Loading

Homomorphic Encryption Over Databases
Jayakrishnan Ashok1, K. N. Dheeraj2, Chaitanya Subhedar3, Rajeev Tiwari4

1Jayakrishnan Ashok, RPA Developer, Huron Consulting Group, Bangalore.
2K. N. Dheeraj, Asscoiate Software Engineer, Leanapps, Pune.
3Chaitanya Subhedar, MS, Scholar, Purdue University, US.
4Rajeev Tiwari, Associate Professor, School of Computer Science, UPES, Dehradun, India.
Manuscript received on 03 June 2019 | Revised Manuscript received on 07 June 2019 | Manuscript published on 30 June 2019 | PP: 1983-1990 | Volume-8 Issue-8, June 2019 | Retrieval Number: G5854058719/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Human’s need for storing data efficiently is perpetual. when relying on third-party services for data storage, whether storing personal or critical data, even though claimed to be completely secure, cannot be trustworthy. During security breaches or situation of personal infringement of the service provider, the need for a mechanism which can be used to protect data from any kind of unauthorised disclosures. This paper aims to showcase the capability of an encryption method that is secure and powerful in providing security to users by encrypting their data by using Homomorphism. This research work includes protecting information through encrypting data, and decryption of this data should only occur if the authorized personal requests for such needs. Else, other entities in the system will be interacting with the data in a special format which is established by the algorithm, and able to manipulate the data in the database without decrypting it at any point of time. We present a system which uses homomorphic encryption on relational database that helps to ensure the security components like integrity, confidentiality and availability of the data. The architecture introduced in this paper, is designed to fire SQL queries over encrypted data, encrypted using Paillier encryption-scheme, and perform operation directly over the encrypted text as it would perform directly on plain text.
Keywords: Homomorphism, Encryption, Homomorphic Encryption, Additive and Multiplicative Homomorphism.

Scope of the Article: Encryption Methods and Tools