Skip to main content

Biometric Inspired Homomorphic Encryption Algorithm for Secured Cloud Computing

  • Conference paper
  • First Online:
Nature Inspired Computing

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 652))

Abstract

Cloud computing widely uses resource sharing and computing framework over the Internet. Data security is the key objective while sharing data over untrusted environment. This paper presents a novel biometric inspired homomorphic encryption algorithm (BIHEA) for secured data/files transmission over hybrid cloud environment. The proposed algorithm encrypts the user data at run-time by providing the authorized user biometric-feature-based one time password. Every time a user is authenticated by a totally different one time password. The BIHEA provides a good solution to commonly identified theft seen in cloud environment like phishing, shoulder surfing.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Somani, U., Lakhani, K., Mundra, M.: Implementing the Digital Signature with RSA Encryption algorithm to Enhance the Data Security of cloud in cloud computing 1st International Conference on Parallel Distributed and Grid Computing. IEEE (2010)

    Google Scholar 

  2. Yu, S., Wang, C., Ren, K., Lou, W.: Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing. IEEE (2010)

    Google Scholar 

  3. Tirthani, N., Ganesan, R.: Data security in cloud architecture based on diffie hellman and elliptical curve cryptography IACR Cryptology, ePrint Archive 49 (2014)

    Google Scholar 

  4. Arasu, S.E., Gowri, B., Ananthi, S.: Privacy-preserving public auditing in cloud using HMAC algorithm,” International Journal of Recent Technology and Engineering, IJRTE 2(1) (2013)

    Google Scholar 

  5. Ronald L. Rivest, Leonard Adleman, and Michael L. Dertouzos.: On Data Banks and Privacy Homomorphisms, chapter On Data Banks and Privacy Homomorphisms Academic Press. pp. 169–180 (1978)

    Google Scholar 

  6. Jansen W.A.: Cloud Hooks: Security and Privacy Issues in Cloud Computing 44th Hawaii International Conference on System Sciences (2011)

    Google Scholar 

  7. Miranda, M., Pearson, S.: A Client-Based Privacy Manager for Cloud Computing COMSWARE’09. Dublin, Ireland (2009)

    Google Scholar 

  8. Wang, J., Mu, S.: Security issues and countermeasures in cloud computing in 2011 IEEE International Conference on Grey Systems and Intelligent Services, pp. 843–846 (2011)

    Google Scholar 

  9. A. Tripathi and A. Mishra (2011) Cloud computing security considerations in 2011 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC), pp. 1–5

    Google Scholar 

  10. Mathisen E.: Security challenges and solutions in cloud computing in 2011 Proceedings of the 5th IEEE International Conference on Digital Ecosystems and Technologies Conference (DEST), pp. 208–212 (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yogesh Bala .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Bala, Y., Malik, A. (2018). Biometric Inspired Homomorphic Encryption Algorithm for Secured Cloud Computing. In: Panigrahi, B., Hoda, M., Sharma, V., Goel, S. (eds) Nature Inspired Computing. Advances in Intelligent Systems and Computing, vol 652. Springer, Singapore. https://doi.org/10.1007/978-981-10-6747-1_2

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-6747-1_2

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-6746-4

  • Online ISBN: 978-981-10-6747-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics