ENHANCING CLOUD SECURITY: A LIGHTWEIGHT HOMOMORPHIC ENCRYPTION APPROACH TO ANOMALY DETECTION
Charlie Edwards , Computer Science & Software Engineering, School of Science, Rmit University, AustraliaAbstract
With the increasing adoption of cloud computing, ensuring data privacy and security has become a critical challenge, particularly in the context of anomaly detection. This study proposes a lightweight homomorphic encryption-based approach to enhance cloud security by enabling privacy-preserving anomaly detection. Homomorphic encryption allows computations to be performed on encrypted data without the need for decryption, ensuring that sensitive information remains protected throughout the detection process. The paper explores the implementation of a lightweight encryption scheme that balances both computational efficiency and strong security, making it suitable for real-time anomaly detection in cloud environments. The proposed method is evaluated against traditional encryption approaches, demonstrating its capability to detect anomalous behaviors without exposing raw data to cloud service providers. Results indicate that the lightweight homomorphic encryption method maintains high levels of accuracy in detecting anomalies while ensuring minimal performance overhead, making it a promising solution for secure cloud-based anomaly detection systems. This work contributes to advancing privacy-preserving techniques in cloud security and paves the way for more secure and efficient cloud computing applications.
Keywords
Cloud security, Anomaly detection, Homomorphic encryption
References
C.C. Aggarwal, Data Mining – The Textbook, Springer, 2015.
K. Li, H. Jiang, L.T. Yang, A. Cuzzocrea (Eds.), Big Data – Algorithms, Analytics, and Applications, Chapman and Hall/CRC, 2015, http://www.crcnetbase.com/isbn/978-1-4822-4056-6.
R. Agrawal, A. Kadadi, X. Dai, F. Andrès, Challenges and opportunities with big data visualization, in: Proceedings of the 7th International Conference on Management of Computational and Collective IntElligence in Digital EcoSystems, Caraguatatuba, Brazil, October 25–29, 2015, 2015, pp. 169–173.
I.A.T. Hashem, I. Yaqoob, N.B. Anuar, S. Mokhtar, A. Gani, S.U. Khan, The rise of “big data” on cloud computing: review and open research issues, Inf.Syst. 47 (2015) 98–115, http://dx.doi.org/10.1016/j.is.2014.07.006.
Gvero, Cloud computing concepts, technology and architecture by Thomas Erl, Zaigham Mahmood and Ricardo Puttini, ACM SIGSOFT Softw. Eng.Notes 39 (4) (2014) 37–38, http://dx.doi.org/10.1145/2632434.2632462.
S. Subashini, V. Kavitha, A survey on security issues in service delivery models of cloud computing, J. Netw. Comput. Appl. 34 (1) (2011) 1–11, http://dx.doi.org/10.1016/j.jnca.2010.07.006.
D. Zissis, D. Lekkas, Addressing cloud computing security issues, Future Gener. Comput. Syst. 28 (3) (2012) 583–592, http://dx.doi.org/10.1016/j.future.2010.12.006.
K.W. Hamlen, M. Kantarcioglu, L. Khan, B.M. Thuraisingham, Security issues for cloud computing, Int. J. Inf. Secur. Priv. 4 (2) (2010) 36–48, http://dx.doi.org/10.4018/jisp.2010040103.
H. Kumarage, I. Khalil, Z. Tari, A.Y. Zomaya, Distributed anomaly detection for industrial wireless sensor networks based on fuzzy data modelling, J. Parallel Distrib. Comput. 73 (6) (2013) 790–806, http://dx.doi.org/10.1016/j.jpdc.2013.02.004.
J. Domingo-Ferrer, A provably secure additive and multiplicative privacy homomorphism, in: Information Security, 5th International Conference, ISC 2002 Sao Paulo, Brazil, September 30–October 2, 2002, Proceedings, 2002, pp. 471–483.
Article Statistics
Downloads
Copyright License
Copyright (c) 2025 Charlie Edwards
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Copyright and Ethics:
- Authors are responsible for obtaining permission to use any copyrighted materials included in their manuscript.
- Authors are also responsible for ensuring that their research was conducted in an ethical manner and in compliance with institutional and national guidelines for the care and use of animals or human subjects.
- By submitting a manuscript to International Journal of Computer Science & Information System (IJCSIS), authors agree to transfer copyright to the journal if the manuscript is accepted for publication.