Cloud cryptography: Impact on sme privacy through homomorphic encryption

Authors

DOI:

https://doi.org/10.51247/st.v8i2.554

Keywords:

Criptografía, cifrado homomórfico, datos en la nube, PYMES, Seguridad.

Abstract

Cryptographic systems in the cloud are studied in this review article. Focusing on homomorphic encryption and partially homomorphic cryptographic systems. Its applications, advantages, limitations and trends are analyzed; highlighting the ability of homomorphic encryption to process encrypted data, without the need to decrypt it and expose it to the cloud provider. The approach is aimed at the use of cryptographic technologies through cloud computing services, the protection and data security of critical information of SMEs and the challenges that they face due to lack of specialized technical personnel. Therefore, this article highlights the importance of increasing awareness and education in advanced cryptography among SMEs, to encourage their secure adoption of cloud solutions, through the development of internal competencies and collaboration with experts.

Downloads

Download data is not yet available.

References

Acharya, S., Manoj, K., & Gayana, M. N. (2021). “Enhanced Performance and Data Security using Elliptic Curve Cryptography in Cloud Environment,” in 2021 International Conference on Computational Performance Evaluation (ComPE). IEEE, 869–873. https://doi.org/10.1109/ComPE53109.2021.9751865

Agievich, S., Gorodilova, A., Kolomeec, N., Nikova, S., Preneel, B., Rijmen, V., . . . Vitkup, V. (2015). Problems, Solutions and Experience of the First International Student's Olympiad in Cryptography. Applied Discrete Mathematics, 1-23.

Al-Odat, Z. A., Al-Qtiemat, E. M., & Khan, S. U. (2020). “An Efficient Lightweight Cryptography Hash Function for Big Data and IoT Applications,” in 2020 IEEE Cloud Summit. IEEE, 66-71. https://doi.org/10.1109/IEEECloudSummit48914.2020.00016

Alvarez, R., Santonja, J., & Zamora, A. (2014). Hacia la seguridad criptográfica en sistemas DaaS. RECSI, 297-240.

Alves, M. R., Criptográficos, M. A., & López, J. (2014). Aplicação Conceitual de Criptografia Homomórfica.

Armknecht, F., Katzenbeisser, S., & Peter, A. (2010). Group Homomorphic Encryption Characterizations, Impossibility Results, and Applications. Designs, codes and cryptography, 1-24.

Bilar, G. R. (2015). Classificação, implementação e desempenho de esquemas totalmente homomórficos sobre números inteiros e suas melhorias. JADI, 7-12.

Bilar, G. R., Dos Santos, L. C., & Pereira, F. D. (2015). Classificação, implementação e desempenho de esquemas totalmente homomórficos sobre números inteiros e suas melhorias. Researchgate.

Boné, D., Goh, E.-J., & Nissim, K. (2005). Evaluating 2-DNF formulas on ciphertexts. In Theory of Cryptography Conference, 325-341.

Brakerski, Z., & Vaikuntanathan, V. (2014). Efficient fully homomorphic encryption from (standard) LWE. SIAM Journal on Computing, 831-871.

Brakerski, Z., Gentry, C., & Vaikuntanathan, V. (2014). (Leveled) fully homomorphic encryption without bootstrapping. ACM Transactions on Computation Theory (TOCT), 13.

Busatto, N. J. (2013). Criptografia Homomórfica . Brasília,.

Cabarcas, D. J. (2015). El voto electrónico y retos criptográficos relacionados. Revista Facultad de Ciencias Universidad Nacional de Colombia, 83-102.

Coron, J. S., Naccache, D., & Tibouchi, M. (2012). Public key compression and modulus switching for fully homomorphic encryption over the integers. Springer, 446-464.

Coron, J., Mandal, A., Naccache, D., & Tibouchi, M. (2011). Fully Homomorphic Encryption over the Integers with Shorter Public Keys. Springer,, 487-504.

Espinoza Freire, E. E. (2020a). La búsqueda de información científica en las bases de datos académicas. Revista Metropolitana de Ciencias Aplicadas, 3(1), 31-35.

Espinoza Freire, E. E. (2020b). El problema, el objetivo, la hipótesis y las variables de la investigación. Portal de la Ciencia, 1(2), 1-71.

Espinoza Freire, E. E., & Toscano Ruíz, D. F. (2015). Metodología de investigación educativa y técnica. Machala: UTMach. Recuperado de http://repositorio.utmachala.edu.ec/handle/48000/6704.

Gentry, C. (2009). Fully homomorphic encryption using ideal lattices. STOC, (págs. 169-178).

Goldwasser, S., & Micali, S. (1982). Probabilistic encryption & how to play mental poker keeping secret all partial information. Proceedings of the fourteenth annual ACM symposium on Theory of computing. ACM, 365-377.

Guesmi, H., & Saidane, L. A. (2017). “Improved Data Storage Confidentiality in Cloud Computing Using Identity-Based Cryptography,” in 2017 25th International Conference on Systems Engineering (ICSEng). IEEE, 324-330. https://doi.org/10.1109/ICSEng.2017.32

Guevara, A. V., & Soriano, S. D. (2022). La nube en Pymes mediante las normas ISO 27005. Ingeniería y sus Alcances, Revista de Investigación, 6(15), 169-182. https://doi.org/https://doi.org/10.33996/revistaingenieria.v6i15.98

Halevi, S., & Shoup, V. (2014). Algorithms in HElib. CRYPTO 2014: Advances in Cryptology (págs. 554-571). Berlín, Heidelberg: Springer.

Hemenway, B., & Ostrovsky, R. (2012). On Homomorphic Encryption and Chosen-Ciphertext Security. In International Workshop on Public Key Cryptography, 52-56.

Hong, M.-Q., Wang, P.-Y., & Zhao, W.-B. (2016). “Homomorphic Encryption Scheme Based on Elliptic Curve Cryptography for Privacy Protection of Cloud Computing,” in 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance an. IEEE, 152-157. https://doi.org/10.1109/BigDataSecurity-HPSC-IDS.2016.51

Hrestak, D., & Picek, S. (2014). Homomorphic Encryption in the Cloud. Electronics and Microelectronics (MIPRO), 2014 37th International Convention , 1400-1404.

Hrestak, D., & Picek, S. (2014). Homomorphic Encryption in the Cloud. Information and Communication Technology, Electronics and Microelectronics , 1400-1404.

Kabir, N., & Kamal, S. (2020). “Secure Mobile Sensor Data Transfer using Asymmetric Cryptography Algorithms,” in 2020 International Conference on Cyber Warfare and Security (ICCWS). IEEE, 1-6. https://doi.org/10.1109/ICCWS48432.2020.9292392

Katz, J., & Lindell, Y. (2015). Introduction to Modern Cryptography, Second Edition. Boca Raton: Taylor & Francis Group .

Kumar, A. (2021). “Data Security and Privacy using DNA Cryptography and AES Method in Cloud Computing,” in 2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC). IEEE, 1529–1535. https://doi.org/10.1109/I-SMAC52330.2021.9640708

Morais, E., & Dahab, R. (2012). Encriptação homomórfica. Minicursos do XII Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais, 151-195.

Murali, G., & Prasad, R. S. (2017). “Comparison of cryptographic algorithms in cloud and local environment using quantum cryptography,” in 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS). IEEE, 3749–3752. https://doi.org/ 10.1109/ICECDS.2017.8390165

Naehrig, M., Lauter, K., & Vaikuntanathan, V. (2011). Can homomorphic encryption be practical? In Proceedings of the 3rd ACM workshop on Cloud computing security workshop. ACM, 113-124.

Naone, E. (19 de Abril de 2011). MIT technology review. http://www2.technologyreview.com/news/423683/homomorphic-encryption/

Lee, H. (2019). Cloud Security for Small and Medium Enterprises. Journal of Information Security, 10(2), 45-62.

Ogburna, M., Turnerb, C., & Dahalc, P. (2013). Homomorphic Encryption. ScienceDirect, 502-509.

Popa, R. A., Redfield, C., Zeldovich, N., & Balakrishnan, H. (2011). Cryptdb: protecting confidentiality with encrypted query. In Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, 85-100.

Priya, K. T., & Karthick, V. (2022). “A Non Redundant Cost Effective Platform and Data Security in Cloud Computing using Improved Standalone Framework over Elliptic Curve Cryptography Algorithm,” in 2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS. IEEE, 1249-1253. https://doi.org/10.1109/ICSCDS53736.2022.9761002

Ramírez, D. E., & Mora, H. M. (2014). Criptografía en Bases de datos en Cloud Computing. AiBi. Revista de investigación en administración e ingeniería, 39-48.

Rass, Stefan, & Slamanig, D. (2013). Cryptography for Security and Privacy in Cloud Computing. Norwood,: Artech House.

Rivest, R. L., Adleman, L., & Dertouzos, M. L. (1978). On data banks and privacy homomorphisms. In Foundations of secure computation (pp. 169-180). Academic Press.

Rodríguez, G. S. (2020). Privacidad y seguridad en la nube: algunas implicaciones jurídico-económicas desde el comercio electrónico transfronterizo. LEX, 18(1), 229-358. https://doi.org/http://dx.doi.org/10.21503/lex.v18i25.2109

Romero, C., Alvarado, Y., & Paladines, N. (2017). Criptografía y Seguridad en m-commerce. Ciencia y Tecnología, 144-177.

Salman, Z., Hammad, M., & Al-Omary, A. Y. (2021). “A Homomorphic Cloud Framework for Big Data Analytics Based on Elliptic Curve Cryptography,” in 2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT). IEEE, 7-11. https://doi.org/10.1109/3ICT53449.2021.9582001

Saroj, S. K., Chauhan, S. K., Sharma, A. K., & Vats, S. (2015). “Threshold Cryptography Based Data Security in Cloud Computing,” in 2015 IEEE International Conference on Computational Intelligence & Communication Technology. IEEE, 202-207. https://doi.org/10.1109/CICT.2015.149

Shukla, R. S. (2022). “IoT Based Designing of Secure Data Storage System in Distributed Cloud System with Big Data using Cryptography Algorithm,” in 2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART). IEEE, 264–270. https://doi.org/10.1109/SMART55829.2022.10047177

Smith, J., & Johnson, K. (2021). The Impact of Cloud Computing on SME Competitiveness. International Journal of Business and Information Systems, 28(3), 320-335.

Silverberg, A. (2013). Fully homomorphic encryption for mathematicians. Women in Numbers 2: Research Directions in Number Theory, 111-122.

Stallings, W. (2017). Cryptography and network security: principles and practice. Pearson.

Suryawanshi, R., & Shelke, S. (2016). “Improving data storage security in cloud environment using public auditing and threshold cryptography scheme,” in 2016 International Conference on Computing Communication Control and automation (ICCUBEA). IEEE, 1-6. https://doi.org/10.1109/ICCUBEA.2016.7859990

Yang, T., & Yu, B. (2014). “Study of cryptography-based cyberspace data security,” in Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT). IEEE, 1-7. https://doi.org/10.1109/ICCCNT.2014.6963039

Published

2025-03-25

How to Cite

Cloud cryptography: Impact on sme privacy through homomorphic encryption. (2025). Society & Technology, 8(2), 304-322. https://doi.org/10.51247/st.v8i2.554

Similar Articles

1-10 of 483

You may also start an advanced similarity search for this article.