Homomorphic Encryption for Data Security in Cloud Computing

被引:13
|
作者
Chauhan, Kamal Kumar [1 ]
Sanger, Amit K. S. [1 ]
Verma, Ajai [1 ]
机构
[1] Meerut Inst Technol, Dept Comp Sci & Engn, Meerut, Uttar Pradesh, India
关键词
Cloud Computing; Data Security; Cryptography; Homomorphic Encryption;
D O I
10.1109/ICIT.2015.39
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is recent emerging Internet based technology in IT industry. With rapid development of cloud computing over Internet, security became major issue that garnered attention of researchers from academic as well as industry. Data Security is a great barrier in adaptation of cloud computing. Traditional standard encryption methods provide security to data in storage state and transmission state. But in processing state, performing operations on data require decryption of data. At this state data is available to cloud provider. Hence traditional encryption methods are not sufficient to secure data completely. In this paper, we discussed homomorphic encryption methods and their applications in cloud computing to secure data in processing state. Homomorphic encryption allows user to operate encrypted data directly without decryption.
引用
收藏
页码:206 / 209
页数:4
相关论文
共 50 条
  • [1] Homomorphic Encryption for Security of Cloud Data
    Potey, Manish M.
    Dhote, C. A.
    Sharma, Deepak H.
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND VIRTUALIZATION (ICCCV) 2016, 2016, 79 : 175 - 181
  • [2] Fully Homomorphic Encryption with AES in Cloud Computing Security
    Alkady, Yasmin
    Farouk, Fifi
    Rizk, Rawya
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ADVANCED INTELLIGENT SYSTEMS AND INFORMATICS 2018, 2019, 845 : 370 - 382
  • [3] A Verifiable Fully Homomorphic Encryption Scheme for Cloud Computing Security
    El-Yahyaoui, Ahmed
    Ech-Cherif El Kettani, Mohamed Dafir
    [J]. TECHNOLOGIES, 2019, 7 (01):
  • [4] A cloud computing security solution based on fully homomorphic encryption
    Zhao, Feng
    Li, Chao
    Liu, Chun Feng
    [J]. 2014 16TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2014, : 485 - 488
  • [5] Query based computations on encrypted data through homomorphic encryption in cloud computing security
    Biksham, V.
    Vasumathi, D.
    [J]. 2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 3820 - 3825
  • [6] Enhancement in Homomorphic Encryption Scheme for Cloud Data Security
    Kaur, Samjot
    Wasson, Vikas
    [J]. 2015 9TH INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES AND TECHNOLOGIES (NGMAST 2015), 2015, : 54 - 59
  • [7] Dual Homomorphic Encryption for Cloud Computing
    Wang, Huai-Xi
    Shu, Ni-Na
    Li, Yong-Xiang
    Wang, Chen
    [J]. INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND COMMUNICATION ENGINEERING (CSCE 2015), 2015, : 838 - 842
  • [8] Homomorphic Encryption Technology for Cloud Computing
    Zhao, Min E.
    Geng, Yang
    [J]. PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE OF INFORMATION AND COMMUNICATION TECHNOLOGY [ICICT-2019], 2019, 154 : 73 - 83
  • [9] Cloud Security based on the Homomorphic Encryption
    Al-Sit, Waleed T.
    Al-Zoubi, Hani
    Al-Jubouri, Qussay
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (08) : 300 - 307
  • [10] Homomorphic Cloud Computing Scheme Based on Hybrid Homomorphic Encryption
    Song, Xidan
    Wang, Yulin
    [J]. PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2017, : 2450 - 2453