FULLY HOMOMORPHIC ENCRYPTION APPLICATION IN CLOUD COMPUTING

被引:0
|
作者
Chen, Baohua [1 ]
Zhao, Na [1 ]
机构
[1] STATE GRID SICHUAN ELECT POWER CO TECH TRAINING, Chengdu 610072, Peoples R China
关键词
Homomorphic encryption; Data security; Cloud computing;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In order to prevent user's data leaked when they submit their data to the cloud server, we use fully homomorphic encryption. We encrypt the data and submit it to the cloud server. The server processes the data, and then returned to the user. This paper introduces the principle of homomorphic encryption, then analyses some homomorphic encryption scheme and its improved algorithm used in cloud computing.
引用
收藏
页码:471 / 474
页数:4
相关论文
共 50 条
  • [21] Improved Fully Homomorphic Encryption Algorithm for Cloud Storage
    Hu, Renyuan
    Zhang, Longjun
    Qin, Yongzhen
    [J]. PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, INFORMATION MANAGEMENT AND NETWORK SECURITY, 2016, 47 : 349 - 352
  • [22] Secure Cloud Computing: Communication Protocol for Multithreaded Fully Homomorphic Encryption for Remote Data Processing
    Oppermann, Alexander
    Toro, Federico Grasso
    Yurchenko, Artem
    Seifert, Jean-Pierre
    [J]. 2017 15TH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS AND 2017 16TH IEEE INTERNATIONAL CONFERENCE ON UBIQUITOUS COMPUTING AND COMMUNICATIONS (ISPA/IUCC 2017), 2017, : 503 - 510
  • [23] The Implemention and Application of Fully Homomorphic Encryption Scheme
    Han, Jing-Li
    Yang, Ming
    Wang, Cai-Ling
    Xu, Shan-Shan
    [J]. PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 714 - 717
  • [24] Challenges of Using Homomorphic Encryption to Secure Cloud Computing
    El Makkaoui, Khalid
    Ezzati, Abdellah
    Beni Hssane, Abderrahim
    [J]. 2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15), 2015, : 343 - 349
  • [25] Empirical Analysis of the Impact of Homomorphic Encryption on Cloud Computing
    Rout, Chinmayee
    Sethi, Srinivas
    Sahoo, Ramesh Kumar
    Badajena, J. Chandrakanta
    [J]. INTELLIGENT SYSTEMS AND APPLICATIONS, ICISA 2022, 2023, 959 : 107 - 120
  • [26] A Secure Cloud Computing Architecture Using Homomorphic Encryption
    Benzekki, Kamal
    El Fergougui, Abdeslam
    El Alaoui, Abdelbaki El Belrhiti
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (02) : 293 - 298
  • [27] Secure cloud computing based on threshold homomorphic encryption
    N. P. Varnovskiy
    S. A. Martishin
    M. V. Khrapchenko
    A. V. Shokurov
    [J]. Programming and Computer Software, 2015, 41 : 215 - 218
  • [28] Secure cloud computing based on threshold homomorphic encryption
    Varnovskiy, N. P.
    Martishin, S. A.
    Khrapchenko, M. V.
    Shokurov, A. V.
    [J]. PROGRAMMING AND COMPUTER SOFTWARE, 2015, 41 (04) : 215 - 218
  • [29] StealthyCRM: A Secure Cloud CRM System Application that Supports Fully Homomorphic Database Encryption
    Felipe, Miguel Rodel
    Aung, Khin Mi Mi
    Xia Ye
    Wen Yonggang
    [J]. 2015 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING RESEARCH AND INNOVATION (ICCCRI), 2015, : 97 - 105
  • [30] Cloud Storage Protection Scheme Based on Fully Homomorphic Encryption
    Mohammed, Mohammed A.
    Abed, Fadhil S.
    [J]. ARO-THE SCIENTIFIC JOURNAL OF KOYA UNIVERSITY, 2020, 8 (02): : 40 - 47