Pre-Computing Appropriate Parameters: How to Accelerate Somewhat Homomorphic Encryption for Cloud Auditing
Title | Pre-Computing Appropriate Parameters: How to Accelerate Somewhat Homomorphic Encryption for Cloud Auditing |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Tajan, L., Kaumanns, M., Westhoff, D. |
Conference Name | 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS) |
Keywords | auditing, Cloud Auditing, cloud computing, compositionality, cryptography, data privacy, encoding, Encryption, encryption audits, generic algorithm, homomorphic encryption scheme, Metrics, predominant cloud auditing use cases, privacy, privacy enhancing approach, privacy enhancing mechanisms, pubcrawl, Public key, public key version, relevant crypto parameters, resilience, Resiliency, Security Audits, Semiautonomic cloud auditing architecture, SHE parameters, Software Acceleration, Somewhat Homomorphic Encryption, telecommunication security, use case scenario, Weaving |
Abstract | In a Semi-autonomic cloud auditing architecture we weaved in privacy enhancing mechanisms [15] by applying the public key version of the Somewhat homomorphic encryption (SHE) scheme from [4]. It turns out that the performance of the SHE can be significantly improved by carefully deriving relevant crypto parameters from the concrete cloud auditing use cases for which the scheme serves as a privacy enhancing approach. We provide a generic algorithm for finding good SHE parameters with respect to a given use case scenario by analyzing and taking into consideration security, correctness and performance of the scheme. Also, to show the relevance of our proposed algorithms we apply it to two predominant cloud auditing use cases. |
URL | https://ieeexplore.ieee.org/document/8328713 |
DOI | 10.1109/NTMS.2018.8328713 |
Citation Key | tajan_pre-computing_2018 |
- privacy enhancing mechanisms
- Weaving
- use case scenario
- telecommunication security
- Somewhat Homomorphic Encryption
- Software Acceleration
- SHE parameters
- Semiautonomic cloud auditing architecture
- Security Audits
- Resiliency
- resilience
- relevant crypto parameters
- public key version
- Public key
- pubcrawl
- auditing
- privacy enhancing approach
- privacy
- predominant cloud auditing use cases
- Metrics
- homomorphic encryption scheme
- generic algorithm
- encryption audits
- encryption
- encoding
- data privacy
- Cryptography
- Compositionality
- Cloud Computing
- Cloud Auditing