Challenges of Using Homomorphic Encryption to Secure Cloud Computing

被引:0
|
作者
El Makkaoui, Khalid [1 ]
Ezzati, Abdellah [1 ]
Beni Hssane, Abderrahim [2 ]
机构
[1] Hassan 1st Univ, LAVETE Lab, Math & Comp Sci Dept, Sci & Tech Fac, Settat, Morocco
[2] Chouaib Doukkali Univ, Dept Comp Sci, Fac Sci, LAROSERI Lab, El Jadida, Morocco
关键词
Cloud Computing; Security; Confidentiality; Trust; Homomorphic Encryption;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
With the emergence of cloud computing, the concept of information security has become a major issue. Indeed, the security of such a system is the greatest concern of computer scientists, providers of cloud and organizations who want to adopt and benefit from these services. Cloud computing providers must implement concepts ensuring network security, hardware, data storage and strategies of control and access to services. All these elements help to preserve data security and ensuring the availability of services associated with the Cloud, to better satisfy clients and acquire and build their trust. However, even if the data storage security in cloud servers is assured, reluctance remain when it comes to process the confidential data. Indeed, the fear that sensitive data is being used is a major obstacle in the adoption of cloud services by enterprises. To overcome this obstacle, the use of methods that can perform operations on encrypted data without knowing the secret key, seems to be an effective way to strengthen the confidentiality of information. In this paper we will examine the challenges facing Homomorphic Encryption methods to allow suppliers of cloud to perform operations on encrypted data, and provide the same results after treatment, as if they were performing calculations on raw data.
引用
收藏
页码:343 / 349
页数:7
相关论文
共 50 条
  • [41] A Mixed Homomorphic Encryption Scheme for Secure Data Storage in Cloud
    Kangavalli, R.
    Vagdevi, S.
    [J]. 2015 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2015, : 1062 - 1066
  • [42] New Fully Homomorphic Encryption Scheme Based On Multistage Partial Homomorphic Encryption Applied In Cloud Computing
    Mahmood, Zainab Hikmat
    Ibrahem, Mahmood Khalel
    [J]. 2018 1ST ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION AND SCIENCES (AICIS 2018), 2018, : 182 - 186
  • [43] Secure Sum Computation Using Homomorphic Encryption
    Sheikh, Rashid
    Mishra, Durgesh Kumar
    [J]. DATA SCIENCE AND BIG DATA ANALYTICS, 2019, 16 : 357 - 363
  • [44] Secure genotype imputation using homomorphic encryption
    Zhou, Junwei
    Lei, Botian
    Lang, Huile
    Panaousis, Emmanouil
    Liang, Kaitai
    Xiang, Jianwen
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 72
  • [45] A general framework to design secure cloud storage protocol using homomorphic, encryption scheme
    Zhang, Jian
    Yang, Yang
    Chen, Yanjiao
    Chen, Jing
    Zhang, Qian
    [J]. COMPUTER NETWORKS, 2017, 129 : 37 - 50
  • [46] Secure and Private Cloud-Based Control Using Semi-Homomorphic Encryption
    Farokhi, Farhad
    Shames, Iman
    Batterham, Nathan
    [J]. IFAC PAPERSONLINE, 2016, 49 (22): : 163 - 168
  • [47] Parallel Speech Encryption Method Based on BGN Homomorphic Encryption in Cloud Computing
    Zhang, Qiu-yu
    Wang, Kai
    [J]. International Journal of Network Security, 2024, 26 (06): : 943 - 956
  • [48] A Hybrid Encryption model for Secure Cloud Computing
    Olumide, Atewologun
    Alsadoon, Abeer
    Prasad, P. W. C.
    Pham, Linh
    [J]. 2015 13TH INTERNATIONAL CONFERENCE ON ICT AND KNOWLEDGE ENGINEERING (ICT & KNOWLEDGE ENGINEERING 2015), 2015, : 24 - 32
  • [49] Policy Based on Homomorphic Encryption and Retrieval Scheme in Cloud Computing
    Ding, Yong
    Li, Xiumin
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 568 - 571
  • [50] Homomorphic Encryption in the Cloud
    Hrestak, Darko
    Picek, Stjepan
    [J]. 2014 37TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2014, : 1400 - 1404