International Journal of Smart Security Technologies (IJSST) - Current IssueInternational Journal of Smart Security Technologies (IJSST)https://www.igi-global.com/journal/international-journal-smart-security-technologies/233928IGI GlobalenInternational Journal of Smart Security Technologies (IJSST)2640-40792640-4087© 2024 IGI Globalecontent@igi-global.comInternational Journal of Smart Security Technologies (IJSST)https://coverimages.igi-global.com/cover-images/covers/ijsst.pnghttps://www.igi-global.com/journal/international-journal-smart-security-technologies/233928A Comparative Study of BFV and CKKs Schemes to Secure IoT Data Using TenSeal and Pyfhel Homomorphic Encryption Librarieshttps://www.igi-global.com/article/a-comparative-study-of-bfv-and-ckks-schemes-to-secure-iot-data-using-tenseal-and-pyfhel-homomorphic-encryption-libraries/333852Internet of things (IoT) devices and applications are on the rise, generating large amounts of sensitive and confidential data that need to be processed securely. Due to resource constraints, the data generated is often stored and processed in the cloud. The drawback of data cloud storage and processing is the fact that it can be hacked, leaked, or sold by cloud companies. Fully homomorphic encryption (FHE) allows computation on encrypted data using basic mathematical operations and has recently been successfully implemented using schemes and libraries with better performance. In this paper, the authors propose a mixture of edge-cloud-based security schemes using FHE to secure IoT data. The authors evaluate the performance of two FHE schemes (BFV and CKKS) based on data: encoding speed, encryption speed, arithmetic operations (addition and multiplication) speed, and decryption decoding speed using two Python libraries (TenSEAL and PyFHEl). The encryption and decryption are done at the edge node using a Raspberry Pi 4, while the processing is done at the cloud node using a laptop.10.4018/IJSST.333852International Journal of Smart Security Technologies (IJSST), Volume: 10, Issue: 1 (2024) Pages: 1-17Wiryen, Yancho B.Vigny, Noumsi Woguia AugusteJoseph, Mvogo NgonoAimé, Fono LouisIT Security and EthicsSecurity & ForensicsBiometrics2024-01-01T05:00:00Z1011172024-01-01T05:00:00Z