Articles | Open Access |

ENHANCING CLOUD SECURITY: A LIGHTWEIGHT HOMOMORPHIC ENCRYPTION APPROACH TO ANOMALY DETECTION

Charlie Edwards , Computer Science & Software Engineering, School of Science, Rmit University, Australia

Abstract

With the increasing adoption of cloud computing, ensuring data privacy and security has become a critical challenge, particularly in the context of anomaly detection. This study proposes a lightweight homomorphic encryption-based approach to enhance cloud security by enabling privacy-preserving anomaly detection. Homomorphic encryption allows computations to be performed on encrypted data without the need for decryption, ensuring that sensitive information remains protected throughout the detection process. The paper explores the implementation of a lightweight encryption scheme that balances both computational efficiency and strong security, making it suitable for real-time anomaly detection in cloud environments. The proposed method is evaluated against traditional encryption approaches, demonstrating its capability to detect anomalous behaviors without exposing raw data to cloud service providers. Results indicate that the lightweight homomorphic encryption method maintains high levels of accuracy in detecting anomalies while ensuring minimal performance overhead, making it a promising solution for secure cloud-based anomaly detection systems. This work contributes to advancing privacy-preserving techniques in cloud security and paves the way for more secure and efficient cloud computing applications.

Keywords

Cloud security, Anomaly detection, Homomorphic encryption

References

C.C. Aggarwal, Data Mining – The Textbook, Springer, 2015.

K. Li, H. Jiang, L.T. Yang, A. Cuzzocrea (Eds.), Big Data – Algorithms, Analytics, and Applications, Chapman and Hall/CRC, 2015, http://www.crcnetbase.com/isbn/978-1-4822-4056-6.

R. Agrawal, A. Kadadi, X. Dai, F. Andrès, Challenges and opportunities with big data visualization, in: Proceedings of the 7th International Conference on Management of Computational and Collective IntElligence in Digital EcoSystems, Caraguatatuba, Brazil, October 25–29, 2015, 2015, pp. 169–173.

I.A.T. Hashem, I. Yaqoob, N.B. Anuar, S. Mokhtar, A. Gani, S.U. Khan, The rise of “big data” on cloud computing: review and open research issues, Inf.Syst. 47 (2015) 98–115, http://dx.doi.org/10.1016/j.is.2014.07.006.

Gvero, Cloud computing concepts, technology and architecture by Thomas Erl, Zaigham Mahmood and Ricardo Puttini, ACM SIGSOFT Softw. Eng.Notes 39 (4) (2014) 37–38, http://dx.doi.org/10.1145/2632434.2632462.

S. Subashini, V. Kavitha, A survey on security issues in service delivery models of cloud computing, J. Netw. Comput. Appl. 34 (1) (2011) 1–11, http://dx.doi.org/10.1016/j.jnca.2010.07.006.

D. Zissis, D. Lekkas, Addressing cloud computing security issues, Future Gener. Comput. Syst. 28 (3) (2012) 583–592, http://dx.doi.org/10.1016/j.future.2010.12.006.

K.W. Hamlen, M. Kantarcioglu, L. Khan, B.M. Thuraisingham, Security issues for cloud computing, Int. J. Inf. Secur. Priv. 4 (2) (2010) 36–48, http://dx.doi.org/10.4018/jisp.2010040103.

H. Kumarage, I. Khalil, Z. Tari, A.Y. Zomaya, Distributed anomaly detection for industrial wireless sensor networks based on fuzzy data modelling, J. Parallel Distrib. Comput. 73 (6) (2013) 790–806, http://dx.doi.org/10.1016/j.jpdc.2013.02.004.

J. Domingo-Ferrer, A provably secure additive and multiplicative privacy homomorphism, in: Information Security, 5th International Conference, ISC 2002 Sao Paulo, Brazil, September 30–October 2, 2002, Proceedings, 2002, pp. 471–483.

Article Statistics

Downloads

Download data is not yet available.

Copyright License

Download Citations

How to Cite

Charlie Edwards. (2025). ENHANCING CLOUD SECURITY: A LIGHTWEIGHT HOMOMORPHIC ENCRYPTION APPROACH TO ANOMALY DETECTION. International Journal of Computer Science & Information System, 10(01), 1–5. Retrieved from https://scientiamreearch.org/index.php/ijcsis/article/view/144