ISSN: 2245-4578 (Online Version) ISSN:2245-1439 (Print Version)
Research on Cloud Data Security Computing Framework Based on Fusion of Homomorphic Encryption and Differential Privacy
PDF
HTML

Keywords

Homomorphic encryption
differential privacy
cloud computing
privacy protection
cybersecurity
data security computing

How to Cite

[1]
Y. . Huang, “Research on Cloud Data Security Computing Framework Based on Fusion of Homomorphic Encryption and Differential Privacy”, JCSANDM, vol. 14, no. 04, pp. 927–954, Oct. 2025.

Abstract

With the wide application of cloud computing in network security, the privacy protection of sensitive data is becoming increasingly serious. This paper proposes a cloud data security computing framework that combines homomorphic encryption and differential privacy. It supports ciphertext computing based on the CKKS scheme, and introduces ε-differential privacy mechanism at the output end to achieve “invisible in calculation and unrecognizable after calculation” Double protection. Based on UNSW-NB15 and CERT v6.2 datasets, the experiment carries out intrusion detection and behavior aggregation tasks respectively. Under the privacy budget ε=1.0, the F1-score of intrusion detection task reaches 92.3%, and the re-recognition rate decreases to 6.7%; The behavioral aggregation error is controlled within 1.92%, which is better than baseline methods such as HE-only and DP-only. The results show that the framework can significantly improve the level of privacy protection while ensuring data availability. It is suitable for various scenarios such as intrusion detection and anomaly modeling, and has strong practicability and promotion value.

https://doi.org/10.13052/jcsm2245-1439.1447
PDF
HTML

References

Luo, W., Lv, Z., Lai, C., and Yang, T. “Efficient and secure cross-domain data sharing scheme with traceability for Industrial Internet,” Computer Networks, vol. 260, pp. 111117, 2025.

Guo, J., and Wang, L. “Learning to upgrade internet information security and protection strategy in big data era,” Computer Communications, vol. 160, pp. 150–157, 2020.

Ameur, Y., and Bouzefrane, S. “Enhancing privacy in VANETs through homomorphic encryption in machine learning applications,” Procedia Computer Science, vol. 238, pp. 151–158, 2024.

Alabdulatif, A. “GuardianAI: Privacy-preserving federated anomaly detection with differential privacy,” Array, vol. 26, pp. 100381, 2025.

Hasan, M. M., and Rahman, M. M. “Privacy-preserving polyp segmentation using federated learning with differential privacy,” Smart Health, vol. 36, pp. 100551, 2025.

Ci, S., Hu, S., Guan, D., and Koç, Ç. K. “Privacy-preserving word vectors learning using partially homomorphic encryption,” Journal of Information Security and Applications, vol. 89, pp. 103999, 2025.

Mittal, S. “Fully homomorphic encryption-based optimal key encryption for privacy preservation in the cloud sector,” Journal of Information Security and Applications, vol. 91, pp. 104048, 2025.

Naresh, V. S., and Ayyappa, D. “Enhancing security in software defined networks: Privacy-preserving intrusion detection with Homomorphic Encryption,” Journal of Information Security and Applications, vol. 92, pp. 104084, 2025.

R, P., and P, S. “Side-channel attack resilient implementation of homomorphic encryption using elliptic curve cryptography for secure cloud computing,” Integration, vol. 104, pp. 102439, 2025.

Tang, Z.-A., Duan, X.-F., Liang, R.-H., and Ding, Y. “Efficient multi-party privacy preserving federated k-means based on homomorphic encryption,” Information Sciences, vol. 717, pp. 122335, 2025.

Liu, W., You, L., Shao, Y., Shen, X., Hu, G., Shi, J., and Gao, S. “From accuracy to approximation: A survey on approximate homomorphic encryption and its applications,” Computer Science Review, vol. 55, pp. 100689, 2025.

Lv, L., Xiong, L., and Li, F. “PCPHE: A privacy comparison protocol for vulnerability detection based on homomorphic encryption,” Journal of Information Security and Applications, vol. 84, pp. 103805, 2024.

Mahato, G. K., Banerjee, A., Chakraborty, S. K., and Gao, X.-Z. “Privacy preserving verifiable federated learning scheme using blockchain and homomorphic encryption,” Applied Soft Computing, vol. 167, pp. 112405, 2024.

Ming, Y., Wang, S., Wang, C., Liu, H., Deng, Y., Zhao, Y., and Feng, J. “VCSA: Verifiable and collusion-resistant secure aggregation for federated learning using symmetric homomorphic encryption,” Journal of Systems Architecture, vol. 156, pp. 103279, 2024.

Mittal, S. “Fully homomorphic encryption-based optimal key encryption for privacy preservation in the cloud sector,” Journal of Information Security and Applications, vol. 91, pp. 104048, 2025.

Mohammed, M. A., and Wahab, H. B. A. “Enhancing IoT Data Security with Lightweight Blockchain and Okamoto Uchiyama Homomorphic Encryption,” CMES – Computer Modeling in Engineering and Sciences, vol. 138, no. 2, pp. 1731–1748, 2023.

Sun, H., Chen, X., and Yuan, K. “FL-EASGD: Federated Learning Privacy Security Method Based on Homomorphic Encryption,” Computers, Materials and Continua, vol. 79, no. 2, pp. 2361–2373, 2024.

Wu, X., Wang, J., and Zhang, T. “Integrating fully homomorphic encryption to enhance the security of blockchain applications,” Future Generation Computer Systems, vol. 161, pp. 467–477, 2024.

Xiong, R., Ren, W., Zhao, S., He, J., Ren, Y., Choo, K.-K. R., and Min, G. “CoPiFL: A collusion-resistant and privacy-preserving federated learning crowdsourcing scheme using blockchain and homomorphic encryption,” Future Generation Computer Systems, vol. 156, pp. 95–104, 2024.

Zhang, C., Zhang, X., Yang, X., Liu, B., Zhang, Y., and Zhou, R. “Poisoning attacks resilient privacy-preserving federated learning scheme based on lightweight homomorphic encryption,” Information Fusion, vol. 121, pp. 103131, 2025.

Zhou, F., Sun, J., Wang, Q., Zhang, Y., Hou, R., and Wang, C. “Efficient private information retrievals for single-server based on verifiable homomorphic encryption,” Computer Standards & Interfaces, vol. 93, pp. 103961, 2025.

He, C., and Ding, C. H. Q. “SecRASP: Next generation web application security protection methodology and framework,” Computers & Security, vol. 154, pp. 104445, 2025.

Kumar, A. S., and Revathy, S. “A hybrid soft computing with big data analytics based protection and recovery strategy for security enhancement in large scale real world online social networks,” Theoretical Computer Science, vol. 927, pp. 15–30, 2022.

Pleger, L. E., Guirguis, K., and Mertes, A. “Making public concerns tangible: An empirical study of German and UK citizens’ perception of data protection and data security,” Computers in Human Behavior, vol. 122, pp. 106830, 2021.

Song, X., Xu, G., Huang, Y., and Dong, J. “DID-HVC-based Web3 healthcare data security and privacy protection scheme,” Future Generation Computer Systems, vol. 158, pp. 267–276, 2024.

Wang, F., Gai, Y., and Zhang, H. “Blockchain user digital identity big data and information security process protection based on network trust,” Journal of King Saud University – Computer and Information Sciences, vol. 36, no. 4, pp. 102031, 2024.

Xia, W., Zhang, L., Guo, Y., Zhang, H., and Cheng, L. “P4NSA: P4-based security protection technology for IPv6 neighbor solicitation and advertisement spoofing,” Computers & Security, vol. 153, pp. 104400, 2025.

Yang, M., Guo, J., Zhao, Z., Xu, T., and Bai, L. “Teenager Health Oriented Data Security and Privacy Protection Research for Smart Wearable Device,” Procedia Computer Science, vol. 174, pp. 333–339, 2020.

Ye, P.-G., Li, Z., Yang, Z., Chen, P., Zhang, Z., Li, N., and Zheng, J. “Periodic watermarking for copyright protection of large language models in cloud computing security,” Computer Standards & Interfaces, vol. 94, pp. 103983, 2025.

Zhang, C., Pan, Z., and Hou, C. “Marketing data security and privacy protection based on federated gamma in cloud computing environment,” International Journal of Intelligent Networks, vol. 4, pp. 261–271, 2023.

Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

Copyright (c) 2025 Journal of Cyber Security and Mobility

Downloads

Download data is not yet available.