Journal of Cyber Security, Privacy Issues and Challenges https://matjournals.net/engineering/index.php/JCSPIC <p><strong>JCSPIC</strong> is a peer reviewed journal of Computer Science domain published by MAT Journals Pvt. Ltd. It is a print and e-journal focused towards the rapid publication of research and review papers based on all areas of security and privacy including Security in Business, Healthcare and Society, Information Security, Communication Security, and Privacy. Topics related to Biometric--based Security, Cryptography Systems, Critical Infrastructure Security, Application Security, Network Security, Data Loss Prevention, Information Security, Cloud Security, End-User Education, Software Development Security, Security Operations, Physical Security, Embedded Security, Data Analytics for Security and Privacy, Integrated Security Design Schemes, Surveillance, Firewalls, Router and Switch Security, Email Filtering, Vulnerability Scanning, Intrusion Detection and Prevention System (IDS/IPS), Host-based Security Tools, Critical Infrastructures and Key Resources. Research Papers related to Cyber Threat Intelligence and Analytic Solutions, such as Big Data, Artificial Intelligence, and Machine Learning, to Perceive, Reason, Learn, and Act against Cyber Adversary Tactics, Techniques, and Procedures will also be considered.</p> en-US Fri, 30 Aug 2024 09:48:37 +0000 OJS 3.3.0.8 http://blogs.law.harvard.edu/tech/rss 60 Homomorphic Encryption for Edge Computing Security https://matjournals.net/engineering/index.php/JCSPIC/article/view/884 <p>Homomorphic encryption is a cutting edge security method that can protect sensitive data by performing calculations on encrypted data directly without requiring decryption. This implies that businesses can uphold high data security without sacrificing productivity or adhering to legal requirements. Homomorphic encryption makes it possible to work with encrypted data while maintaining its confidentiality.<br>This study examines several Homomorphic Encryption (HE) techniques used in edge computing, including BGV, CKKS, RSA, Paillier, and Gentry's. These plans all have different benefits in terms of performance and security. While completely homomorphic encryption was first introduced by Gentry's method, which permits addition and multiplication operations on encrypted data, RSA and Paillier are recognized for their resilience. BGV and CKKS further enhance efficiency and practicality for real world applications.<br>Significant advantages of homomorphic encryption include decreased latency and enhanced privacy. Nevertheless, the study also discusses excessive energy usage and considerable storage needs. Applications of homomorphic encryption are practical and are emphasized in critical domains such as healthcare, where patient privacy is crucial; smart homes, where secure automation is needed; industrial IoT, where sensitive operational data needs to be protected; autonomous vehicles, where navigational data needs to be protected; and smart cities, where secure data is necessary for effective urban management.</p> S. Mohanraj, G. Adithya Krishnan, R. Satya Pramodh, Gomathy K Copyright (c) 2024 Journal of Cyber Security, Privacy Issues and Challenges https://matjournals.net/engineering/index.php/JCSPIC/article/view/884 Fri, 30 Aug 2024 00:00:00 +0000