Practical Aspects of Using Fully Homomorphic Encryption Systems to Protect Cloud Computing

Ilyenko, A та Ilyenko, S та Prokopenko, O та Hulak, Hennadii та Melnyk, Iryna (2023) Practical Aspects of Using Fully Homomorphic Encryption Systems to Protect Cloud Computing Cybersecurity Providing in Information and Telecommunication Systems, 3550. с. 226-233. ISSN 1613-0073

[thumbnail of A_Ilyenko_S_Ilyenko_O_Prokopenko_H_Hulak_I_Melnyk_CPITS-II-2023_3050.pdf] Текст
A_Ilyenko_S_Ilyenko_O_Prokopenko_H_Hulak_I_Melnyk_CPITS-II-2023_3050.pdf

Download (606kB)
Офіційне посилання: https://ceur-ws.org/Vol-3550/

Анотація

Fully homomorphic encryption schemes are the most promising area of cryptographic information security, particularly in cloud computing. Over the last ten years, Fully Homomorphic Encryption (FHE) has moved from a theoretical idea to practical implementation in real-world cryptographic applications. The concept of homomorphic encryption is ideal for providing secure cloud computing, where user data will never be in plaintext at any stage of its processing. However, there are still many problems related to the performance and complexity of computing that need to be overcome. To confirm the effectiveness of homomorphic encryption in the cloud, a cryptographic cloud computing protection application based on homomorphic encryption was developed. Based on a detailed analysis of existing FHEs, studying their mathematical apparatus, and classifying them according to various criteria, two schemes were selected for implementation in the application—CKKS and BFV, which allow to performance of homomorphic processing of encrypted data. The proposed solution demonstrates a new approach to the design of FHE applications, where the user independently chooses the parameters for implementing the FHE scheme, according to his requirements. The proposed test local server allows to testing of selected scheme parameters by combining the execution of various homomorphic computations. Based on the tests, it is possible to customize the proposed application according to one’s tasks, sacrificing performance and security for the ability to perform more complex homomorphic computations, or vice versa, or even to maintain a balance between them.

Тип елементу : Стаття
Ключові слова: Fully homomorphic encryption; BFV schema; CKKS schema; cloud computing
Типологія: Це архівна тематика Київського університету імені Бориса Грінченка > Статті у наукометричних базах > Scopus
Підрозділи: Це архівні підрозділи Київського університету імені Бориса Грінченка > Факультет інформаційних технологій та математики > Кафедра інформаційної та кібернетичної безпеки імені професора Володимира Бурячка
Користувач, що депонує: Павло Миколайович Складанний
Дата внесення: 11 Груд 2023 11:40
Останні зміни: 11 Груд 2023 11:40
URI: https://elibrary.kubg.edu.ua/id/eprint/47362

Actions (login required)

Перегляд елементу Перегляд елементу