Secure and efficient outsourced computation in cloud computing environments is crucial for ensuring data confidentiality, integrity, and resource optimization. In this research, we propose novel algorithms and methodologies to address these challenges. Through a series of experiments, we evaluate the performance, security, and efficiency of the proposed algorithms in real-world cloud environments. Our results demonstrate the effectiveness of homomorphic encryption-based secure computation, secure multiparty computation, and trusted execution environment-based approaches in mitigating security threats while ensuring efficient resource utilization. Specifically, our homomorphic encryption-based algorithm exhibits encryption times ranging from 20 to 1000 milliseconds and decryption times ranging from 25 to 1250 milliseconds for payload sizes varying from 100 KB to 5000 KB. Furthermore, our comparative analysis against state-of-the-art solutions reveals the strengths of our proposed algorithms in terms of security guarantees, encryption overhead, and communication latency.
References
[1]
Afzali, M., Pourmohammadi, H. and Mohammad Vali Samani, A. (2022) An Efficient Framework for Trust Evaluation of Secure Service Selection in Fog Computing Based on QoS, Reputation, and Social Criteria. Computing, 104, 1643-1675. https://doi.org/10.1007/s00607-022-01053-w
[2]
Alshareef, H.N. (2023) Current Development, Challenges, and Future Trends in Cloud Computing: A Survey. InternationalJournalofAdvancedComputerScienceandApplications, 14, 329-338. https://doi.org/10.14569/ijacsa.2023.0140337
[3]
Anu, T.S. and Gopika, P. (2024) Privacy Preserving Many-Sided Shield in Cloud Environment. International Research Journal of Innovations in Engineering and Technology, 8, 148-154.
[4]
Hundera, N.W., Jin, C., Geressu, D.M., Aftab, M.U., Olanrewaju, O.A. and Xiong, H. (2021) Proxy-Based Public-Key Cryptosystem for Secure and Efficient IoT-Based Cloud Data Sharing in the Smart City. MultimediaToolsandApplications, 81, 29673-29697. https://doi.org/10.1007/s11042-021-11685-3
[5]
Jia, H., Cai, D., Yang, J., Qian, W., Wang, C., Li, X., et al. (2023) Efficient and Privacy-Preserving Image Classification Using Homomorphic Encryption and Chunk-Based Convolutional Neural Network. JournalofCloudComputing, 12, Article No. 175. https://doi.org/10.1186/s13677-023-00537-0
[6]
Jin, X., Hua, W., Wang, Z. and Chen, Y. (2022) A Survey of Research on Computation Offloading in Mobile Cloud Computing. WirelessNetworks, 28, 1563-1585. https://doi.org/10.1007/s11276-022-02920-2
[7]
Khan, N., Jianbiao, Z., Lim, H., Ali, J., Ullah, I., Salman Pathan, M., et al. (2023) An ECC-Based Mutual Data Access Control Protocol for Next-Generation Public Cloud. JournalofCloudComputing, 12, Article No. 101. https://doi.org/10.1186/s13677-023-00464-0
[8]
Kumar, A., Khan, S.B., Pandey, S.K., Shankar, A., Maple, C., Mashat, A., et al. (2023) Development of a Cloud-Assisted Classification Technique for the Preservation of Secure Data Storage in Smart Cities. JournalofCloudComputing, 12, Article No. 92. https://doi.org/10.1186/s13677-023-00469-9
[9]
Lavanya, S. and Saravanakumar, N.M. (2022) Secured Two Factor Authentication, Graph Based Replication and Encryption Strategy in Cloud Computing. MultimediaToolsandApplications, 82, 16105-16125. https://doi.org/10.1007/s11042-022-13838-4
[10]
Yan, L., Wang, G., Yin, T., Liu, P., Feng, H., Zhang, W., et al. (2024) Attribute-Based Searchable Encryption: A Survey. Electronics, 13, Article 1621. https://doi.org/10.3390/electronics13091621
[11]
Lin, W., Ma, J., Li, T., Ye, H., Zhang, J. and Xiao, Y. (2024) CrptAC: Find the Attack Chain with Multiple Encrypted System Logs. Electronics, 13, Article 1378. https://doi.org/10.3390/electronics13071378
[12]
Liu, X., Liu, X., Xiong, N., Luo, D., Xu, G. and Chen, X. (2023) AAJS: An Anti-Malicious Attack Graphic Similarity Judgment System in Cloud Computing Environments. Electronics, 12, Article 1983. https://doi.org/10.3390/electronics12091983
[13]
Lu, Y., Wu, Z., Zhang, B. and Ren, K. (2023) Efficient Secure Computation from SM Series Cryptography. WirelessCommunicationsandMobileComputing, 2023, Article ID: 6039034. https://doi.org/10.1155/2023/6039034
[14]
Malik, A.W., Bhatti, D.S., Park, T., Ishtiaq, H.U., Ryou, J. and Kim, K. (2024) Cloud Digital Forensics: Beyond Tools, Techniques, and Challenges. Sensors, 24, Article 433. https://doi.org/10.3390/s24020433
[15]
Mangala, N., Eswara Reddy, B. and Venugopal, K.R. (2023) Light Weight Circular Error Learning Algorithm (CELA) for Secure Data Communication Protocol in IoT-Cloud Systems. InternationalJournalofAdvancedComputerScienceandApplications, 14, 845-858. https://doi.org/10.14569/ijacsa.2023.0140792
[16]
Arif, M., Ajesh, F., Shamsudheen, S. and Shahzad, M. (2022) Secure and Energy-Efficient Computational Offloading Using LSTM in Mobile Edge Computing. SecurityandCommunicationNetworks, 2022, Article ID: 4937588. https://doi.org/10.1155/2022/4937588
[17]
Babenko, M., Golimblevskaia, E., Tchernykh, A., Shiriaev, E., Ermakova, T., Pulido-Gaytan, L.B., et al. (2023) A Comparative Study of Secure Outsourced Matrix Multiplication Based on Homomorphic Encryption. BigDataandCognitiveComputing, 7, Article 84. https://doi.org/10.3390/bdcc7020084
[18]
Babenko, M., Tchernykh, A., Pulido-Gaytan, B., Avetisyan, A., Nesmachnow, S., Wang, X., et al. (2022) Towards the Sign Function Best Approximation for Secure Outsourced Computations and Control. Mathematics, 10, Article 2006. https://doi.org/10.3390/math10122006
[19]
Dabra, M., Sharma, S., Kumar, S. and Min, H. (2024) An Improved Finegrained Ciphertext Policy Based Temporary Keyword Search on Encrypted Data for Secure Cloud Storage. ScientificReports, 14, Article No. 5264. https://doi.org/10.1038/s41598-024-56112-3
[20]
Daoud, W.B., Othmen, S., Hamdi, M., Khdhir, R. and Hamam, H. (2023) Fog Computing Network Security Based on Resources Management. EURASIPJournalonWirelessCommunicationsandNetworking, 2023, Article No. 50. https://doi.org/10.1186/s13638-023-02256-1
[21]
Dawood, M., Tu, S., Xiao, C., Alasmary, H., Waqas, M. and Rehman, S.U. (2023) Cyberattacks and Security of Cloud Computing: A Complete Guideline. Symmetry, 15, Article 1981. https://doi.org/10.3390/sym15111981
[22]
Du, J., Dong, G., Ning, J., Xu, Z. and Yang, R. (2024) Identity-Based Controlled Delegated Outsourcing Data Integrity Auditing Scheme. ScientificReports, 14, Article No. 7582. https://doi.org/10.1038/s41598-024-58325-y
[23]
Fan, C., Jia, P., Lin, M., Wei, L., Guo, P., Zhao, X., et al. (2023) Cloud-Assisted Private Set Intersection via Multi-Key Fully Homomorphic Encryption. Mathematics, 11, Article 1784. https://doi.org/10.3390/math11081784
[24]
Fugkeaw, S. (2023) An Efficient and Scalable Vaccine Passport Verification System Based on Ciphertext Policy Attribute-Based Encryption and Blockchain. JournalofCloudComputing, 12, Article No. 111. https://doi.org/10.1186/s13677-023-00486-8
[25]
Guo, X., Li, Y., Jiang, Y., Wang, J. and Fang, J. (2023) Privacy-Preserving K-Nearest Neighbor Classification over Malicious Participants in Outsourced Cloud Environments. Cryptography, 7, Article 59. https://doi.org/10.3390/cryptography7040059
[26]
Hossain, M., Kayas, G., Hasan, R., Skjellum, A., Noor, S. and Islam, S.M.R. (2024) A Holistic Analysis of Internet of Things (IoT) Security: Principles, Practices, and New Perspectives. FutureInternet, 16, Article 40. https://doi.org/10.3390/fi16020040
[27]
Munjal, K. and Bhatia, R. (2022) A Systematic Review of Homomorphic Encryption and Its Contributions in Healthcare Industry. Complex&IntelligentSystems, 9, 3759-3786. https://doi.org/10.1007/s40747-022-00756-z
[28]
Pandipati, B. and Sam, R.P. (2022) Sureness Calamity Salvage Framework with Inventive Bandwidth Scheme for Data Storage in Cloud Computing. MultimediaToolsandApplications, 82, 17567-17598. https://doi.org/10.1007/s11042-022-13745-8
[29]
Park, J. and Lee, D.H. (2022) Parallelly Running and Privacy-Preserving K-Nearest Neighbor Classification in Outsourced Cloud Computing Environments. Electronics, 11, Article 4132. https://doi.org/10.3390/electronics11244132
[30]
Periasamy, J.K., Selvam, L., Anuradha, M. and Kennady, R. (2024) A Fuzzy Optimal Lightweight Convolutional Neural Network for Deduplication Detection in Cloud Server. IranianJournalofFuzzySystems, 21, 33-49.