PRIVACY-PRESERVING TECHNIQUES IN BIG DATA AND INFORMATION SECURITY
Abstract
In the era of big data, ensuring privacy while processing vast amounts of sensitive information poses a significant challenge. Traditional encryption methods often fall short in maintaining both privacy and data utility during computation. This paper introduces Two-Trapdoor Homomorphic Encryption (TTHE), a novel approach designed to enhance privacy-preserving capabilities in big data and information security. TTHE combines the strengths of trapdoor functions with homomorphic encryption to enable secure data processing without compromising privacy. With the exponential growth of data, safeguarding sensitive information has become a critical concern. Existing encryption schemes often struggle to balance between privacy preservation and computational efficiency. Homomorphic encryption offers a potential solution by allowing computations on encrypted data, but current methods are limited by performance and scalability issues. The key challenge addressed is the inefficiency and performance bottlenecks in current homomorphic encryption schemes, which hinder their practical application in big data environments. Traditional methods often face limitations in processing large datasets efficiently while maintaining robust security. TTHE is proposed as an enhancement over traditional homomorphic encryption. It integrates two distinct trapdoor functions to provide a dual-layer security approach, enabling efficient and scalable computation on encrypted data. The method involves a novel encryption scheme where operations on ciphertexts are performed without decryption, preserving data privacy throughout the process. Extensive experiments demonstrate that TTHE significantly improves both computational efficiency and security. The proposed method achieved a processing speed increase of 45% compared to conventional homomorphic encryption schemes. Additionally, TTHE maintained a privacy level with a security strength of 128-bit encryption, providing robust protection against potential attacks.

Authors
S. Murugesan1, S. Ashok Kumar2, K. Tamilselvi3, T. Thiyagarajan4
Tagore Engineering College, India1, Annamacharya University, India2, P. A. College of Engineering and Technology, India3, Nehru Institute of Information Technology and Management, India4

Keywords
Privacy-Preserving, Homomorphic Encryption, Big Data, Trapdoor Functions, Information Security
Yearly Full Views
JanuaryFebruaryMarchAprilMayJuneJulyAugustSeptemberOctoberNovemberDecember
00000000052350
Published By :
ICTACT
Published In :
ICTACT Journal on Communication Technology
( Volume: 15 , Issue: 3 , Pages: 3320 - 3324 )
Date of Publication :
September 2024
Page Views :
352
Full Text Views :
87

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.