A LIGHTWEIGHT RESIDUE NUMBER SYSTEM-BASED PARTIAL HOMOMORPHIC ENCRYPTION FRAMEWORK FOR CLOUD APPLICATIONS

Authors: Innocent Fiagbedu, Bismark Fiagbedu
Affiliation: Kwame Nkrumah University of Science and Technology, Accra Institute of Technology

Category:

Keywords: Residue Number System (RNS), Partial Homomorphic Encryption (PHE), Cloud Security, Rivest Shamir Adleman (RSA) Algorithm, Fully Homomorphic Encryption, Cryptographic Efficiency, Quantum-Resistant Encryption
ABSTRACT. As cloud computing is becoming more important, there is a growing urgency for the development of more efficient and secure encryption frameworks that are cost-effective, scalable, and secure. Unfortunately, traditional encryption such as RSA and fully homomorphic encryption (FHE) is highly computationally overhead and not feasible for large-scale cloud applications. To address these limitations, a residue number system-based partial homomorphic encryption (RNS-PHE) framework takes advantage of carry-free modular arithmetic and the parallel computing ability of RNS when computing encryption and decryption. RNS-PHE was used to perform the performance evaluation, and showed a significant improvement over the traditional encryption techniques. Encryption times of the framework were five times faster than RSA and ten times faster in decryption than FHE, while consuming less memory and scaling linearly in the context of a multi-tenant cloud. Brute force attacks and key compromise assessments confirmed RNS-PHE was an acceptable alternative for secure cloud computing. RNS-PHE offers a computationally efficient and secure encryption approach to preliminarily gaining cloud storage, secure computation, and encrypted data analysis in modern cloud environments.

References:

Adel, R., Sehrish, A., Mana, S. A. R., Awais, A., Sultan, A., & Khairan, R. (2021). Cryptography-based techniques of encryption for security of data in cloud computing paradigm. International Journal of Engineering Trends and Technology, 69(10), 1–6.
Altarawneh, K., Altarawni, I., Almaiah, M., Hammad, M., Alkhdour, T., Alali, R., Lutfi, A., & Alrawad, M. (2024). A hybrid model of RSA and NTRU for securing cloud computing. International Journal of Information Technology, 102, 1–15.
Awadallah, R., & Samsudin, A. (2020). Homomorphic encryption for cloud computing and its challenges. Proceedings of the 2020 IEEE International Conference on Emerging Technologies and Applications (ICETAS), 1–6.
Bajard, J. C., Eynard, J., Hasan, M. A., & Zucca, V. (2017). A full RNS variant of FV-like somewhat homomorphic encryption schemes. Lecture Notes in Computer Science, 10346, 423–442.
Boyvalenkov, P., Lyakhov, P., Semyonova, N., Valueva, M., Boyvalenkov, G., Minenkov, D., & Kaplun, D. (2023). Residue number systems with six modules and efficient circuits based on power-of two diagonal modulus. Computers & Electrical Engineering, 110, 108854.
Didier, L. S., Dosso, F. Y., & Véron, P. (2020). Efficient modular operations using the adapted modular number system. Journal of Cryptographic Engineering, 10, 207–223.
Ekerå, M. (2021). Quantum algorithms for computing general discrete logarithms and orders with tradeoffs. Journal of Mathematical Cryptology, 15, 359–407.
Hosni, A. (2017). An analysis of cloud computing multitenancy security challenges. International Journal of Advanced Research, 5, 850–855.
Hyder, M. F., Tooba, S., & Waseemullah. (2021). Performance evaluation of RSA-based secure cloud storage protocol using OpenStack. Engineering, Technology and Applied Science Research, 11, 7321-7325.
Isupov, K. (2021). High-performance computation in residue number system using floating-point arithmetic. Computation, 9(9), 1–12.
Jia, H., Cai, D., & Yang, J. (2023). Efficient and privacy-preserving image classification using homomorphic encryption and chunk-based convolutional neural network. Journal of Cloud Computing, 12, 175.
Kadri, A. (2022). An overview of enhancing encryption standards for multimedia in explainable artificial intelligence using residue number systems for security. A Roadmap for Enabling Industry 4.0 by Artificial Intelligence, 1–10.
Kan, J., Zhang, J., Liu, D., & Huang, X. (2022). Proxy re-encryption scheme for decentralized storage networks. Applied Sciences, 12(9), 4260
Kaur, G., Bharathiraja, N., Murugesan, S., Pradeepa, K., Sudhakar, G., & Kumar, M. V. (2023). A security model with efficient AES and security performance trade-off analysis of cryptography systems with cloud computing. Proceedings of the IEEE International Conference on Emerging Computation and Communication Technologies (ICECCT), 1–8.
Lee, H., Choi, J., & Lee, Y. (2023). Approximating max function in fully homomorphic encryption. Electronics, 12(1724).
Negi, K., Shrestha, R., Borges, T., Sahana, S., & Das, S. (2023). A hybrid cryptographic approach for secure cloud-based file storage. Proceedings of the 2023 IEEE Global Conference on Emerging Technologies (GlobConET), 1–7.
Shevchuk, R., Yakymenko, I., & Kasianchuk, M. (2024). Encryption using residue number system: Research trends and future challenges. Proceedings of the 2024 IEEE Conference on Advanced Computer and Information Technologies, 552–559.
Shrivastava, G., Ojha, R., Awasthi, S., Sharma, K., & Bansal, H. (2024). Emerging threats and countermeasures in cybersecurity. Wiley Online Library.