SlideShare a Scribd company logo
1 of 14
CLOUD BANKING
DEVELOPMENT BASED ON
FULLY HOMOMORPHIC
ENCRYPTION
IHSAN JABBAR
SUPERVISERS:
PROF. SAAD ALSAAD
PROF. RADHI A. ZABOON
INTRODUCTION
• Nowadays technological advances indicate a dramatic growth of digital content.
• This explosion of the digital universe continues to increase the demand for new
storage and network utilities, along with an increasing need for more cost-effective
usage of storage capacities and network bandwidth for data transfer.
• The use of remote storage systems is gaining an expanding interest, namely the
cloud storage based services, since they provide profitable architectures.
• These architectures support the transmission, storage, and intensive computation of
outsourced data in a pay per use business model.
• Cloud computing is an appropriate solution for enterprises looking for flexible,
economic and feasible computing services for their daily activities
• Storage is an example of a cloud computing service, whereby users can store their
data that is maintained by a cloud service provider (CSP).
PROBLEM STATEMENT
• The main issue associated with a cloud storage service is security regarding
data privacy and confidentiality since data security is an important aspect of a
good-quality storage service.
• Cloud users do not have full control over their data, thus, cloud computing is
not fully trustable.
• The risks of personal privacy protection and data leakage are the main concerns
of individuals and enterprises before migrating their data to cloud storage
• Therefore, they are required to save an encrypted version of user’s data on their
storage.
• When cloud user wants to perform some computations on encrypted data, data
should be decrypted.
• Homomorphic encryption allows to perform computations directly on encrypted
data
WHAT IS HOMOMORPHIC ENCRYPTION
Homomorphic encryption systems are used to perform operations on encrypted
data without knowing the private key (without decryption), the client is the only
holder of the secret key. When we decrypt the result of any operation, it is the
same as if we had carried out the calculation on the raw data.
TYPES OF HOMOMORPHIC ENCRYPTION
TYPES OF HOMOMORPHIC ENCRYPTION
• All of PHE schemes allow homomorphic computation of only one operation,
either addition or multiplication, on encrypted date, except the boneh-goh-
nissim scheme which supports performing unlimited number of addition
operation but only one multiplication (SHE).
• The constructing of a scheme that allows one to compute arbitrary computation
(a scheme should allow an unlimited number of both addition and multiplication
operations) over encrypted data has remained a central open problem in
cryptography for more than 30 years and thought to be impossible until 2009,
when craig gentry proposed the first plausible construction of a fully
homomorphic scheme (FHE).
FULLY HOMOMORPHIC ENCRYPTION
• Fully homomorphic encryption (FHE) is the most sophisticated homomorphic
encryption scheme which allows to evaluate arbitrary functions on ciphertexts.
FULLY HOMOMORPHIC ENCRYPTION AND
CLOUD
• Cloud computing is the umbrella term for delivering services via the internet. It
enables enterprises and individuals to access services such as virtual machines,
storage, or applications on demand.
• In order to solve the problem of data security in cloud computing system, fully
homomorphic encryption can be used.
FULLY HOMOMORPHIC ENCRYPTION AND
CLOUD
BANK SERVICES IN THE CLOUD
• The use of cloud services for banks is considered a dangerous matter to some
extent because to this day storing data on the cloud is not considered a safe
matter because when the data is uploaded to the cloud, control over customer
data (such as account numbers, deposits, etc.) is lost.
• But on the other hand, there are many reasons makes banks and other
institutions to use cloud services, whether public or private, including
scalability, agility and saving many costs, but these benefits come with risks
related to data security, you should consider these risks when using cloud
services.
• Fully homomorphic encryption can be used to encrypt bank users data, besides
it allows to perform arbitrary computations on these date.
RELATED WORK
• Rivest et al. (1978) proposed first homomorphic encryption schema and were
partially homomorphic encryption (PHE).
• A fully homomorphic encryption (FHE) scheme suggested by Gentry (2009),
which allows calculating of any number of addition and multiplication, hence
compute arbitrary functions of encrypted data. Nevertheless, the scheme was
based on Somewhat Homomorphic Encryption (SWHE), which increases the
length and noise of ciphertext when calculation performs on the ciphertext.
• Consequently, van Dijk et al. (2010) have introduced FHE scheme that used
elementary modular arithmetic and used Gentry’s techniques to convert SWHE
cryptosystem to FHE scheme.
RELATED WORK CONT…
• In addition, smart and vercauteren (2010) have presented an improved version
of smart- vercauteren encryption schema. This schema was allowed several
times decrease the ciphertext and keys lengths.
• Moreover, a HE scheme which is security dependent on the hardness of large
integer factorization has been proposed by Xiao et al. (2012).
• Alattas and Elleithy (2013) have presented the application of algebraic
homomorphic encryption mechanism and it was aiming at enhancing its
security.
• In addition, IBM has released a software package named HElib in 2013.
RELATED WORK CONT…
• Hayward and chiang (2015) have improved gentry’s encryption in parallel processing
and they have tested it in a private cloud domain.
• Moreover, SAM which is an FHE scheme over integers has been implemented by
shihab and makki (2018).
• Mert et al. (2020) presented two hardware architectures optimized for accelerating
the encryption and decryption operations of the BFV/HE scheme with high
performance polynomial multipliers.
• Mohammed and Abed (2020) proposed a novel framework and an algorithm for
securing cloud data at rest.
• Despite all the works presented previously, the randomness and robustness of the
secret keys remain an open problem in the area of FHE.
REFRENCES
• Acar A, aksu H., Uluagac A.S. And conti, M., 2018. A survey on homomorphic encryption schemes: theory and
implementation. ACM computing surveys, 51(4), PP -35.
• Cheon J choe lee D. Andson 2019. Faster linear transformations in helib, revisited. IEEE access 7 pp50595-50604.
• Gentry, C., 2009. Fully Homomorphic Encryption Using Ideal Lattices. In: Proceedings of the 41st Annual ACM
Symposium on Symposium on Theory of Computing STOC ’09, Bethesda, Maryland, USA.
• Li song DE chen sand lux, 2012. Simple fully homomorphic encryption scheme available in cloud computing. In:
2012 IEEE 2nd international conference on cloud computing and intelligence systems, hangzhou, china.
• Mohammed and abed, 2020. A symmetric based framework for securing cloud data at rest. Turkish journal of
electrical engineering and computes sciences 28®1© pp 347-361.
• RIVEST, R.L.; ADLEMAN, L. AND DERTOUZOS, M.L., 1978. ON DATA BANKS AND PRIVACY HOMOMORPHISMS. IN:
FOUNDATIONS OF SECURE COMPUTATION. ACADEMIA PRESS, CAMBRIDGE MASSACHUSETTS.PP169-179.
• SHIHAB, H. AND MAKKI, S., 2018. DESIGN OF FULLY HOMOMORPHIC ENCRYPTION BY PRIME MODULAR OPERATION.
TELFOR JOURNAL 102 PP118-122.
• VAN DIJK, M., GENTRY, C., HALEVI, S. AND VAIKUNTANATHAN, V., 2010. FULLY HOMOMORPHIC ENCRYPTION OVER
THE INTEGERS. ADVANCES IN CRYPTOLOGY EUROCRYPT, 2010 PP24-43.
• SMART, N. AND VERCAUTEREN, F., 2010. FULLY HOMOMORPHIC ENCRYPTION WITH RELATIVELY SMALL KEY AND
CIPHERTEXT SIZES. PUBLIC KEY CRYPTOGRAPHY, 2010, PP 420-443.

More Related Content

Similar to Oral.pptx

Cloud and Grid Computing
Cloud and Grid ComputingCloud and Grid Computing
Cloud and Grid ComputingLeen Blom
 
Trends in recent technology
Trends in recent technologyTrends in recent technology
Trends in recent technologysai krishna
 
EU H2020 PRISMACLOUD Project Overview
EU H2020 PRISMACLOUD Project OverviewEU H2020 PRISMACLOUD Project Overview
EU H2020 PRISMACLOUD Project OverviewPRISMACLOUD Project
 
Hybrid Clouds: “Silver Bullet” of the Cloud Computing?
Hybrid Clouds: “Silver Bullet” of the Cloud Computing?Hybrid Clouds: “Silver Bullet” of the Cloud Computing?
Hybrid Clouds: “Silver Bullet” of the Cloud Computing?Fabrizio Volpe
 
An Integrated Cloud Computing Architectural Stack
An Integrated Cloud Computing Architectural Stack An Integrated Cloud Computing Architectural Stack
An Integrated Cloud Computing Architectural Stack Zara Tariq
 
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Harnessing the Cloud for Securely...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Harnessing the Cloud for Securely...JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Harnessing the Cloud for Securely...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Harnessing the Cloud for Securely...IEEEGLOBALSOFTTECHNOLOGIES
 
Harnessing the cloud for securely outsourcing large
Harnessing the cloud for securely outsourcing largeHarnessing the cloud for securely outsourcing large
Harnessing the cloud for securely outsourcing largeIEEEFINALYEARPROJECTS
 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...ijsrd.com
 
Aes based secured framework for cloud databases
Aes based secured framework for cloud databasesAes based secured framework for cloud databases
Aes based secured framework for cloud databasesIJARIIT
 
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...1crore projects
 
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...1crore projects
 
deep neural networkmodel implementation over homomorphically encrypted data
deep neural networkmodel implementation over homomorphically encrypted datadeep neural networkmodel implementation over homomorphically encrypted data
deep neural networkmodel implementation over homomorphically encrypted dataKVENKATASRAVANI
 
Iaetsd enhancement of performance and security in bigdata processing
Iaetsd enhancement of performance and security in bigdata processingIaetsd enhancement of performance and security in bigdata processing
Iaetsd enhancement of performance and security in bigdata processingIaetsd Iaetsd
 
Insurtech, Cloud and Cybersecurity - Chartered Insurance Institute
Insurtech, Cloud and Cybersecurity -  Chartered Insurance InstituteInsurtech, Cloud and Cybersecurity -  Chartered Insurance Institute
Insurtech, Cloud and Cybersecurity - Chartered Insurance InstituteHenrique Centieiro
 
Cloud computing- Benefits,Future and Challenges
Cloud computing- Benefits,Future and Challenges Cloud computing- Benefits,Future and Challenges
Cloud computing- Benefits,Future and Challenges RohitKumar3153
 

Similar to Oral.pptx (20)

Cloud and Grid Computing
Cloud and Grid ComputingCloud and Grid Computing
Cloud and Grid Computing
 
Trends in recent technology
Trends in recent technologyTrends in recent technology
Trends in recent technology
 
EU H2020 PRISMACLOUD Project Overview
EU H2020 PRISMACLOUD Project OverviewEU H2020 PRISMACLOUD Project Overview
EU H2020 PRISMACLOUD Project Overview
 
Hybrid Clouds: “Silver Bullet” of the Cloud Computing?
Hybrid Clouds: “Silver Bullet” of the Cloud Computing?Hybrid Clouds: “Silver Bullet” of the Cloud Computing?
Hybrid Clouds: “Silver Bullet” of the Cloud Computing?
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
An Integrated Cloud Computing Architectural Stack
An Integrated Cloud Computing Architectural Stack An Integrated Cloud Computing Architectural Stack
An Integrated Cloud Computing Architectural Stack
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Harnessing the Cloud for Securely...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Harnessing the Cloud for Securely...JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Harnessing the Cloud for Securely...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Harnessing the Cloud for Securely...
 
Harnessing the cloud for securely outsourcing large
Harnessing the cloud for securely outsourcing largeHarnessing the cloud for securely outsourcing large
Harnessing the cloud for securely outsourcing large
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
 
Aes based secured framework for cloud databases
Aes based secured framework for cloud databasesAes based secured framework for cloud databases
Aes based secured framework for cloud databases
 
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
 
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
 
deep neural networkmodel implementation over homomorphically encrypted data
deep neural networkmodel implementation over homomorphically encrypted datadeep neural networkmodel implementation over homomorphically encrypted data
deep neural networkmodel implementation over homomorphically encrypted data
 
Ijariie1196
Ijariie1196Ijariie1196
Ijariie1196
 
Iaetsd enhancement of performance and security in bigdata processing
Iaetsd enhancement of performance and security in bigdata processingIaetsd enhancement of performance and security in bigdata processing
Iaetsd enhancement of performance and security in bigdata processing
 
Insurtech, Cloud and Cybersecurity - Chartered Insurance Institute
Insurtech, Cloud and Cybersecurity -  Chartered Insurance InstituteInsurtech, Cloud and Cybersecurity -  Chartered Insurance Institute
Insurtech, Cloud and Cybersecurity - Chartered Insurance Institute
 
C017421624
C017421624C017421624
C017421624
 
Cloud computing- Benefits,Future and Challenges
Cloud computing- Benefits,Future and Challenges Cloud computing- Benefits,Future and Challenges
Cloud computing- Benefits,Future and Challenges
 

Recently uploaded

GBSN - Microbiology (Unit 1)
GBSN - Microbiology (Unit 1)GBSN - Microbiology (Unit 1)
GBSN - Microbiology (Unit 1)Areesha Ahmad
 
Chromatin Structure | EUCHROMATIN | HETEROCHROMATIN
Chromatin Structure | EUCHROMATIN | HETEROCHROMATINChromatin Structure | EUCHROMATIN | HETEROCHROMATIN
Chromatin Structure | EUCHROMATIN | HETEROCHROMATINsankalpkumarsahoo174
 
Formation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksFormation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksSérgio Sacani
 
Physiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptxPhysiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptxAArockiyaNisha
 
Hire 💕 9907093804 Hooghly Call Girls Service Call Girls Agency
Hire 💕 9907093804 Hooghly Call Girls Service Call Girls AgencyHire 💕 9907093804 Hooghly Call Girls Service Call Girls Agency
Hire 💕 9907093804 Hooghly Call Girls Service Call Girls AgencySheetal Arora
 
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...ssifa0344
 
Chemistry 4th semester series (krishna).pdf
Chemistry 4th semester series (krishna).pdfChemistry 4th semester series (krishna).pdf
Chemistry 4th semester series (krishna).pdfSumit Kumar yadav
 
fundamental of entomology all in one topics of entomology
fundamental of entomology all in one topics of entomologyfundamental of entomology all in one topics of entomology
fundamental of entomology all in one topics of entomologyDrAnita Sharma
 
Natural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsNatural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsAArockiyaNisha
 
Animal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptxAnimal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptxUmerFayaz5
 
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...Sérgio Sacani
 
Disentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTDisentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTSérgio Sacani
 
Botany 4th semester series (krishna).pdf
Botany 4th semester series (krishna).pdfBotany 4th semester series (krishna).pdf
Botany 4th semester series (krishna).pdfSumit Kumar yadav
 
GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)Areesha Ahmad
 
Green chemistry and Sustainable development.pptx
Green chemistry  and Sustainable development.pptxGreen chemistry  and Sustainable development.pptx
Green chemistry and Sustainable development.pptxRajatChauhan518211
 
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPirithiRaju
 
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.Nitya salvi
 
VIRUSES structure and classification ppt by Dr.Prince C P
VIRUSES structure and classification ppt by Dr.Prince C PVIRUSES structure and classification ppt by Dr.Prince C P
VIRUSES structure and classification ppt by Dr.Prince C PPRINCE C P
 
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bAsymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bSérgio Sacani
 

Recently uploaded (20)

GBSN - Microbiology (Unit 1)
GBSN - Microbiology (Unit 1)GBSN - Microbiology (Unit 1)
GBSN - Microbiology (Unit 1)
 
Chromatin Structure | EUCHROMATIN | HETEROCHROMATIN
Chromatin Structure | EUCHROMATIN | HETEROCHROMATINChromatin Structure | EUCHROMATIN | HETEROCHROMATIN
Chromatin Structure | EUCHROMATIN | HETEROCHROMATIN
 
Formation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksFormation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disks
 
Physiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptxPhysiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptx
 
Hire 💕 9907093804 Hooghly Call Girls Service Call Girls Agency
Hire 💕 9907093804 Hooghly Call Girls Service Call Girls AgencyHire 💕 9907093804 Hooghly Call Girls Service Call Girls Agency
Hire 💕 9907093804 Hooghly Call Girls Service Call Girls Agency
 
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
 
Chemistry 4th semester series (krishna).pdf
Chemistry 4th semester series (krishna).pdfChemistry 4th semester series (krishna).pdf
Chemistry 4th semester series (krishna).pdf
 
fundamental of entomology all in one topics of entomology
fundamental of entomology all in one topics of entomologyfundamental of entomology all in one topics of entomology
fundamental of entomology all in one topics of entomology
 
Natural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsNatural Polymer Based Nanomaterials
Natural Polymer Based Nanomaterials
 
Animal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptxAnimal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptx
 
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
 
Disentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTDisentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOST
 
Botany 4th semester series (krishna).pdf
Botany 4th semester series (krishna).pdfBotany 4th semester series (krishna).pdf
Botany 4th semester series (krishna).pdf
 
GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)
 
CELL -Structural and Functional unit of life.pdf
CELL -Structural and Functional unit of life.pdfCELL -Structural and Functional unit of life.pdf
CELL -Structural and Functional unit of life.pdf
 
Green chemistry and Sustainable development.pptx
Green chemistry  and Sustainable development.pptxGreen chemistry  and Sustainable development.pptx
Green chemistry and Sustainable development.pptx
 
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
 
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
 
VIRUSES structure and classification ppt by Dr.Prince C P
VIRUSES structure and classification ppt by Dr.Prince C PVIRUSES structure and classification ppt by Dr.Prince C P
VIRUSES structure and classification ppt by Dr.Prince C P
 
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bAsymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
 

Oral.pptx

  • 1. CLOUD BANKING DEVELOPMENT BASED ON FULLY HOMOMORPHIC ENCRYPTION IHSAN JABBAR SUPERVISERS: PROF. SAAD ALSAAD PROF. RADHI A. ZABOON
  • 2. INTRODUCTION • Nowadays technological advances indicate a dramatic growth of digital content. • This explosion of the digital universe continues to increase the demand for new storage and network utilities, along with an increasing need for more cost-effective usage of storage capacities and network bandwidth for data transfer. • The use of remote storage systems is gaining an expanding interest, namely the cloud storage based services, since they provide profitable architectures. • These architectures support the transmission, storage, and intensive computation of outsourced data in a pay per use business model. • Cloud computing is an appropriate solution for enterprises looking for flexible, economic and feasible computing services for their daily activities • Storage is an example of a cloud computing service, whereby users can store their data that is maintained by a cloud service provider (CSP).
  • 3. PROBLEM STATEMENT • The main issue associated with a cloud storage service is security regarding data privacy and confidentiality since data security is an important aspect of a good-quality storage service. • Cloud users do not have full control over their data, thus, cloud computing is not fully trustable. • The risks of personal privacy protection and data leakage are the main concerns of individuals and enterprises before migrating their data to cloud storage • Therefore, they are required to save an encrypted version of user’s data on their storage. • When cloud user wants to perform some computations on encrypted data, data should be decrypted. • Homomorphic encryption allows to perform computations directly on encrypted data
  • 4. WHAT IS HOMOMORPHIC ENCRYPTION Homomorphic encryption systems are used to perform operations on encrypted data without knowing the private key (without decryption), the client is the only holder of the secret key. When we decrypt the result of any operation, it is the same as if we had carried out the calculation on the raw data.
  • 5. TYPES OF HOMOMORPHIC ENCRYPTION
  • 6. TYPES OF HOMOMORPHIC ENCRYPTION • All of PHE schemes allow homomorphic computation of only one operation, either addition or multiplication, on encrypted date, except the boneh-goh- nissim scheme which supports performing unlimited number of addition operation but only one multiplication (SHE). • The constructing of a scheme that allows one to compute arbitrary computation (a scheme should allow an unlimited number of both addition and multiplication operations) over encrypted data has remained a central open problem in cryptography for more than 30 years and thought to be impossible until 2009, when craig gentry proposed the first plausible construction of a fully homomorphic scheme (FHE).
  • 7. FULLY HOMOMORPHIC ENCRYPTION • Fully homomorphic encryption (FHE) is the most sophisticated homomorphic encryption scheme which allows to evaluate arbitrary functions on ciphertexts.
  • 8. FULLY HOMOMORPHIC ENCRYPTION AND CLOUD • Cloud computing is the umbrella term for delivering services via the internet. It enables enterprises and individuals to access services such as virtual machines, storage, or applications on demand. • In order to solve the problem of data security in cloud computing system, fully homomorphic encryption can be used.
  • 10. BANK SERVICES IN THE CLOUD • The use of cloud services for banks is considered a dangerous matter to some extent because to this day storing data on the cloud is not considered a safe matter because when the data is uploaded to the cloud, control over customer data (such as account numbers, deposits, etc.) is lost. • But on the other hand, there are many reasons makes banks and other institutions to use cloud services, whether public or private, including scalability, agility and saving many costs, but these benefits come with risks related to data security, you should consider these risks when using cloud services. • Fully homomorphic encryption can be used to encrypt bank users data, besides it allows to perform arbitrary computations on these date.
  • 11. RELATED WORK • Rivest et al. (1978) proposed first homomorphic encryption schema and were partially homomorphic encryption (PHE). • A fully homomorphic encryption (FHE) scheme suggested by Gentry (2009), which allows calculating of any number of addition and multiplication, hence compute arbitrary functions of encrypted data. Nevertheless, the scheme was based on Somewhat Homomorphic Encryption (SWHE), which increases the length and noise of ciphertext when calculation performs on the ciphertext. • Consequently, van Dijk et al. (2010) have introduced FHE scheme that used elementary modular arithmetic and used Gentry’s techniques to convert SWHE cryptosystem to FHE scheme.
  • 12. RELATED WORK CONT… • In addition, smart and vercauteren (2010) have presented an improved version of smart- vercauteren encryption schema. This schema was allowed several times decrease the ciphertext and keys lengths. • Moreover, a HE scheme which is security dependent on the hardness of large integer factorization has been proposed by Xiao et al. (2012). • Alattas and Elleithy (2013) have presented the application of algebraic homomorphic encryption mechanism and it was aiming at enhancing its security. • In addition, IBM has released a software package named HElib in 2013.
  • 13. RELATED WORK CONT… • Hayward and chiang (2015) have improved gentry’s encryption in parallel processing and they have tested it in a private cloud domain. • Moreover, SAM which is an FHE scheme over integers has been implemented by shihab and makki (2018). • Mert et al. (2020) presented two hardware architectures optimized for accelerating the encryption and decryption operations of the BFV/HE scheme with high performance polynomial multipliers. • Mohammed and Abed (2020) proposed a novel framework and an algorithm for securing cloud data at rest. • Despite all the works presented previously, the randomness and robustness of the secret keys remain an open problem in the area of FHE.
  • 14. REFRENCES • Acar A, aksu H., Uluagac A.S. And conti, M., 2018. A survey on homomorphic encryption schemes: theory and implementation. ACM computing surveys, 51(4), PP -35. • Cheon J choe lee D. Andson 2019. Faster linear transformations in helib, revisited. IEEE access 7 pp50595-50604. • Gentry, C., 2009. Fully Homomorphic Encryption Using Ideal Lattices. In: Proceedings of the 41st Annual ACM Symposium on Symposium on Theory of Computing STOC ’09, Bethesda, Maryland, USA. • Li song DE chen sand lux, 2012. Simple fully homomorphic encryption scheme available in cloud computing. In: 2012 IEEE 2nd international conference on cloud computing and intelligence systems, hangzhou, china. • Mohammed and abed, 2020. A symmetric based framework for securing cloud data at rest. Turkish journal of electrical engineering and computes sciences 28®1© pp 347-361. • RIVEST, R.L.; ADLEMAN, L. AND DERTOUZOS, M.L., 1978. ON DATA BANKS AND PRIVACY HOMOMORPHISMS. IN: FOUNDATIONS OF SECURE COMPUTATION. ACADEMIA PRESS, CAMBRIDGE MASSACHUSETTS.PP169-179. • SHIHAB, H. AND MAKKI, S., 2018. DESIGN OF FULLY HOMOMORPHIC ENCRYPTION BY PRIME MODULAR OPERATION. TELFOR JOURNAL 102 PP118-122. • VAN DIJK, M., GENTRY, C., HALEVI, S. AND VAIKUNTANATHAN, V., 2010. FULLY HOMOMORPHIC ENCRYPTION OVER THE INTEGERS. ADVANCES IN CRYPTOLOGY EUROCRYPT, 2010 PP24-43. • SMART, N. AND VERCAUTEREN, F., 2010. FULLY HOMOMORPHIC ENCRYPTION WITH RELATIVELY SMALL KEY AND CIPHERTEXT SIZES. PUBLIC KEY CRYPTOGRAPHY, 2010, PP 420-443.