Homomorphic Encryption-Based Secure Data Retrieval in Cloud Storage
DOI:
https://doi.org/10.15662/IJEETR.2020.0205001Keywords:
Homomorphic Encryption, Secure Data Retrieval, Cloud Storage, Privacy-Preserving, Computation, Encrypted Search, Fully Homomorphic Encryption, Keyword Search, Range Queries, Data ConfidentialityAbstract
The rapid adoption of cloud storage services has transformed data management by offering scalable, flexible, and cost-effective solutions. However, outsourcing sensitive data to third-party cloud providers raises significant privacy and security concerns, particularly regarding unauthorized access and data breaches. Secure data retrieval from encrypted cloud storage is therefore a critical challenge. Homomorphic encryption (HE), a cryptographic technique enabling computations directly on encrypted data without requiring decryption, provides a promising approach to address this issue. This paper explores the application of homomorphic encryption for secure data retrieval in cloud storage environments, focusing on preserving data confidentiality while supporting efficient query execution. We analyze different homomorphic encryption schemes—partially, somewhat, and fully homomorphic encryption—and evaluate their feasibility for enabling secure keyword search and range queries over encrypted datasets. A novel retrieval framework is proposed that integrates homomorphic encryption with optimized indexing techniques to reduce computational overhead and improve response times. Experimental evaluations on benchmark datasets demonstrate that the proposed framework effectively balances security, privacy, and efficiency. The results show that homomorphic encryption-based retrieval methods can prevent data leakage during search operations, even against semi-honest cloud providers. Furthermore, the study discusses practical considerations, including key management, scalability, and resistance to various attack models. This research contributes to advancing privacy-preserving cloud storage solutions, empowering users to securely store and retrieve sensitive information without compromising confidentiality or performance.
References
1. Gentry, C. (2019). Fully Homomorphic Encryption Using Ideal Lattices. SIAM Journal on Computing, 39(1), 168-191.
2. Brakerski, Z., Gentry, C., & Vaikuntanathan, V. (2019). Fully Homomorphic Encryption without Bootstrapping. ACM Transactions on Computation Theory, 6(3), 13.
3. Boneh, D., & Waters, B. (2019). Conjunctive, Subset, and Range Queries on Encrypted Data. Journal of Cryptology, 30(1), 150-179.
4. Chen, H., Laine, K., & Player, R. (2019). Simple Encrypted Arithmetic Library - SEAL v2.3. Proceedings of the ACM Conference on Computer and Communications Security.
5. Naveed, M., Kamara, S., & Wright, C. V. (2019). Inference Attacks on Property-Preserving Encrypted Databases. Proceedings of the ACM Conference on Computer and Communications Security.
6. Wang, C., Cao, N., Ren, K., & Lou, W. (2019). Secure Ranked Keyword Search over Encrypted Cloud Data. IEEE Transactions on Parallel and Distributed Systems, 25(1), 222-233.
7. Santhoshini, G., & Anbazhagan, K. (2014, February). An object based software tool for software measurement. In International Conference on Information Communication and Embedded Systems (ICICES2014) (pp. 1-5). IEEE.
8. Murugeshwari, B., & Sujatha, R. (2014). Preservation of Privacy for Multiparty Computation System with Homomorphic Encryption. International Journal of Emerging Technology and Advanced Engineering, 4(3), 530-535.
9. Deivendran, P., Anbazhagan, K., Sailaja, P., Sujatha, E., Babu, M. R., & Sudhakar, S. (2020). Scalability service in data center persistent storage allocation using virtual machines. International Journal of Scientific & Technology Research, 9(02), 2135-2139.
10. Pushparathi, V. G., Sudha, M., David, D. J., Anbazhagan, K., & Vethamani, S. E. (2020). A Continuous Decision Based Multi Kernel Median Filter for Noise Removal on Brain MRI Images. Advanced imaging, 1(3), 5.
11. Ranjith Rajasekharan. (2019). Hybrid cloud architecture for enterprise database system. International Journal of Science, Research and Technology (IJSRAT), 2(6), 2513–251.
12. Watham, S. D., & Vimal, V. R. (2013). Design and Implementation of Data Sanitization Technique For Effective Filtering With Enhanced Medical Support System in Cloud Architecture Diagram. International Journal of Emerging Technology and Advanced Engineering, 3(12), 471-473.
13. Kumar, J. (2013). Preservation of the Privacy for Multiple Custodian Systems with Rule Sharing. Journal of Computer Science.
14. Potel, R. (2019). A Real-Time Analytics Architecture for Enterprise Order Lifecycle Visibility and Backlog Management. International Journal of Research and Applied Innovations, 2(6), 2460-2469.
15. Murugeshwari, B., Amirthavalli, R., Sri, C. B., & Pari, S. N. (2023). Hybrid key authentication scheme for privacy over adhoc communication. arXiv preprint arXiv:2304.14652.
16. Vimal Raja, G. (2021). Mining Customer Sentiments from Financial Feedback and Reviews using Data Mining Algorithms. International Journal of Innovative Research in Computer and Communication Engineering, 9(12), 14705-14710.
17. Garg, V. K., Soundappan, S. J., & Kaur, E. M. (2020). Enhancement in intrusion detection system for WLAN using genetic algorithms. South Asian Research Journal of Engineering and Technology, 2(6), 62–64. https://doi.org/10.36346/sarjet.2020.v02i06.003
18. Jagadeesh, S., & Sugumar, R. (2017). Optimal knowledge extraction system based on GSA and AANN. International Journal of Control Theory and Applications, 10(12), 153–162.
19. Jayaraman, S., Rajendran, S., & P, S. P. (2019). Fuzzy c-means clustering and elliptic curve cryptography using privacy preserving in cloud. International Journal of Business Intelligence and Data Mining, 15(3), 273-287.





