SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1097
A study paper on Homomorphic encryption in cloud computing
Nivedita W. Wasankar1, A.V. Deorankar2
1M. Tech. Scholar,Department of Computer Science and Engineering,Government College of Engineering,
Amravati (MH) India
2Head of Department,Department of Information Technology,Government College of Engineering,
Amravati (MH) India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract -The use of cloud for outsource the database has
increased rapidly in many organizations. it provides many
benefits in terms of low cost and accessibility of data.
Database is hosted and processed in cloud server, which is
beyond the control of data owners. due to the privacyconcerns
that the cloud service provider is assumed semi-trust (honest-
but curious.), it becomes a critical issue to put sensitiveservice
into the cloud, so encryption or obfuscation are needed before
outsourcing sensitive data. Increased number of queries will
inevitably leak more information to the cloud server. One
straightforward approach to mitigate the security risk of
privacy leakage is to encrypt the private data and hide the
query/access patterns. Homomorphic Encryption (HE), a
special kind of encryption scheme, can address these concerns
as it allows any third party to operate on the encrypted data
without decrypting it in advance. This survey focuses on HE
and FHE schemes. First,we present the basics of HE and the
details of the well-known Partially Homomorphic Encryption
(PHE) and Somewhat Homomorphic Encryption (SWHE),
which are important pillars of achieving FHE.
Key Words: Homomorfic encryption, FHE, PHE, SWHE,
etc..
1. INTRODUCTION
When the data transferred to the Cloud we use standard
encryption methods to secure the operationsandthestorage
of the data. Our basic concept was to encrypt the data before
send it to the Cloud provider. But the last one needs to
decrypt data at every operation. The client will need to
provide the private key to the server (Cloud provider) to
decrypt data before execute the calculationsrequired,which
might affect the confidentiality and privacy of data stored in
the Cloud. One promising direction to preservetheprivacyof
the data is to utilize homomorphic encryption(HE)schemes.
Homomorphic Encryption systems are used to perform
operations on encrypted data without knowing the private
key (without decryption), the client is the only holder of the
secret key. When we decrypt the result of any operation, itis
the same as if we had carried out the calculation on the raw
data. homomorphic encryption is useful that allows the
operations on the cipher text, which can provide the same
results after calculations as the working directly on the raw
data.
The definition of homomorphic encryption are as follow :
 homomorphism - a transformation of one set into
another that preserves in the second set the
relations between elements of the first1
 homomorphic encryption - an operationperformed
on a set of ciphertexts such that decrypting the
result of the operation is the same as the result of
some operation performed on the plaintexts.
2. POPERTIES OF HOMOMORPHIC ENCRYPTION
An encryption is homomorphic, if: from Enc(a) and Enc(b) it
is possible to compute Enc(f (a, b)), where f can be: +, ×, ⊕
and withoutusing the private key.HomomorphicEncryption
has mainly two properties, according to the operations that
allows to assess on raw data.
2.1 Additive Homomorphic Encryption:
A Homomorphic encryption is additive,if
Ek (x⊕ y) = Ek (x) ⊕ Ek (y).
2.2Multiplicative Homomorphic Encryption:
Homomorphic encryption is multiplicative, if
Ek (x ⊗ y) = Ek (x) ⊗Ek (y).
- Ek is an encryption algorithm with key k. - Dk is a
decryption algorithm.
The additiveHomomorphic encryption(onlyadditionsofthe
raw data) is the Pailler and Goldwasser-Micalli
cryptosystems, and the multiplicative Homomorphic
encryption (only products on raw data) is the RSA and El
Gamal cryptosystems. An algorithm is fully homomorphic if
both properties are satisfied simultaneously.
3. TYPES OF HOMOMORPHIC ENCRYPTION
Homomorphism is a transformation of one set into another
that preserves in the second set the relations between
elementsof the first one. An operation performed on a set of
ciphertexts such that decrypting the result of the operation
is the same asthe result of some operation performedonthe
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1098
plaintexts is called as homomorphic encryption. all the
different HE schemes can neatly be categorized under three
types with respect to the number of allowed operations on
the encrypted data as follows:
3.1 Partially Homomorphic Encryption (PHE):
PHE allows only one type of operation with an unlimited
number of times (i.e.,no bound on the number of usages). In
other words, PHE schemes can only be used for particular
applications, whose algorithms include only addition or
multiplicationoperation. PHE schemesaredeployedinsome
applications like e-voting or Private Information Retrieval
(PIR). However, these applications were restricted in terms
of the types of homomorphic evaluation operations
3.2 Somewhat Homomorphic Encryption (SWHE):
This allows some types of operations with a limited number
of times. SWHE schemes support both addition and
multiplication. Nonetheless, in SWHE schemes that are
proposed before the first FHE scheme, the size of the
ciphertexts grows with each homomorphic operation and
hence the maximum number of allowed homomorphic
operations is limited.
These issues put a limit on the use of PHE and SWHE
schemes in real-life applications. Eventually, the increasing
popularity of cloud based services accelerated the design of
HE schemes which can support an arbitrary number of
homomorphic operations with random functions, i.e. FHE.
3.3 Fully Homomorphic Encryption (FHE):
FHE allows an unlimited number of operations with
unlimited number of times. The first plausible and
achievable Fully Homomorphic Encryption (FHE) scheme
was introduced by Craig Gentry in 2009, that evaluates an
arbitrary number of additions and multiplications and thus
calculate any type of function on encrypted data. It is based
on ideal-lattices in math and it is not only a descriptionofthe
scheme, but also a powerful framework for achieving FHE.
However, it is conceptually and practically not a realistic
scheme. Different FHE schemes demonstrated that FHE still
needs to be improved significantly to be practical on every
platform as they are very expensive for real-life applications
because of the bootstrapping part, which is the intermediate
refreshing procedure of a processed ciphertext.
4. BENEFITS
Homomorphic encryption has many benefits and
applications. One such benefit is that of enhanced privacy.
Privacy is one of the goals of cryptography in general, but
homomorphic encryption can provide even further privacy
than typical encryption schemes. One of the biggest benefits
to this application is that if a user lives in an area where
privacy is considered a luxury, sensitive data can still be
retrieved without ever revealing even the nature of thedata.
5. DRAWBACKS
While the benefits to homomorphic encryption are great,
they do not come without considerable drawbacks. One of
the biggest drawbacks is the complexity of the systems. In
partially homomorphic cryptosystems, there is not much
overhead involved in performing the computations, at least
for those presented. However, fully homomorphic
encryption requires a lattice-based cryptosystem that is
significantly more complex. Implementation of such a
cryptosystem even for basic operationsrequiressignificantly
more complicated computations and massive ciphertext
sizes. Another potential drawback of homomorphic
cryptosystems is that in some cases, they are vulnerable to
malware.
6. CONCLUSION
Homomorphic cryptosystems allow for the same level of
privacy as any other cryptosystem, while also allowing for
operations to be performed on the data without the need to
see the actual data. Indeed, the idea of HE has been around
forover 30 years; however, the first plausible and achievable
Fully Homomorphic Encryption (FHE) scheme was
introduced by CraigGentry in 2009. Since then,differentFHE
schemes demonstrated that FHE still needs to be improved
significantlyto be practicalon everyplatformastheyarevery
expensive for real-life applications. Hence, in this paper, we
surveyedthe HE and FHE schemes. Specifically,startingfrom
the basics of HE, the details of the well-known Partially HE
(PHE) and Somewhat HE (SWHE), which are important
pillars of achieving FHE, were presented.
REFERENCES
1. Nitesh Aggarwal, Cp Gupta, and Iti Sharma. 2014.
Fully Homomorphic symmetric scheme without
bootstrapping.In Cloud Computing and Internet of
Things (CCIOT), 2014 International Conference
on.IEEE, 14–17.
2. S Sobitha Ahila and KL Shunmuganathan. 2014.
State Of Art in Homomorphic Encryption Schemes.
International Journal of Engineering Research and
Applications 4, 2 (2014), 37–43.
3. Gentry, C. A fully homomorphic encryption scheme.
Doctoral Dissertation, Stanford University, 2009.
4. Gentry, C., Sahai, A. and Waters, B. Homomorphic
encryption from learning with errors:conceptually-
simpler, asymptotically-faster, attribute-based. In
Advances in Cryptology, Proceedings of CRYPTO
'13. R. Canetti and J. Garay (Eds.). Springer, Berlin
Heidelberg, 2013, 75-92.MufutauAkinwande.2009.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1099
Advances in Homomorphic Cryptosystems. J. UCS
15, 3 (2009), 506–522.
5. Zvika Brakerski, Craig Gentry, and Vinod
Vaikuntanathan. 2014. (Leveled) Fully
Homomorphic Encryption Without Bootstrapping.
ACM Trans. Comput. Theory 6, 3, Article 13 (July
2014), 36 pages.
DOI:http://dx.doi.org/10.1145/2633600.
6. Zhigang Chen, JianWang, ZengNian Zhang,andSong
Xinxia. 2014. A fully homomorphic encryption
schemewith better key size. Communications,China
11, 9 (2014), 82–92.
7. Michael Clear and Ciarán McGoldrick. 2015. Multi-
identity and multi-key leveled FHE from learning
witherrors. In Annual Cryptology Conference.
Springer, 630–656.
8. Léo Ducas and Daniele Micciancio. 2014. A Fully
Homomorphic Encryption library
https://github.com/lducas/FHEW. (2014).
Accessed at December, 2015.
9. Junfeng Fan and Frederik Vercauteren. 2012a.
Somewhat Practical Fully Homomorphic
Encryption. IACR Cryptology ePrint Archive 2012
(2012), 144.
10. Shai Halevi and Victor Shoup. 2013b. An
Implementation of homomorphi encryption.
https://github.com/shaih/HElib. (2013). Accessed
at December, 2015.
11. Hao-Miao Yang, Qi Xia, Xiao-fen Wang,andDian-hua
Tang. 2012. A new somewhat homomorphic
encryption scheme over integers. In Computer
Distributed Control and Intelligent Environmental
Monitoring (CDCIEM), 2012 International
Conference on. IEEE, 61–64.
12. Goldwasser, S. and Micali, S. Probabilistic
encryption. Journal of Computer and System
Sciences 28, 2 (1984), 270-299.
13. ElGamal, T. A public key cryptosystem and a
signature scheme based on discrete logarithms. In
Advances in Cryptology, Proceedings of CRYPTO
'84. G. Blakley and D. Chaum (Eds.). Springer, Berlin
Heidelberg, 1985, 1018.
14. Rivest, R., Shamir, A. and Adleman, L. A method for
obtaining digital signatures and public-key
cryptosystems. Communications of the ACM 21, 2
(1978), 120-126.
15. Boneh, D. The decision Diffie-Hellman problem. In
Algorithmic Number Theory, Proceedings of the
Third International Symposium (ANTS-III)
(Portland, June 21-25). J.Buhler (Ed.). Springer,
Berlin Heidelberg, 1998, 4863.
16. Paillier, P. Public-key cryptosystems based on
composite degree residuosity classes. In Eurocrypt,
1999.
17. Rivest, R., Adleman, L. and Dertouzos, M. On data
banks and privacy homomorphisms.InFoundations
of Secure Computation 4, 11 (1978), 169-180.
18. Boneh, D., Goh, E.-J. and Nissim, K. Evaluating2-DNF
formulason ciphertexts. In TheoryofCryptography,
Proceedings of the Second Theory of Cryptography
Conference (TCC) (Cambridge, February 10-12). J.
Kilian (Ed.). Springer, Berlin Heidelberg, 2005,325-
341.

More Related Content

PDF
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
PDF
A new dynamic speech encryption algorithm based on Lorenz chaotic map over in...
PDF
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
PDF
Analysis of a hybrid cipher algorithm
PDF
Implementation of aes and blowfish algorithm
PDF
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
PDF
M021201092098
PDF
Parc4 i parallel implementation of
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
A new dynamic speech encryption algorithm based on Lorenz chaotic map over in...
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
Analysis of a hybrid cipher algorithm
Implementation of aes and blowfish algorithm
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
M021201092098
Parc4 i parallel implementation of

What's hot (20)

PDF
Fpga based encryption design using vhdl
PDF
An Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
PDF
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
DOCX
Cloud computing term paper
PDF
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
DOCX
DOC
PDF
REU Group 2 - Paper
PDF
A tool to evaluate symmetric key algorithms
PDF
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
PDF
IRJET- Enhancement of Efficiant Data Security Algorithm using Combined AES an...
PDF
Final report
PDF
Data security framework for cloud computing networks
PPTX
Proposed Lightweight Block Cipher Algorithm for Securing Internet of Things
PDF
Implementation of-hybrid-cryptography-algorithm
PDF
Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...
PDF
Protection of data using linear programming and fhe technique in cloud computing
PDF
VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04
PDF
IRJET- Symmetric Cryptography using Neural Networks
PPTX
Performance evluvation of chaotic encryption technique
Fpga based encryption design using vhdl
An Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
Cloud computing term paper
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
REU Group 2 - Paper
A tool to evaluate symmetric key algorithms
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
IRJET- Enhancement of Efficiant Data Security Algorithm using Combined AES an...
Final report
Data security framework for cloud computing networks
Proposed Lightweight Block Cipher Algorithm for Securing Internet of Things
Implementation of-hybrid-cryptography-algorithm
Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...
Protection of data using linear programming and fhe technique in cloud computing
VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04
IRJET- Symmetric Cryptography using Neural Networks
Performance evluvation of chaotic encryption technique
Ad

Similar to IRJET- A Study Paper on Homomorphic Encryption in Cloud Computing (20)

PDF
A comprehensive study of fhe schemes ijact journal
PPTX
Oral.pptx
PPTX
Oral.pptx
PDF
Somewhat Homomorphic Encryption Technique
PPTX
Homomorphic Encryption Scheme.pptx
PPT
HEpres2.ppt
PDF
Towards Practical Homomorphic Encryption with Efficient Public key Generation
PDF
The Road Less Traveled: Use-cases, Challenges, and Solutions of Homomorphic E...
PDF
Homomorphic encryption algorithms and schemes for secure computations in the ...
PPTX
Homomorphic encryption and Private Machine Learning Classification
PPTX
Homomorphic Encryption
PPTX
529873117-HomomorphicEncryptionSlides.pptx
PPTX
529873117-HomomorphicEncryptionSlides.pptx
PDF
A survey on Fully Homomorphic Encryption
PDF
B017631014
PPTX
Homomorphic encryption in cloud computing final
PPTX
Security.pptx
PDF
Poster12.10
PPTX
Homomorphic Encryption: Unveiling secrets without exposing them
PDF
H42063743
A comprehensive study of fhe schemes ijact journal
Oral.pptx
Oral.pptx
Somewhat Homomorphic Encryption Technique
Homomorphic Encryption Scheme.pptx
HEpres2.ppt
Towards Practical Homomorphic Encryption with Efficient Public key Generation
The Road Less Traveled: Use-cases, Challenges, and Solutions of Homomorphic E...
Homomorphic encryption algorithms and schemes for secure computations in the ...
Homomorphic encryption and Private Machine Learning Classification
Homomorphic Encryption
529873117-HomomorphicEncryptionSlides.pptx
529873117-HomomorphicEncryptionSlides.pptx
A survey on Fully Homomorphic Encryption
B017631014
Homomorphic encryption in cloud computing final
Security.pptx
Poster12.10
Homomorphic Encryption: Unveiling secrets without exposing them
H42063743
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
Construction Project Organization Group 2.pptx
PDF
Digital Logic Computer Design lecture notes
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
additive manufacturing of ss316l using mig welding
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PDF
Well-logging-methods_new................
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPT
Mechanical Engineering MATERIALS Selection
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
DOCX
573137875-Attendance-Management-System-original
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Construction Project Organization Group 2.pptx
Digital Logic Computer Design lecture notes
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Foundation to blockchain - A guide to Blockchain Tech
additive manufacturing of ss316l using mig welding
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
Well-logging-methods_new................
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Mechanical Engineering MATERIALS Selection
CH1 Production IntroductoryConcepts.pptx
Model Code of Practice - Construction Work - 21102022 .pdf
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
573137875-Attendance-Management-System-original
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...

IRJET- A Study Paper on Homomorphic Encryption in Cloud Computing

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1097 A study paper on Homomorphic encryption in cloud computing Nivedita W. Wasankar1, A.V. Deorankar2 1M. Tech. Scholar,Department of Computer Science and Engineering,Government College of Engineering, Amravati (MH) India 2Head of Department,Department of Information Technology,Government College of Engineering, Amravati (MH) India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract -The use of cloud for outsource the database has increased rapidly in many organizations. it provides many benefits in terms of low cost and accessibility of data. Database is hosted and processed in cloud server, which is beyond the control of data owners. due to the privacyconcerns that the cloud service provider is assumed semi-trust (honest- but curious.), it becomes a critical issue to put sensitiveservice into the cloud, so encryption or obfuscation are needed before outsourcing sensitive data. Increased number of queries will inevitably leak more information to the cloud server. One straightforward approach to mitigate the security risk of privacy leakage is to encrypt the private data and hide the query/access patterns. Homomorphic Encryption (HE), a special kind of encryption scheme, can address these concerns as it allows any third party to operate on the encrypted data without decrypting it in advance. This survey focuses on HE and FHE schemes. First,we present the basics of HE and the details of the well-known Partially Homomorphic Encryption (PHE) and Somewhat Homomorphic Encryption (SWHE), which are important pillars of achieving FHE. Key Words: Homomorfic encryption, FHE, PHE, SWHE, etc.. 1. INTRODUCTION When the data transferred to the Cloud we use standard encryption methods to secure the operationsandthestorage of the data. Our basic concept was to encrypt the data before send it to the Cloud provider. But the last one needs to decrypt data at every operation. The client will need to provide the private key to the server (Cloud provider) to decrypt data before execute the calculationsrequired,which might affect the confidentiality and privacy of data stored in the Cloud. One promising direction to preservetheprivacyof the data is to utilize homomorphic encryption(HE)schemes. Homomorphic Encryption systems are used to perform operations on encrypted data without knowing the private key (without decryption), the client is the only holder of the secret key. When we decrypt the result of any operation, itis the same as if we had carried out the calculation on the raw data. homomorphic encryption is useful that allows the operations on the cipher text, which can provide the same results after calculations as the working directly on the raw data. The definition of homomorphic encryption are as follow :  homomorphism - a transformation of one set into another that preserves in the second set the relations between elements of the first1  homomorphic encryption - an operationperformed on a set of ciphertexts such that decrypting the result of the operation is the same as the result of some operation performed on the plaintexts. 2. POPERTIES OF HOMOMORPHIC ENCRYPTION An encryption is homomorphic, if: from Enc(a) and Enc(b) it is possible to compute Enc(f (a, b)), where f can be: +, ×, ⊕ and withoutusing the private key.HomomorphicEncryption has mainly two properties, according to the operations that allows to assess on raw data. 2.1 Additive Homomorphic Encryption: A Homomorphic encryption is additive,if Ek (x⊕ y) = Ek (x) ⊕ Ek (y). 2.2Multiplicative Homomorphic Encryption: Homomorphic encryption is multiplicative, if Ek (x ⊗ y) = Ek (x) ⊗Ek (y). - Ek is an encryption algorithm with key k. - Dk is a decryption algorithm. The additiveHomomorphic encryption(onlyadditionsofthe raw data) is the Pailler and Goldwasser-Micalli cryptosystems, and the multiplicative Homomorphic encryption (only products on raw data) is the RSA and El Gamal cryptosystems. An algorithm is fully homomorphic if both properties are satisfied simultaneously. 3. TYPES OF HOMOMORPHIC ENCRYPTION Homomorphism is a transformation of one set into another that preserves in the second set the relations between elementsof the first one. An operation performed on a set of ciphertexts such that decrypting the result of the operation is the same asthe result of some operation performedonthe
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1098 plaintexts is called as homomorphic encryption. all the different HE schemes can neatly be categorized under three types with respect to the number of allowed operations on the encrypted data as follows: 3.1 Partially Homomorphic Encryption (PHE): PHE allows only one type of operation with an unlimited number of times (i.e.,no bound on the number of usages). In other words, PHE schemes can only be used for particular applications, whose algorithms include only addition or multiplicationoperation. PHE schemesaredeployedinsome applications like e-voting or Private Information Retrieval (PIR). However, these applications were restricted in terms of the types of homomorphic evaluation operations 3.2 Somewhat Homomorphic Encryption (SWHE): This allows some types of operations with a limited number of times. SWHE schemes support both addition and multiplication. Nonetheless, in SWHE schemes that are proposed before the first FHE scheme, the size of the ciphertexts grows with each homomorphic operation and hence the maximum number of allowed homomorphic operations is limited. These issues put a limit on the use of PHE and SWHE schemes in real-life applications. Eventually, the increasing popularity of cloud based services accelerated the design of HE schemes which can support an arbitrary number of homomorphic operations with random functions, i.e. FHE. 3.3 Fully Homomorphic Encryption (FHE): FHE allows an unlimited number of operations with unlimited number of times. The first plausible and achievable Fully Homomorphic Encryption (FHE) scheme was introduced by Craig Gentry in 2009, that evaluates an arbitrary number of additions and multiplications and thus calculate any type of function on encrypted data. It is based on ideal-lattices in math and it is not only a descriptionofthe scheme, but also a powerful framework for achieving FHE. However, it is conceptually and practically not a realistic scheme. Different FHE schemes demonstrated that FHE still needs to be improved significantly to be practical on every platform as they are very expensive for real-life applications because of the bootstrapping part, which is the intermediate refreshing procedure of a processed ciphertext. 4. BENEFITS Homomorphic encryption has many benefits and applications. One such benefit is that of enhanced privacy. Privacy is one of the goals of cryptography in general, but homomorphic encryption can provide even further privacy than typical encryption schemes. One of the biggest benefits to this application is that if a user lives in an area where privacy is considered a luxury, sensitive data can still be retrieved without ever revealing even the nature of thedata. 5. DRAWBACKS While the benefits to homomorphic encryption are great, they do not come without considerable drawbacks. One of the biggest drawbacks is the complexity of the systems. In partially homomorphic cryptosystems, there is not much overhead involved in performing the computations, at least for those presented. However, fully homomorphic encryption requires a lattice-based cryptosystem that is significantly more complex. Implementation of such a cryptosystem even for basic operationsrequiressignificantly more complicated computations and massive ciphertext sizes. Another potential drawback of homomorphic cryptosystems is that in some cases, they are vulnerable to malware. 6. CONCLUSION Homomorphic cryptosystems allow for the same level of privacy as any other cryptosystem, while also allowing for operations to be performed on the data without the need to see the actual data. Indeed, the idea of HE has been around forover 30 years; however, the first plausible and achievable Fully Homomorphic Encryption (FHE) scheme was introduced by CraigGentry in 2009. Since then,differentFHE schemes demonstrated that FHE still needs to be improved significantlyto be practicalon everyplatformastheyarevery expensive for real-life applications. Hence, in this paper, we surveyedthe HE and FHE schemes. Specifically,startingfrom the basics of HE, the details of the well-known Partially HE (PHE) and Somewhat HE (SWHE), which are important pillars of achieving FHE, were presented. REFERENCES 1. Nitesh Aggarwal, Cp Gupta, and Iti Sharma. 2014. Fully Homomorphic symmetric scheme without bootstrapping.In Cloud Computing and Internet of Things (CCIOT), 2014 International Conference on.IEEE, 14–17. 2. S Sobitha Ahila and KL Shunmuganathan. 2014. State Of Art in Homomorphic Encryption Schemes. International Journal of Engineering Research and Applications 4, 2 (2014), 37–43. 3. Gentry, C. A fully homomorphic encryption scheme. Doctoral Dissertation, Stanford University, 2009. 4. Gentry, C., Sahai, A. and Waters, B. Homomorphic encryption from learning with errors:conceptually- simpler, asymptotically-faster, attribute-based. In Advances in Cryptology, Proceedings of CRYPTO '13. R. Canetti and J. Garay (Eds.). Springer, Berlin Heidelberg, 2013, 75-92.MufutauAkinwande.2009.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1099 Advances in Homomorphic Cryptosystems. J. UCS 15, 3 (2009), 506–522. 5. Zvika Brakerski, Craig Gentry, and Vinod Vaikuntanathan. 2014. (Leveled) Fully Homomorphic Encryption Without Bootstrapping. ACM Trans. Comput. Theory 6, 3, Article 13 (July 2014), 36 pages. DOI:http://dx.doi.org/10.1145/2633600. 6. Zhigang Chen, JianWang, ZengNian Zhang,andSong Xinxia. 2014. A fully homomorphic encryption schemewith better key size. Communications,China 11, 9 (2014), 82–92. 7. Michael Clear and Ciarán McGoldrick. 2015. Multi- identity and multi-key leveled FHE from learning witherrors. In Annual Cryptology Conference. Springer, 630–656. 8. Léo Ducas and Daniele Micciancio. 2014. A Fully Homomorphic Encryption library https://github.com/lducas/FHEW. (2014). Accessed at December, 2015. 9. Junfeng Fan and Frederik Vercauteren. 2012a. Somewhat Practical Fully Homomorphic Encryption. IACR Cryptology ePrint Archive 2012 (2012), 144. 10. Shai Halevi and Victor Shoup. 2013b. An Implementation of homomorphi encryption. https://github.com/shaih/HElib. (2013). Accessed at December, 2015. 11. Hao-Miao Yang, Qi Xia, Xiao-fen Wang,andDian-hua Tang. 2012. A new somewhat homomorphic encryption scheme over integers. In Computer Distributed Control and Intelligent Environmental Monitoring (CDCIEM), 2012 International Conference on. IEEE, 61–64. 12. Goldwasser, S. and Micali, S. Probabilistic encryption. Journal of Computer and System Sciences 28, 2 (1984), 270-299. 13. ElGamal, T. A public key cryptosystem and a signature scheme based on discrete logarithms. In Advances in Cryptology, Proceedings of CRYPTO '84. G. Blakley and D. Chaum (Eds.). Springer, Berlin Heidelberg, 1985, 1018. 14. Rivest, R., Shamir, A. and Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21, 2 (1978), 120-126. 15. Boneh, D. The decision Diffie-Hellman problem. In Algorithmic Number Theory, Proceedings of the Third International Symposium (ANTS-III) (Portland, June 21-25). J.Buhler (Ed.). Springer, Berlin Heidelberg, 1998, 4863. 16. Paillier, P. Public-key cryptosystems based on composite degree residuosity classes. In Eurocrypt, 1999. 17. Rivest, R., Adleman, L. and Dertouzos, M. On data banks and privacy homomorphisms.InFoundations of Secure Computation 4, 11 (1978), 169-180. 18. Boneh, D., Goh, E.-J. and Nissim, K. Evaluating2-DNF formulason ciphertexts. In TheoryofCryptography, Proceedings of the Second Theory of Cryptography Conference (TCC) (Cambridge, February 10-12). J. Kilian (Ed.). Springer, Berlin Heidelberg, 2005,325- 341.