Systematic Review on Fully Homomorphic Encryption Scheme and Its Application

Hana Yousuf,Michael Lahzi,Said A. Salloum,Khaled Shaalan
DOI: https://doi.org/10.1007/978-3-030-47411-9_29
2020-06-27
Abstract:Security and efficiency of transferred data is the main concern in big data and cloud computing service. Fully Homomorphic Encryption is one of the most recent solutions that ensure the security and confidently. This paper expected to lead precise writing on the subject of Fully Homomorphic Encryption and its Application. The primary point of the audit is to pick up knowledge of the Fully Homomorphic Encryption and to locate the best way to deal with executing it. First, Fully Homomorphic Encryption Algorithms were discovered since 2009. After this year, different approaches were followed in order to enhance the scheme such as Fully Homomorphic Encryption based on Integer (DGHV) Scheme, Fully Homomorphic Encryption based on BGV schemes, Multi-key Fully Homomorphic Encryption Scheme and Fully Homomorphic Encryption based on GSW. This paper uses a systematic review of Fully Homomorphic Encryption technologies. The technique is performed to lead this methodical writing included utilizing the examination inquiries or research questions to determine keywords which were then used to search for bits of peer-reviewed papers, articles or book at scholastic directories. Through introductory hunts, 250 papers and scholarly works were found and with the assistance of choice criteria and PRISMA methodology, the number of papers reviewed decreased to 24. Jadad scale used to measure the quality of selected publications. Most of the papers developed new schemes on Fully Homomorphic Encryption to enhance efficiency and reduce noise. Other papers developed a new algorithm to improve the security of the transferred data. Last Thematic modeling analysis presented in this paper to ensure that all the articles were related to Fully Homomorphic Encryption and cloud computing.
What problem does this paper attempt to address?