{"title":"Fully homomorphic encryption-based optimal key encryption for privacy preservation in the cloud sector","authors":"Sonam Mittal","doi":"10.1016/j.jisa.2025.104048","DOIUrl":null,"url":null,"abstract":"<div><div>Cloud computing infrastructure has been specifically designed to handle vast amounts of data as well as relevant details that are most basic for data-intensive applications. However, cloud computing has been exposed to various internal and external security threats along with privacy concerns. Therefore, an intelligent framework named privacy preservation in the cloud sector (PPCS) is implemented in this work. The main phases taken up in the proposed security model are data sanitization and restoration. The data stored in the cloud infrastructure is subjected to a data sanitization operation. In the data sanitization process, the data is transformed into another form, where the confidential data has been preserved by the optimal key generation operation. An improved meta-heuristic algorithm called Improved Class Topper Optimization (ICTO) derived from existing Class Topper Optimization (CTO) is designed for performing the optimal key generation. This algorithm aids in optimizing the key generated in the data sanitization technique. To offer more security to the cloud environment, the encryption of the generated optimal key is done by fully homomorphic encryption (FHE). It permits the preservation of confidentiality in sensitive data. The performance results of the designed approach illustrated the ability of this technique to prevent attacks without increasing energy consumption and latency.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"91 ","pages":"Article 104048"},"PeriodicalIF":3.8000,"publicationDate":"2025-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Security and Applications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2214212625000857","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
Cloud computing infrastructure has been specifically designed to handle vast amounts of data as well as relevant details that are most basic for data-intensive applications. However, cloud computing has been exposed to various internal and external security threats along with privacy concerns. Therefore, an intelligent framework named privacy preservation in the cloud sector (PPCS) is implemented in this work. The main phases taken up in the proposed security model are data sanitization and restoration. The data stored in the cloud infrastructure is subjected to a data sanitization operation. In the data sanitization process, the data is transformed into another form, where the confidential data has been preserved by the optimal key generation operation. An improved meta-heuristic algorithm called Improved Class Topper Optimization (ICTO) derived from existing Class Topper Optimization (CTO) is designed for performing the optimal key generation. This algorithm aids in optimizing the key generated in the data sanitization technique. To offer more security to the cloud environment, the encryption of the generated optimal key is done by fully homomorphic encryption (FHE). It permits the preservation of confidentiality in sensitive data. The performance results of the designed approach illustrated the ability of this technique to prevent attacks without increasing energy consumption and latency.
期刊介绍:
Journal of Information Security and Applications (JISA) focuses on the original research and practice-driven applications with relevance to information security and applications. JISA provides a common linkage between a vibrant scientific and research community and industry professionals by offering a clear view on modern problems and challenges in information security, as well as identifying promising scientific and "best-practice" solutions. JISA issues offer a balance between original research work and innovative industrial approaches by internationally renowned information security experts and researchers.