International Journal of Science Management and Engineering Research (IJSMER)

An Inspiration for Innovative Ideas

International Indexed Journal | Peer-Reviewed Journal| Multi-Disciplinary|
Refereed Research Journal | Open Access Journal | As per UGC Care Guidelines | As per Scopus Guidelines | As per UGC Care, AICTE, SCI, COPE, WoS, Scopus Journal Guidelines | ISSN Approved -2455-6203 |

E-ISSN : 2455-6203

Impact Factor:RPRI 2024:5.2, SJIF 2023:6.108,2022:IPI Value(2.90),

Index Copernicus Value2022:49.02

Google Scholar: h5-Index:29 & i10-index:106

Home AboutUs Editorial Board Indexing Current Issue Archives Author Faqs

Welcome to International Journal of Science Management and Engineering Research (IJSMER)

Privacy-Preserving Data Sharing Using Homomorphic Encryption: A Review

Volume 10 | Issue 1 | March 2025

     Your Paper Publication Details:

     Title:Privacy-Preserving Data Sharing Using Homomorphic Encryption: A Review

     DOI (Digital Object Identifier):

     Pubished in Volume: 10  | Issue: 1  | Year: March 2025

     Publisher Name : IJSMER-Rems Publishing House | www.ejournal.rems.co.in | ISSN : 2455-6203

     Subject Area: Computer Science & Engineering

     Author type: Indian Author

     Pubished in Volume: 10

     Issue: 1

     Pages: 53-58

     Year: March 2025

     E-ISSN Number: 2455-6203

     Download:8

    Click Here to Download your Paper in PDF

     Abstract

    Data sharing is an essential aspect of modern digital applications, including healthcare, finance, cloud computing, and artificial intelligence. However, maintaining privacy and security during data exchanges presents significant challenges, especially with increasing concerns about data breaches and regulatory compliance. Homomorphic Encryption (HE) has emerged as a revolutionary cryptographic technique that allows computations to be performed on encrypted data without decryption, ensuring confidentiality throughout the processing phase. This review paper provides a comprehensive analysis of various HE schemes, including partially, somewhat, and fully homomorphic encryption. We discuss their applications in different domains, evaluate their security implications, and examine the computational challenges associated with their implementation. Additionally, we explore optimization strategies such as bootstrapping improvements, hybrid cryptographic models, and hardware acceleration techniques that aim to enhance HE’s practicality. Real-world use cases in secure cloud computing, privacy-preserving machine learning, and secure multiparty computations are also discussed. Finally, we outline the challenges, potential solutions, and future research directions that will drive advancements in HE technology for secure and efficient data sharing.

     Keywords

    Privacy-preserving, Homomorphic Encryption, Secure Data Sharing, Cloud Computing, Cryptography, Fully Homomorphic Encryption (FHE), Partially Homomorphic Encryption (PHE), Data Security.

     Authors and Affiliations

    Akanksha Jain
    M.Tech. Scholar, Department of Computer Science & Engineering, Eklavya University, Damoh, Madhya Pradesh, India
    Monika Thakur
    M.Tech. Scholar, Department of Computer Science & Engineering, Eklavya University, Damoh, Madhya Pradesh, India
    Saleha Khan
    M.Tech. Scholar, Department of Computer Science & Engineering, Eklavya University, Damoh, Madhya Pradesh, India
    Dr. Prashant Sen
    Associate professor & Head, Department of Computer Science & Engineering, Eklavya University, Damoh, Madhya Pradesh, India

     References


    1. Association of Certified Fraud Examiners. (2020). Report to the Nations: Global Study on Occupational Fraud and Abuse. ACFE.
    2. Bhattacharya, S., Jha, S., & Thakur, R. (2019). Ensemble learning for financial fraud detection: A hybrid approach. Journal of Financial Analytics, 45(2), 112-128.
    3. Bolton, R. J., & Hand, D. J. (2002). Statistical fraud detection: A review. Statistical Science, 17(3), 235-255.
    4. Dal Pozzolo, A., Boracchi, G., Caelen, O., Alippi, C., & Bontempi, G. (2017). Credit card fraud detection: A realistic modeling and a novel learning strategy. IEEE Transactions on Neural Networks and Learning Systems, 28(10), 2218-2230.
    5. Hardy, S., Houlding, B., & Barrett, W. (2020). Federated learning for fraud detection: Opportunities and challenges. Journal of Machine Learning Research, 21(1), 1-14.
    6. Liu, Y., Zhang, P., & Wang, H. (2023). Anomaly detection in financial transactions using autoencoders and isolation forests. IEEE Transactions on Computational Intelligence, 39(5), 678-692.
    7. Ngai, E. W., Hu, Y., Wong, Y. H., Chen, Y., & Sun, X. (2011). The application of data mining techniques in financial fraud detection: A classification framework and an academic review of literature. Decision Support Systems, 50(3), 559-569.
    8. Phua, C., Lee, V., Smith, K., & Gayler, R. (2010). A comprehensive survey of data mining-based fraud detection research. Artificial Intelligence Review, 34(1), 1-14.
    9. Salah, K., Rehman, M. H., & Svetinovic, D. (2022). Blockchain for fraud detection and prevention in financial transactions: Opportunities and challenges. Future Generation Computer Systems, 125(1), 563-575.
    10. West, J., & Bhattacharya, M. (2022). Deep learning for financial fraud detection: Trends, challenges, and future directions. Journal of Artificial Intelligence Research, 67(2), 89-105.
    11. Zhang, H., & Li, X. (2021). Unsupervised anomaly detection in financial transactions using clustering techniques. Expert Systems with Applications, 173(1), 114-129.
    12. Zhou, Y., Wang, J., & Liu, C. (2021). A hybrid deep learning framework for sequential fraud detection in financial transactions. IEEE Access, 9(1), 35429-35441.
    13. Bolton, R. J., & Hand, D. J. (2002). Statistical fraud detection: A review. Statistical Science, 17(3), 235-255.
    14. West, J., & Bhattacharya, M. (2016). Intelligent financial fraud detection: A comprehensive review. Computers & Security, 57, 47-66.
    15. Dal Pozzolo, A., Boracchi, G., Caelen, O., Alippi, C., & Bontempi, G. (2015). Credit card fraud detection through unsupervised learning. IEEE Transactions on Neural Networks and Learning Systems, 27(3), 675-687.
    16. Carcillo, F., Le Borgne, Y. A., Caelen, O., & Bontempi, G. (2021). Combining unsupervised and supervised learning in credit card fraud detection. Expert Systems with Applications, 150, 113318.
    17. Zhang, Y., Li, J., & Liu, H. (2020). An SVM-based model for detecting financial fraud. IEEE Transactions on Cybernetics, 50(12), 4562-4574.
    18. Zheng, V. W., Zheng, Y., Chen, K., & Sun, M. (2018). Time series anomaly detection for financial transactions using deep learning. ACM Transactions on Knowledge Discovery from Data, 12(3), 37.
    19. Singh, D., & Jain, P. (2019). Unsupervised fraud detection using clustering methods. Journal of Financial Crime, 26(2), 123-136.
    20. Zhou, C., & Paffenroth, R. C. (2017). Anomaly detection with robust deep autoencoders. Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 665-674.
    21. Liu, F. T., Ting, K. M., & Zhou, Z. (2021). Isolation forest: Detecting anomalies in financial transactions. Pattern Recognition, 96, 106973.
    22. Gao, W., Huang, Y., & Song, X. (2022). Semi-supervised learning for fraud detection in financial transactions. Expert Systems with Applications, 187, 115951.
    23. Chen, T., Guestrin, C., & Agarwal, R. (2020). XGBoost: A scalable tree boosting system. Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 785-794.

      License

    Creative Commons Attribution 4.0 and The Open Definition

    Article Preview

Indexed by