IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

A Comparative Study of BFV and CKKs Schemes to Secure IoT Data Using TenSeal and Pyfhel Homomorphic Encryption Libraries

A Comparative Study of BFV and CKKs Schemes to Secure IoT Data Using TenSeal and Pyfhel Homomorphic Encryption Libraries
View Sample PDF
Author(s): Yancho B. Wiryen (University of Douala, Cameroon), Noumsi Woguia Auguste Vigny (University of Douala, Cameroon), Mvogo Ngono Joseph (University of Douala, Cameroon)and Fono Louis Aimé (University of Douala, Cameroon)
Copyright: 2024
Volume: 10
Issue: 1
Pages: 17
Source title: International Journal of Smart Security Technologies (IJSST)
Editor(s)-in-Chief: Yassine Maleh (Sultan Moulay Slimane University, Morocco)and Ahmed A. Abd EI-Latif (Faculty of Science, Menoufia University, Shebin El-Koom, Egypt)
DOI: 10.4018/IJSST.333852

Purchase


Abstract

Internet of things (IoT) devices and applications are on the rise, generating large amounts of sensitive and confidential data that need to be processed securely. Due to resource constraints, the data generated is often stored and processed in the cloud. The drawback of data cloud storage and processing is the fact that it can be hacked, leaked, or sold by cloud companies. Fully homomorphic encryption (FHE) allows computation on encrypted data using basic mathematical operations and has recently been successfully implemented using schemes and libraries with better performance. In this paper, the authors propose a mixture of edge-cloud-based security schemes using FHE to secure IoT data. The authors evaluate the performance of two FHE schemes (BFV and CKKS) based on data: encoding speed, encryption speed, arithmetic operations (addition and multiplication) speed, and decryption decoding speed using two Python libraries (TenSEAL and PyFHEl). The encryption and decryption are done at the edge node using a Raspberry Pi 4, while the processing is done at the cloud node using a laptop.

Related Content

Yancho B. Wiryen, Noumsi Woguia Auguste Vigny, Mvogo Ngono Joseph, Fono Louis Aimé. © 2024. 17 pages.
Gnana Guru Ganesan, Arun C. A.. © 2022. 9 pages.
. © 2022.
Yakubu Ajiji Makeri. © 2022. 11 pages.
Abhishek Sharma, Shilpi Sharma, Saksham Gulati. © 2022. 14 pages.
Amina Gharsallah, Faouzi Zarai, Mahmoud Neji. © 2022. 16 pages.
Nang May Phu Lwin, Su Thawda Win. © 2022. 17 pages.
Body Bottom