INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND MATHEMATICAL THEORY (IJCSMT )
E-ISSN 2545-5699
P-ISSN 2695-1924
VOL. 11 NO. 2 2025
DOI: 10.56201/ijcsmt.v11.no2.2025.pg106.126
Manga, O Sarjiyus, RB Jean
Finding a balance between effective data compression and strong security is still a major challenge as data processing and storage move more and more to cloud services. Conventional compression methods maximize storage capacity but sometimes overlook security, leaving private information vulnerable to attacks. This paper investigates how text compression and Fully Homomorphic Encryption (FHE) can be combined in safe cloud computing settings. The goal of the project is to provide a framework that improves data recovery methods for compressed and encrypted data in the cloud, as well as a novel model that achieves optimal lossless compression while upholding robust data security. The results show that larger files have lower compression ratios and less redundancy; for example, a 10 KB file compresses 50% of its size, while a 1000 KB file only reduces by 29%. This illustrates how redundancy-based compression loses effectiveness when dealing with bigger datasets. The work supports earlier findings on the computational cost of FHE by highlighting its large computational overhead, where encryption and decryption durations dramatically increase with text size. Hybrid encryption models that combine symmetric and asymmetric encryption may offer a better balanced approach to efficiency and security, according to a comparison of FHE and conventional cryptographic compression techniques. Furthermore, the observed drop in compression ratios from 0.6 for 1 KB files to 0.29 for 1000 KB files is consistent with entropy-based encoding methods such as Huffman coding and Lempel-Ziv compression. The paper highlights that because of its high computational cost, standalone FHE is still not feasible for real-time secure applications. Future research should concentrate on improving FHE schemes, investigating parallelized implementations, and creating hybrid encryption models to lessen performance constraints in secure cloud computing, even though FHE
Secure, Data Compression, Recovery, Cloud Computing Homomorphic Encryption
Ahmad, I., Choi, W., & Shin, S. (2023). Comprehensive Analysis of Compressible Perceptual
Encryption Methods Compression and Encryption Perspectives. Sensors, 23(8), 4057.
Ahmed, N., Natarajan, T., & Rao, K. R. (1974). Discrete cosine transform. IEEE Transactions on
Computers, C-23(1), 90–93.
Aina, S. A., Adeniran, A. O., & Tunde, A. I. (2024). The impact of cloud computing on business
agility: A case study approach. International Journal of Cloud Computing and Services
Science, 13(1), 27-39.
Alasmari, S. (2022). User Centered Security Service Level Agreement Enforcement Mechanisms
(Doctoral dissertation, The University of North Carolina at Charlotte).
Amazon Web Services. (2021). Collaborate with AWS Research and Academic Partners.
Amazon Web Services. (2021). Shared responsibility model.
https://aws.amazon.com/compliance/shared-responsibility-model/
Baritha, K., & Bhatia, R. (2023). A Systematic Review of Homomorphic Encryption and Its
Contributions in Healthcare Industry. Complex & Intelligent Systems.
Begum, M. B., Deepa, N., Uddin, M., Kaluri, R., Abdelhaq, M., & Alsaqour, R. (2023). An
efficient and secure compression technique for data protection using burrows-wheeler
transform algorithm. Heliyon.
Bohn, R. B., Messina, J. V., & Liu, F. (2021). The NIST Cloud Federation Reference Architecture.
National Institute of Standards and Technology Special Publication, 500-332.
Brakerski, Z., & Vaikuntanathan, V. (2011). Efficient fully homomorphic encryption from
(standard) LWE. In Proceedings of the 2011 IEEE 52nd Annual Symposium on
Foundations of Computer Science (FOCS '11) (pp. 97–106).
Chen, Y., Zhang, X., & Li, W. (2023). Enhancing Cloud Security with Homomorphic Encryption:
Addressing Latency and Data Processing Efficiency. International Journal of Cloud
Computing, 15(2), 101-119.
Choudhary, S., & Singh, S. (2022). Cloud Computing Architecture: A Comprehensive Survey.
International Journal of Computer Applications, 184(1), 1–7.
Exploding Topics. (2024). Cloud computing trends in 2024: What to expect.
Flinn, J. (2022). Cyber foraging: Bridging mobile and cloud computing. Springer Nature.
Gao, H., & Wang, R. (2023). Cloud Computing Security: User Trust and Confidentiality in Data
Storage and Transmission. Journal of Cloud Technology and Applications, 12(1), 67-85.
Gentry, C. (2009). Fully homomorphic encryption using ideal lattices. In Proceedings of the 41st
annual ACM symposium on Theory of computing (STOC '09) (pp. 169–178).
Ghobaei-Arani, M., Yari, M., & Rajabion, L. (2021). Cloud computing security vulnerabilities: A
systematic analysis. Journal of Information Security and Applications, 61, 102907.
Grasso, I., & Gallo, G. (2023). Hybrid Compression Techniques for Efficient Multimedia Data
Storage and Transmission. Multimedia Tools and Applications, 82(1), 123–145.
Haris, M. A., Noor, N. S., & Saleh, R. (2024). Exploring security challenges in cloud computing
environments: A systematic review. International Journal of Information Security, 23(1),
99-116.
Huang, S. Y., Chen, C. L., & Lee, J. Y. (2023). NIST's service-based model: Implications for cloud
computing security. Cloud Computing Advances, 12(4), 234-245.
Huffman, D. A. (1952). A method for the construction of minimum-redundancy codes.
Proceedings of the IRE, 40(9), 1098–1101.
Kindervag, J. (2010). No more chewy centers: Introducing the zero-trust model of information
security. Forrester Research.
Kishore, T. K., & Guruprakash, C. D. (2019). A secure cloud storage retrieval using cost based
iterative deepening depth-first search algorithm. International Journal of Engineering and
Advanced Technology, 9(2), 2249–8958.
Kumar, S., & Singh, R. (2024). Enhancing Data Security Using Hybrid Cryptographic Techniques:
A Study on Vigenère and Polybius Ciphers. Journal of Information Security and
Applications, 65, 103–118.
Kumar, S., Gupta, R., & Sharma, P. (2021). Trust and Privacy in Cloud-Based Data Services:
Risks and Mitigation Techniques. Cloud Security Journal, 8(3), 45-63.
Lee, H., & Choi, J. (2022). User-Centric Security in Cloud Services: Balancing Usability and
Confidentiality. Journal of Internet Security, 29(4), 289-302.
Lin, Q., Zhao, J., & Wang, F. (2021). Homomorphic Encryption for Secure Data Processing in
Cloud Environments. Advances in Cryptographic Research, 14(3), 159-175.
Liu, X., Yang, G., Susilo, W., Tonien, J., Liu, X., & Shen, J. (2020). Privacy-preserving multi-
keyword searchable encryption for distributed systems. IEEE Transactions on Parallel and
Distributed Systems, 32(3), 561-574.
Mukherjee, A., & Zhang, L. (2020). Data Compression and Security in Cloud Computing:
Integrating Homomorphic Encryption. Journal of Computer Science and Cloud
Technology, 7(4), 225-243.
Munjal, K., & Bhatia, R. (2022). Analysing RSA and Paillier Homomorphic Property for Security
in Cloud. Procedia Computer Science, 215, 240–246.
Nayyar, A. (2021). Handbook of Cloud Computing: Basic to Advance research on the concepts
and design of Cloud Computing. BPB Publications.
Petrenko, S., Petrenko, A., & Petrenko, E. (2021). Lattice-Based Cryptography for IoT in a
Quantum World: Are We Ready? IEEE Access, 9, 97065–97081.
Qureshi, M. B., Qureshi, M. S., Tahir, S., Anwar, A., Hussain, S., Uddin, M., & Chen, C. L. (2022).
Encryption Techniques for Smart Systems Data Security Offloaded to the Cloud.
Symmetry, 14(4), 695.
Rivest, R. L., Adleman, L., & Dertouzos, M. L. (1978). On data banks and privacy
homomorphisms. In Foundations of secure computation (pp. 169–180). Academic Press.
Seth, B., Dalal, S., Jaglan, V., Le, D.-N., Mohan, S., & Srivastava, G. (2022). Integrating
encryption techniques for secure data storage in the cloud. Transactions on Emerging
Telecommunications Technologies, 33(4), e4108.
Shafiq, D. A., Jhanjhi, N. Z., Abdullah, A., & Alzain, M. A. (2021). A load balancing algorithm for
the data centres to optimize cloud computing applications. IEEE Access, 9, 41731-41744.
Shannon, C. E. (1948). A mathematical theory of communication. The Bell System Technical
Journal, 27(3), 379–423.
Singh, R., & Kapoor, P. (2020). Building User Trust in Cloud-Based Services: Security Strategies
and Frameworks. Journal of Cybersecurity and Data Protection, 5(2), 94-110.
Sunyaev, A., (2020). Cloud computing. Internet Computing: Principles of Distributed Systems and
Emerging Internet-Based Technologies, 195-236.
Thakur, D., Gupta, R., & Jain, A. (2023). Scalability and reliability in cloud computing. Cloud
Computing Advances, 12(4), 234-245. Link to journal
Trivedi, D., & Patel, S. (2024). Homomorphic Encryption: A Survey on Methods and Applications
in Secure Data Processing. Journal of Information Security and Applications, 66, 104–120.
Varghese, B., & Buyya, R. (2021). Next generation cloud computing: New trends and research
directions. Journal of Cloud Computing, 10(1), 1–20.
Venu, S., Reddy, P. V. G. D., & Kumar, K. S. (2022). Multi-party Computation Enables Secure
Polynomial Control Based on Secret Sharing. arXiv preprint arXiv:2103.16335.
Wang, Y., Zhao, T., & Lin, J. (2021). A Comparative Study on Cloud Data Security Solutions:
Homomorphic Encryption and User-Centric Models. International Journal of Secure
Computing, 13(2), 134-149.
Yang, P., Xiong, N. N., & Ren, J. (2020). Data Security and Privacy Protection for Cloud Storage:
A Survey. IEEE Access, 8, 131723–131740.
Yao, A. C. (1982). Protocols for secure computations. In Proceedings of the 23rd Annual
Symposium on Foundations of Computer Science (FOCS '82) (pp. 160–164).
Yee, C. K., & Zolkipli, M. F. (2021). Review on confidentiality, integrity and availability in
information security. Journal of Information and Communication Technology in
Education, 8(2), 34-42.
Zhou, Y., Chen, T., & Liu, H. (2023). Cloud data breach incidents