Challenges of Using Homomorphic Encryption to Secure Cloud Computing

被引:0
|
作者
El Makkaoui, Khalid [1 ]
Ezzati, Abdellah [1 ]
Beni Hssane, Abderrahim [2 ]
机构
[1] Hassan 1st Univ, LAVETE Lab, Math & Comp Sci Dept, Sci & Tech Fac, Settat, Morocco
[2] Chouaib Doukkali Univ, Dept Comp Sci, Fac Sci, LAROSERI Lab, El Jadida, Morocco
关键词
Cloud Computing; Security; Confidentiality; Trust; Homomorphic Encryption;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
With the emergence of cloud computing, the concept of information security has become a major issue. Indeed, the security of such a system is the greatest concern of computer scientists, providers of cloud and organizations who want to adopt and benefit from these services. Cloud computing providers must implement concepts ensuring network security, hardware, data storage and strategies of control and access to services. All these elements help to preserve data security and ensuring the availability of services associated with the Cloud, to better satisfy clients and acquire and build their trust. However, even if the data storage security in cloud servers is assured, reluctance remain when it comes to process the confidential data. Indeed, the fear that sensitive data is being used is a major obstacle in the adoption of cloud services by enterprises. To overcome this obstacle, the use of methods that can perform operations on encrypted data without knowing the secret key, seems to be an effective way to strengthen the confidentiality of information. In this paper we will examine the challenges facing Homomorphic Encryption methods to allow suppliers of cloud to perform operations on encrypted data, and provide the same results after treatment, as if they were performing calculations on raw data.
引用
收藏
页码:343 / 349
页数:7
相关论文
共 50 条
  • [11] Secure Data Mining in Cloud using Homomorphic Encryption
    Mittal, Deepti
    Kaur, Damandeep
    Aggarwal, Ashish
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING IN EMERGING MARKETS (CCEM), 2014, : 155 - 160
  • [12] Utilizing Homomorphic Encryption to Implement Secure and Private Medical Cloud Computing
    Kocabas, Ovunc
    Soyata, Tolga
    [J]. 2015 IEEE 8TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, 2015, : 540 - 547
  • [13] Secure and Efficient Similarity Retrieval in Cloud Computing Based on Homomorphic Encryption
    Wang, Na
    Zhou, Wen
    Wang, Jingjing
    Guo, Yifan
    Fu, Junsong
    Liu, Jianwei
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 2454 - 2469
  • [14] A Secure Image Retrieval Method Based on Homomorphic Encryption for Cloud Computing
    Zhang, Yan
    Zhuo, Li
    Peng, Yuanfan
    Zhang, Jing
    [J]. 2014 19TH INTERNATIONAL CONFERENCE ON DIGITAL SIGNAL PROCESSING (DSP), 2014, : 269 - 274
  • [15] Secure scheme on mobile multi cloud computing based on homomorphic encryption
    Zkik, Karim
    Orhanou, Ghizlane
    El Hajji, Said
    [J]. 2016 INTERNATIONAL CONFERENCE ON ENGINEERING & MIS (ICEMIS), 2016,
  • [16] Homomorphic Encryption Technology for Cloud Computing
    Zhao, Min E.
    Geng, Yang
    [J]. PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE OF INFORMATION AND COMMUNICATION TECHNOLOGY [ICICT-2019], 2019, 154 : 73 - 83
  • [17] A verifiable fully homomorphic encryption scheme to secure big data in cloud computing
    El-Yahyaoui, Ahmed
    Ech-Chrif El Kettani, Mohamed Dafir
    [J]. 2017 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM), 2017, : 250 - 254
  • [18] Dual Homomorphic Encryption for Cloud Computing
    Wang, Huai-Xi
    Shu, Ni-Na
    Li, Yong-Xiang
    Wang, Chen
    [J]. INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND COMMUNICATION ENGINEERING (CSCE 2015), 2015, : 838 - 842
  • [19] Secure Computation over Cloud using Fully Homomorphic Encryption
    Bilakanti, Anusha
    Anjana, N. B.
    Divya, A.
    Divya, K.
    Chakraborty, Nilotpal
    Patra, G. K.
    [J]. PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2016, : 633 - 636
  • [20] Outsourced Secure Face Recognition Based on CKKS Homomorphic Encryption in Cloud Computing
    Liu Jiasen
    Wang Xu An
    Chen Bowei
    Tu Zheng
    Zhao Kaiyang
    [J]. INTERNATIONAL JOURNAL OF MOBILE COMPUTING AND MULTIMEDIA COMMUNICATIONS, 2021, 12 (03) : 27 - 43