: 2025-11-13

How to Cite

[1]
A. Negi and A. Goyal, “Optimizing Fully Homomorphic Encryption Algorithm using RSA and Diffie- Hellman Approach in Cloud Computing”, Int. J. Comp. Sci. Eng., vol. 6, no. 5, pp. 215–220, Nov. 2025.

Issue

Section

Research Article