1. NATIONAL CONFERENCE ON COMPUTATIONAL
INTELLIGENCE SYSTEMS
2023
DEPARTMENT OF INFORMATION TECHNOLOGY
Homomorphic Encryption of
Pharmaceutical Data
Guide Name :
Ms. Kavitha V, M.Tech.
Team Members :
Murugalakshmi V(31111205303)
Nishaanth N K (311119205034)
Stephan Raj M (311119205057)
2. ABSTRACT
● Vast amounts of sensitive and confidential information is generated by the
pharmaceutical industry in the form of medicine formulas, employee
information, medical records. The industry needs to ensure that their information
is kept secure from cybercrime.
● Pharmaceutical industries is a domain where there are high chances of security
breaches and applying Homomorphic Encryption can help minimize them.
● We aim to design a working system that deals with such information the
Homomorphic way. We try to implement a web-application that allows
employees of a particular pharmaceutical company to update sensitive data
homomorphically that’s stored on the cloud or database server.
3. NEED ANALYSIS
● The Pharmaceutical industry needs to ensure that their information is kept secure from
cybercrime. Cyber criminals can have devastating effects on the pharmaceutical industry
by accessing or destroying their information.
● Due to these reasons it has become mandatory for the pharmaceutical industry to develop
an Information Security Management system.
● We implement a web-application that allows employees of a particular pharmaceutical
company to update sensitive data homomorphically that’s stored on the cloud or database
server. Here the employee on a daily basis updates the amount of particular components
used, through the web portal which is reflected on the data stored in the databases
homomorphically
4. LITERATURE SURVEY
S.NO TITLE,METHOD,AUTHOR NAME&
MONTH,YEAR
ADVANTAGES DISADVANTAGES
1 Segundo Moisés Toapanta,Javier Gonzalo Ortiz
Rojas“A Homomorphic Encryption Approach in
a Voting System in a Distributed Architecture”
OCT 2020.
Homomorphic encryption
provides high-level security
to the data being transmitted
in electronic voting systems.
This ensures that the data is
not tampered with or
compromised during
transmission.
Homomorphic encryption
may not be compatible with
all electronic voting systems
or platforms. This may limit
the adoption of this
technology in some cases.
2 A. B. Levina; V. Y. Kadykov; D. I. Kaplun“ New
direction in Cryptography: Homomorphic
Encryption“date of publication OCT 2, 2021
It can be applied to various
use cases, including data
storage, sharing, and
processing.
Only described the
mathematical concept and
theory of homomorphic
encryption
5. 3 Chiara Marcolla; Victor Sucasas; Marc Manzano;
Riccardo Bassoli“Survey on Fully Homomorphic
Encryption, Theory, and Applications”4 oct 2022
It consequently covers design
fundamentals and security
properties of
FHE and describes the main
FHE schemes based on
various mathematical
problems.
FHE is a complex and
computationally intensive
process, requiring significant
computational resources to
perform even simple
computations.
4 Yuanting Lu;Weiwei Zhang;Lingming Cao,Data
Security Encryption Method Based on Improved
AES Alogorithm ,2022 Global Reliability and
Prognostics and Health Management (PHM-
Yantai) Year: 2022
The proposed improved AES
algorithm can enhance the
security of data encryption
by incorporating additional
security features.
The paper does not present
any real-world testing or
performance analysis of the
proposed algorithm, making
it unclear how it performs in
practice.
5 Das, Debasis. "Secure cloud computing
algorithm using homomorphic encryption and
multi-party computation." 2020 International
Conference on Information Networking
(ICOIN). IEEE, 2020.
It allows multiple parties to
jointly perform computation
on encrypted data without
compromising the privacy of
data owners.
The paper does not provide a
detailed analysis of the
security of the proposed
algorithm against various
attacks.
6. 6 Abu Musa;Ashiq Mahmood “Client-side
Cryptography Based Security for Cloud
Computing System” , 2021 International Conference
on Artificial Intelligence and Smart Systems (ICAIS)
,Year: 2021.
With the use of symmetric
key encryption, the data
uploaded on the cloud is
secured with an extra layer of
protection. This makes it
difficult for unauthorized
users to access or tamper with
the data.
Symmetric key encryption
requires the management of
keys, which can be
challenging for large
organizations.
7 K Roopa; B S Gokul; S Kaushik Arakalgud “Use
case of Paillier Homomorphic Algorithm for
Electronic-Voting Systems” published on 11
december 2021.
The proposed e-voting system
using Paillier cryptosystem
provides enhanced security
for online voting, ensuring
that the integrity and
confidentiality of votes are
maintained.
An e-voting system based on
Paillier cryptosystem may
require additional security
measures to prevent potential
attacks, such as insider attacks
or denial-of-service attacks.
8 R. Sendhil; A. Amuthan “A Descriptive Study on
Homomorphic Encryption Schemes for Enhancing
Security in Fog Computing”International conference
published on Sep 2020
Homomorphic encryption can
be used in Fog Computing to
ensure that data is secure
when being processed on edge
devices.
Key management involves
secure key distribution and
periodic key rotation, which
can be time-consuming and
costly.
7. 9 Saja J. Mohammed; Dujan B. Taha “Performance
Evaluation of RSA, ElGamal, and Paillier Partial
Homomorphic Encryption Algorithms” conference
paper published on 25 April 2022
providing a comprehensive
comparison of different
homomorphic encryption
algorithms in terms of
performance, such as
encryption and decryption
time, key sizes, memory
usage, and throughput.
the paper may not provide
insights into the practical
implementation of these
algorithms, such as their
vulnerabilities to attacks or
their compatibility with
existing systems.
10 Wejdan Alsuwat1 and Hatim Alsuwat 1 “A Survey
on Cloud Storage System Security via Encryption
Mechanisms”.IJCSNS International Journal of
Computer Science and Network Security,June
2022
The paper covers various
encryption mechanisms that
are used to secure cloud
storage systems, such as
symmetric and asymmetric
key encryption, homomorphic
encryption, and proxy re-
encryption.
No practical implementation
on cloud security.
13. CONCLUSION
We were able to implement Homomorphic operations as intended in a working prototype.
As discussed above, we designed an application that allows employees of a particular
pharmaceutical company to update sensitive data on the server cloud/database without
decrypting any part of the encrypted data that is stored on the cloud/database. Since keys
play an important role in carrying out these Homomorphic operations it was important to
secure these keys which were unique to all the users accessing the application. For that, we
designed a secure key generation and storage functionality which stored the keys on the
server in its encrypted form and were only accessible based on login credentials which in
itself were unique, hence adding an additional layer of security to the application.
14. REFERENCES
[1]Segundo Moisés Toapanta,Javier Gonzalo Ortiz Rojas“A Homomorphic Encryption Approach in a Voting System in
a Distributed Architecture” OCT 2020.
[2]A. B. Levina; V. Y. Kadykov; D. I. Kaplun“ New direction in Cryptography: Homomorphic Encryption“date of
publication OCT 2, 2021
[3]Nassar, Mohamed, Abdelkarim Erradi, and Qutaibah M. Malluhi. "Paillier's encryption: Implementation and
cloud applications." 2020 International Conference on Applied Research in Computer Science and Engineering
(ICAR). IEEE, 2020..
[4]Chiara Marcolla; Victor Sucasas; Marc Manzano; Riccardo Bassoli “Survey on Fully Homomorphic Encryption,
Theory, and Applications”4 oct 2022.
[5] Yuanting Lu;Weiwei Zhang;Lingming Cao,Data Security Encryption Method Based on Improved AES Alogorithm ,2022
Global Reliability and Prognostics and Health Management (PHM-Yantai) Year: 2022
15. [6] Saja J. Mohammed; Dujan B. Taha “Performance Evaluation of RSA, ElGamal, and Paillier Partial Homomorphic
Encryption Algorithms” conference paper published on 25 April 2022
[7] K Roopa; B S Gokul; S Kaushik Arakalgud “Use case of Paillier Homomorphic Algorithm for Electronic-Voting
Systems” published on 11 december 2021.
[8] Wejdan Alsuwat1 and Hatim Alsuwat 1 “A Survey on Cloud Storage System Security via Encryption
Mechanisms”.IJCSNS International Journal of Computer Science and Network Security,June 2022
[9] Das, Debasis. "Secure cloud computing algorithm using homomorphic encryption and multi-party
computation." 2020 International Conference on Information Networking (ICOIN). IEEE, 2020.
[10] Abu Musa;Ashiq Mahmood “Client-side Cryptography Based Security for Cloud Computing System” , 2021
International Conference on Artificial Intelligence and Smart Systems (ICAIS) ,Year: 2021.