Preservation of Confidentiality Based on Homomorphic Encryption Library for IoT

Zh. E. Temirbekova, Nurdaulet Kabdygaliyev, Z. Abdiakhmetova, Gulzat Turken
{"title":"Preservation of Confidentiality Based on Homomorphic Encryption Library for IoT","authors":"Zh. E. Temirbekova, Nurdaulet Kabdygaliyev, Z. Abdiakhmetova, Gulzat Turken","doi":"10.1109/SIST58284.2023.10223494","DOIUrl":null,"url":null,"abstract":"The Internet of Things (IoT) is the term used to describe the connectivity of different physical objects, including sensors, appliances, vehicles, and other devices, which are equipped with electronics, software, and sensors to gather and share data. These devices produce a significant volume of confidential information that requires safeguarding against unauthorized access or disclosure. Homomorphic encryption can play a significant role in preserving confidentiality in IoT environments. It enables data to be processed without revealing the underlying data or the results of the computation. This means that sensitive data generated by IoT devices can be encrypted using homomorphic encryption, and computations can be performed on the encrypted data, while maintaining confidentiality. A homomorphic encryption library designed for IoT can allow IoT devices to securely and efficiently perform computations on encrypted data, without exposing the data to any third party or intermediary. This can help prevent data breaches and unauthorized access to sensitive IoT data, which is crucial in many industries, such as healthcare, finance, and transportation. The number of smart devices is growing at an incredible rate, as is the interest of people in these devices. Devices send data wirelessly and are good targets for hackers. To prevent such situations, you must first protect the microcontroller built into the devices. For this purpose, the fully homomorphic encryption library «HomomorphicControllerVersion_01» was developed. The article proposes the architecture of the library of fully homomorphic operations on integers. The library supports basic homomorphic operations (addition, subtraction, multiplication, division) on integers. On the basis of the proposed method of homomorphic division and the architecture of the library, the library of homomorphic operations on integers was implemented. The article also provides measurements of the time required to perform certain operations on encrypted data and analyzes the efficiency of the developed implementation of the library.","PeriodicalId":367406,"journal":{"name":"2023 IEEE International Conference on Smart Information Systems and Technologies (SIST)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE International Conference on Smart Information Systems and Technologies (SIST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SIST58284.2023.10223494","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The Internet of Things (IoT) is the term used to describe the connectivity of different physical objects, including sensors, appliances, vehicles, and other devices, which are equipped with electronics, software, and sensors to gather and share data. These devices produce a significant volume of confidential information that requires safeguarding against unauthorized access or disclosure. Homomorphic encryption can play a significant role in preserving confidentiality in IoT environments. It enables data to be processed without revealing the underlying data or the results of the computation. This means that sensitive data generated by IoT devices can be encrypted using homomorphic encryption, and computations can be performed on the encrypted data, while maintaining confidentiality. A homomorphic encryption library designed for IoT can allow IoT devices to securely and efficiently perform computations on encrypted data, without exposing the data to any third party or intermediary. This can help prevent data breaches and unauthorized access to sensitive IoT data, which is crucial in many industries, such as healthcare, finance, and transportation. The number of smart devices is growing at an incredible rate, as is the interest of people in these devices. Devices send data wirelessly and are good targets for hackers. To prevent such situations, you must first protect the microcontroller built into the devices. For this purpose, the fully homomorphic encryption library «HomomorphicControllerVersion_01» was developed. The article proposes the architecture of the library of fully homomorphic operations on integers. The library supports basic homomorphic operations (addition, subtraction, multiplication, division) on integers. On the basis of the proposed method of homomorphic division and the architecture of the library, the library of homomorphic operations on integers was implemented. The article also provides measurements of the time required to perform certain operations on encrypted data and analyzes the efficiency of the developed implementation of the library.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于同态加密库的物联网保密保护
物联网(IoT)是一个术语,用于描述不同物理对象的连接,包括传感器、电器、车辆和其他设备,这些设备配备了电子设备、软件和传感器来收集和共享数据。这些设备产生大量的机密信息,需要防止未经授权的访问或泄露。同态加密在保护物联网环境中的机密性方面可以发挥重要作用。它允许在不泄露底层数据或计算结果的情况下处理数据。这意味着物联网设备产生的敏感数据可以使用同态加密进行加密,并且可以在加密数据上进行计算,同时保持机密性。为物联网设计的同态加密库可以允许物联网设备安全有效地对加密数据执行计算,而不会将数据暴露给任何第三方或中介。这有助于防止数据泄露和未经授权访问敏感物联网数据,这在医疗保健、金融和交通等许多行业至关重要。智能设备的数量正以惊人的速度增长,人们对这些设备的兴趣也在增长。设备以无线方式发送数据,是黑客的好目标。为了防止这种情况,您必须首先保护内置于设备中的微控制器。为此,开发了完全同态加密库«HomomorphicControllerVersion_01»。本文提出了整数上的全同态运算库的体系结构。该库支持整数上的基本同态运算(加、减、乘、除)。在提出的同态除法的基础上,根据库的体系结构,实现了整数同态运算库。本文还提供了对加密数据执行某些操作所需时间的度量,并分析了开发的库实现的效率。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
University Distributed Computer Network Vulnerability Assessment Performance Analysis of Scaling NoSQL vs SQL: A Comparative Study of MongoDB, Cassandra, and PostgreSQL Analysis of the EMF Parameters of the Stator Winding in the Run-Down Mode for Diagnosing Faults in an Induction Motor About the Need to Attract Girls to Education Using the Stem Methodology in the Informatics Educational Program Preservation of Confidentiality Based on Homomorphic Encryption Library for IoT
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1