INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND MATHEMATICAL THEORY (IJCSMT )
E-ISSN 2545-5699
P-ISSN 2695-1924
VOL. 10 NO. 6 2024
DOI: 10.56201/ijcsmt.v10.no6.2024.pg73.82
Asimini-Hart K. Roseline, Nuka D. Nwaibu, Onate E. Taylor, and V.I.E Anireh
In the era of cloud computing and big data, ensuring secure and efficient data storage is paramount. Storage Area Networks (SAN) play a critical role in providing high-speed data access; however, they face significant challenges related to time complexity in encryption processes. Traditional encryption methods often compromise performance, leading to increased latency and inefficiencies. This study addresses these issues by proposing an Enhanced Homomorphic Encryption (EHE) model that integrates a camouflage process and a substitution-based key generation method. The EHE model not only enhances data security but also optimizes encryption and decryption times. Experimental results reveal that EHE significantly outperforms both RivestShamir-Adleman (RSA) and standard Homomorphic Encryption (HE) techniques, achieving a processing time reduction of 11 seconds compared to 12 seconds for RSA and 250 seconds for HE. This research underscores the need for advanced encryption methodologies in modern computing environments and recommends further exploration of EHE’s applications in various data security contexts.
[1] An-Ping, X., Gan, Q., He, X., & Zhao,Q. (2013) A searchable encryption of CP-ABE scheme
in cloud storage, 10th International Computer Conference on Wavelet Active Media Technology
and Information Processing (ICCWAMTIP), 345-349.
[2] Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson,
D., Rabkin, A., Stoica, I., & Zaharia, M. (2010). A view of cloud computing. Communications of
the ACM, 53(4), 50-58.
[3] Belland, M., Xue, W., Kurdi, M., & Chu, W. (2017). Somewhat Homomorphic Encryption.
Retrieved from https://courses.csail.mit.edu/6.857/2017/ project/22 .pdf on the 10th of August
[4] Biksham, V., & Vasumathi, D. (2017). Homomorphic Encryption Techniques for securing Data
in Cloud Computing: A Survey. International Journal of Computer Applications, 160 (6), 1-6.
[5] Carroll, M., Van der, M., Alta, D., & Kotze, P. (2011). Secure cloud computing: Benefits, risks
and controls. 1-9, 10.1109/ISSA.2011.6027519.
[6] Cheon, J. H., Kim, A., Kim, M., and Song, Y. (2017). Homomorphic Encryption for Arithmetic
of Approximate Numbers. In Advances in Cryptology – ASIACRYPT 2017, (Lecture Notes in
Computer Science), 10624, 409–437.
[7[ Daniya, R., Deepak, P., & Kamal V. (2016). Homomorphic Hybrid Encryption for Cloud
Computing, International Journal of Advanced Research in Computer and Communication
Engineering, 5 (5), 502 -511.
[8] Jian, L., Danjie, S., Chen, S., & Lu, X. (2012). A Simple Fully Homomorphic Encryption
Scheme Available in Cloud Computing, IEEE 2nd International Conference, 01, 214 - 217.
[9] Johnson, T., Smith, L. & Davis, M. (2015). Modern approaches to storage networking. Journal
of Network Infrastructure, 15(4), 120-135.
[10] Joshi, R., & Renuka, k. (2015). Network Security with Cryptography, International Journal
of Computer Science and Mobile Computing, 4(1), 201-204.
[11] Kranti, M., Chaudhari, P., & Megha, V. (2015). A Survey on Various Cryptographic
Algorithms for Security Enhancement, International Journal of Computer Applications, 110(7),
112-119.
[12] Parsi, K. (2012). Data Security in Cloud Computing using RSA Algorithm, International
Journal of Research in Computer and Communication technology, 1(4), 1112-1119.
[13] Sadasivarao, K., Kumar, S. & Reddy, P. (2003). Defining storage networks in modern systems.
Network Technology, 8(2), 55-70.
[14] Smart, N., & Vercauteren, F. (2010). Fully Homomorphic Encryption with Relatively Small
Key and Ciphertext Sizes. In: Public Key Cryptography - Proceedings of the 13th International
Conference on Practice and Theory in Public Key Cryptography
[15] Takabi, H., & Joshi, J. (2010). Security and Privacy Challenges In Cloud Computing
Environment, Security & Privacy, IEEE, 8(6), 71-79.
[16] Tanenebaum, A.S. & Wetherall, O.J. (2011). Computer networks (5th ed.). Pearson Education.
[17] Vahid, A., & Seyed, R. (2012). Security Threats and Countermeasures In Cloud Computing,
International Journal of Application or Innovation in Engineering & Management, 1 (2), 657-665.
[18] Zhen-Zhong M. (2014). Research of Information Retrieval in the Cloud Computing
Environment. 7th International Conference on Intelligent Computation Technology and
Automation. 32-41.