Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Item TypeItem Type
-
SubjectSubject
-
YearFrom:-To:
-
More FiltersMore FiltersSourceLanguage
Done
Filters
Reset
774
result(s) for
"homomorphic encryption"
Sort by:
HealthLock: Blockchain-Based Privacy Preservation Using Homomorphic Encryption in Internet of Things Healthcare Applications
by
Abdulwahab Ali Almazroi
,
Abdulaleem Ali Almazroi
,
Bander Ali Saleh Al-rimy
in
Blockchain
,
blockchain; cybersecurity; machine learning; intrusion detection; homomorphic encryption; cloud computing
,
Chemical technology
2023
The swift advancement of the Internet of Things (IoT), coupled with the growing application of healthcare software in this area, has given rise to significant worries about the protection and confidentiality of critical health data. To address these challenges, blockchain technology has emerged as a promising solution, providing decentralized and immutable data storage and transparent transaction records. However, traditional blockchain systems still face limitations in terms of preserving data privacy. This paper proposes a novel approach to enhancing privacy preservation in IoT-based healthcare applications using homomorphic encryption techniques combined with blockchain technology. Homomorphic encryption facilitates the performance of calculations on encrypted data without requiring decryption, thus safeguarding the data’s privacy throughout the computational process. The encrypted data can be processed and analyzed by authorized parties without revealing the actual contents, thereby protecting patient privacy. Furthermore, our approach incorporates smart contracts within the blockchain network to enforce access control and to define data-sharing policies. These smart contracts provide fine-grained permission settings, which ensure that only authorized entities can access and utilize the encrypted data. These settings protect the data from being viewed by unauthorized parties. In addition, our system generates an audit record of all data transactions, which improves both accountability and transparency. We have provided a comparative evaluation with the standard models, taking into account factors such as communication expense, transaction volume, and security. The findings of our experiments suggest that our strategy protects the confidentiality of the data while at the same time enabling effective data processing and analysis. In conclusion, the combination of homomorphic encryption and blockchain technology presents a solution that is both resilient and protective of users’ privacy for healthcare applications integrated with IoT. This strategy offers a safe and open setting for the management and exchange of sensitive patient medical data, while simultaneously preserving the confidentiality of the patients involved.
Journal Article
A systematic review of homomorphic encryption and its contributions in healthcare industry
2023
Cloud computing and cloud storage have contributed to a big shift in data processing and its use. Availability and accessibility of resources with the reduction of substantial work is one of the main reasons for the cloud revolution. With this cloud computing revolution, outsourcing applications are in great demand. The client uses the service by uploading their data to the cloud and finally gets the result by processing it. It benefits users greatly, but it also exposes sensitive data to third-party service providers. In the healthcare industry, patient health records are digital records of a patient’s medical history kept by hospitals or health care providers. Patient health records are stored in data centers for storage and processing. Before doing computations on data, traditional encryption techniques decrypt the data in their original form. As a result, sensitive medical information is lost. Homomorphic encryption can protect sensitive information by allowing data to be processed in an encrypted form such that only encrypted data is accessible to service providers. In this paper, an attempt is made to present a systematic review of homomorphic cryptosystems with its categorization and evolution over time. In addition, this paper also includes a review of homomorphic cryptosystem contributions in healthcare.
Journal Article
Towards Secure Big Data Analysis via Fully Homomorphic Encryption Algorithms
2022
Privacy-preserving techniques allow private information to be used without compromising privacy. Most encryption algorithms, such as the Advanced Encryption Standard (AES) algorithm, cannot perform computational operations on encrypted data without first applying the decryption process. Homomorphic encryption algorithms provide innovative solutions to support computations on encrypted data while preserving the content of private information. However, these algorithms have some limitations, such as computational cost as well as the need for modifications for each case study. In this paper, we present a comprehensive overview of various homomorphic encryption tools for Big Data analysis and their applications. We also discuss a security framework for Big Data analysis while preserving privacy using homomorphic encryption algorithms. We highlight the fundamental features and tradeoffs that should be considered when choosing the right approach for Big Data applications in practice. We then present a comparison of popular current homomorphic encryption tools with respect to these identified characteristics. We examine the implementation results of various homomorphic encryption toolkits and compare their performances. Finally, we highlight some important issues and research opportunities. We aim to anticipate how homomorphic encryption technology will be useful for secure Big Data processing, especially to improve the utility and performance of privacy-preserving machine learning.
Journal Article
A Hybrid Privacy-Preserving Deep Learning Approach for Object Classification in Very High-Resolution Satellite Images
2022
Deep learning (DL) has shown outstanding performances in many fields, including remote sensing (RS). DL is turning into an essential tool for the RS research community. Recently, many cloud platforms have been developed to provide access to large-scale computing capacity, consequently permitting the usage of DL architectures as a service. However, this opened the door to new challenges associated with the privacy and security of data. The RS data used to train the DL algorithms have several privacy requirements. Some of them need a high level of confidentiality, such as satellite images related to public security with high spatial resolutions. Moreover, satellite images are usually protected by copyright, and the owner may strictly refuse to share them. Therefore, privacy-preserving deep learning (PPDL) techniques are a possible solution to this problem. PPDL enables training DL on encrypted data without revealing the original plaintext. This study proposes a hybrid PPDL approach for object classification for very-high-resolution satellite images. The proposed encryption scheme combines Paillier homomorphic encryption (PHE) and somewhat homomorphic encryption (SHE). This combination aims to enhance the encryption of satellite images while ensuring a good runtime and high object classification accuracy. The method proposed to encrypt images is maintained through the public keys of PHE and SHE. Experiments were conducted on real-world high-resolution satellite images acquired using the SPOT6 and SPOT7 satellites. Four different CNN architectures were considered, namely ResNet50, InceptionV3, DenseNet169, and MobileNetV2. The results showed that the loss in classification accuracy after applying the proposed encryption algorithm ranges from 2% to 3.5%, with the best validation accuracy on the encrypted dataset reaching 92%.
Journal Article
A Comparative Study of Partially, Somewhat, and Fully Homomorphic Encryption in Modern Cryptographic Libraries
by
Kupcova Eva
,
Khavan Vladyslav
,
Pleva Matúš
in
Benchmarks
,
Cloud computing
,
Comparative studies
2025
Homomorphic encryption enables computations to be performed directly on encrypted data, ensuring data confidentiality even in untrusted or distributed environments. Although this approach provides strong theoretical security, its practical adoption remains limited due to high computational and memory requirements. This study presents a comparative evaluation of three representative homomorphic encryption paradigms: partially, somewhat, and fully homomorphic encryption. The implementations are based on the GMP library, Microsoft SEAL, and OpenFHE. The analysis examines encryption and decryption time, ciphertext expansion, and memory usage under various parameter configurations, including different polynomial modulus degrees. The goal is to provide a transparent and reproducible comparison that illustrates the practical differences among these approaches. The results highlight the trade-offs between security, efficiency, and numerical precision, identifying cases where lightweight schemes can achieve acceptable performance for latency-sensitive or resource-constrained applications. These findings offer practical guidance for deploying homomorphic encryption in secure cloud-based computation and other privacy-preserving environments.
Journal Article
A Comparative Study of Privacy-Preserving Homomorphic Encryption Techniques in Cloud Computing
by
Joshi, Bineet
,
Mishra, Anupama
,
Peraković, Dragan
in
Access control
,
Cloud computing
,
Comparative analysis
2022
In cloud computing, a third party hosts a client's data, which raises privacy and security concerns. To maintain privacy, data should be encrypted by cryptographic techniques. However, encrypting the data makes it unsuitable for indexing and fast processing, as data needs to be decrypted to plain text before it can be further processed. Homomorphic encryption helps to overcome this shortcoming by allowing users to perform operations on encrypted data without decryption. Many academics have attempted to address the issue of data security, but none have addressed the issue of data privacy in cloud computing as thoroughly as this study has. This paper discusses the challenges involved in maintaining the privacy of cloud-based data and the techniques used to address these challenges. It was identified that homomorphic encryption is the best solution of all. This work also identified and compared the various homomorphic encryption schemes which are capable of ensuring the privacy of data in cloud storage and ways to implement them through libraries.
Journal Article
Recent advances of privacy-preserving machine learning based on (Fully) Homomorphic Encryption
2025
Fully Homomorphic Encryption (FHE), known for its ability to process encrypted data without decryption, is a promising technique for solving privacy concerns in the machine learning era. However, there are many kinds of available FHE schemes and way more FHE-based solutions in the literature, and they are still fast evolving, making it difficult to get a complete view. This article aims to introduce recent representative results of FHE-based privacy-preserving machine learning, helping users understand the pros and cons of different kinds of solutions, and choose an appropriate approach for their needs.
Journal Article
Homomorphic Encryption-Based Federated Privacy Preservation for Deep Active Learning
2022
Active learning is a technique for maximizing performance of machine learning with minimal labeling effort and letting the machine automatically and adaptively select the most informative data for labeling. Since the labels on records may contain sensitive information, privacy-preserving mechanisms should be integrated into active learning. We propose a privacy-preservation scheme for active learning using homomorphic encryption-based federated learning. Federated learning provides distributed computation from multiple clients, and homomorphic encryption enhances the privacy preservation of user data with a strong security level. The experimental result shows that the proposed homomorphic encryption-based federated learning scheme can preserve privacy in active learning while maintaining model accuracy. Furthermore, we also provide a Deep Leakage Gradient comparison. The proposed scheme has no gradient leakage compared to the related schemes that have more than 74% gradient leakage.
Journal Article
Paillier cryptosystem enhancement for Homomorphic Encryption technique
by
Mohammed, Saja J.
,
Taha, Dujan B.
in
Algorithms
,
Cloud computing
,
Computer Communication Networks
2024
Homomorphic Encryption (HE) is one of the most popular technologies which assists for keeping the confidentiality and privacy of user data on cloud storage. It can apply a mathematical computation to the ciphertext and return the result as if the operation was performed on the corresponding plaintext. Many of algorithms are known as a class of this interested technology, one of them is Paillier cryptosystem. This paper offers two solutions (MPEA-A and MPEA-B) for Paillier's cryptosystem bottleneck problem which causes delay in Paillier decrypting procedures. MPEA-A and MPEA-B algorithms are based on the Chinese Reminder Theorem CRT with appended principles to achieve the desired goal. Practical implementations are applied to the proposed algorithms, The results show that the two algorithms succeeded in reducing the decryption time with various ratios. The practical implementation proved that MPEA-A can be useful for encrypting with a medium Paillier key size, whereas MPEA-B is preferred for encrypting in a large key size value.
Journal Article
Research Review on the Application of Homomorphic Encryption in Database Privacy Protection
2021
With the advent and development of database applications such as big data and data mining, how to ensure the availability of data without revealing sensitive information has been a significant problem for database privacy protection. As a critical technology to solve this problem, homomorphic encryption has become a hot research area in information security at home and abroad in recent years. The paper sorted out, analyzed, and summarized the research progress of homomorphic encryption technology in database privacy protection. Moreover, the application of three different types of homomorphic encryption technology in database privacy protection was introduced respectively, and the rationale and characteristics of each technique were analyzed and explained. Ultimately, this research summarized the challenges and development trends of homomorphic encryption technology in the application of database privacy protection, which provides a reference for future research.
Journal Article