Abstract
With the introduction of the concept of information warfare, the way military operations are done is changing quickly. Now, much more than it was in past, quick acquisition of information and effective decision making are crucial. Especially, these days the ratio of multimedia data is on the rise. A data management system has been put in place since the 1980s which encrypts information before storing it, and allowing only authorized users to gain access to it according to the proper procedures.
In this paper, a secure and effective multimedia data management system that uses homomorphic operations is designed and implemented. By using homomorphic operations, it is able to quickly process stored ciphertext without a decryption process, allowing fast decision making after information gathering in a NCW environment. In order to assess the performance of the effective multimedia data management system implemented in this paper, it was compared to an ordinary system in which ciphertext has to be first decrypted before it can be modified. The secure and effective multimedia data management system for information warfare implemented in this study is highly versatile because any public encryption algorithm can be used, and has short response times thanks to the homomorphic algorithm which allows processing to be done directly on the ciphertext.




Similar content being viewed by others
References
Alabdulatif A, Mohammed K (2016) Privacy preserving cloud computation using Domingo-Ferrer scheme. Journal of King Saud University-Computer and Information Sciences 28(1):27–36
Artur T (2014) A high-order compact difference algorithm for half-staggered grids for laminar and turbulent incompressible flows. Journal of Computational Physics 276:438–467
Engouang DT, Yun L, Jiang ZZ (2014) Pallier based homomorphic encrypted data aggregation in wireless sensor networks. Applied Mechanics and Materials (543):3017–3022
Ertaul L, Johan Hadiwijaya Y, Gokay S (2015) Analyzing homomorphic encryption schemes in securing wireless sensor networks (WSN). International Journal of Computer Science and Network Security (IJCSNS) 15(5):1–11
Hayward R, Chiang C-C (2015) Parallelizing fully homomorphic encryption for a cloud environment. Journal of Applied Research and Technology 13(2):245–252
Hyun-Jong C, Jin-Mook K, Hwang-Bin R (2014) A Study of secure data management system using homomorphic encryption in defense environment. Life Science Journal 11(7s)
Kim H, Lee SW (2013) Homomorphic encryption scheme and applications for cloud computing securi. Journal of the Korea Institute of Security Engineering 10(2):213–224
Kim N, Lee S (2014) Design of city logging system using searchable image encryption system of streaming service. International Journal of Smart Home 8(2):7–14
Louk M, Lim H (2015) Homomorphic encryption in mobile multi cloud computing. In: International conference on information networking (ICOIN) IEEE, pp 493–497
Schepens J, Dijkstra T, Grootjen F (2012) Distributions of cognates in Europe as based on Levenshtein distance. Bilingualism: Lang Cogn 15(1):157–166
Sen J (2013) Homomorphic encryption: theory & applications. arXiv:1305.5886
Son SW, Lee JK, Lim JI, Jun TI (2008) Cryptography & network security. McGraw-Hill, Korea, 2–7, 305
Song YJ, Lee SH, Kyun KY, Kyun HC (2009) EPC information search technology using Paillier encryption. Conference Of The Institute Of Electronics Engineers of Korea 32(2):423–424
Song YJ, Park KY (2009) Homomorphic encryption technology for database outsourcing. Jounal of the Korea Institute of Information Security and Cryptology 19(3):80–89
Sun G, Huang S, Bao W, Yang Y, Wang Z (2014) A privacy protection policy combined with privacy homomorphism in the internet of things. In: International conference on computer communication and networks (ICCCN), pp 1–6
Tirthani N, Ganesan R (2014) Data security in cloud architecture based on Diffie Hellman and elliptical curve cryptography, IACR Cryptology ePrint Archive
Yang JS, Lee HJ, Park MW, Eom JH (2015) Security threats on national defense ICT based on IoT. Advanced Science and Technology Letters (UCMA) 97:94–98
Acknowledgments
Foundation item: The National Project of India (No.: xxx-xxxx). Authors are grateful to the Department of Science and Technology, Government of India for financial support to carry out this work.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Cha, HJ., Yang, HK., Kim, JM. et al. A Design of System using homomorphic encryption for multimedia data management. Multimed Tools Appl 76, 19897–19912 (2017). https://doi.org/10.1007/s11042-016-3767-6
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-016-3767-6