A Survey on Security in Cloud Using Homographic and Disk Encryption Methods
Keywords:
Cloud Security, Homographic Encryption, Disk Encryption, Combine Benefits, Security SuitAbstract
Offering strong data protection to cloud users while enabling rich applications is a challenging task. The cryptographic security solutions existing and applied over internet cannot directly be applied to the cloud environment. This paper presents a couple of security solutions. Several homogaphic and disk encryption methods and their limitations are discussed. The efforts to combine the benefits of both the techniques give rise to further more possibilities. The author hopes that all the possibilities are researched and a single platform layer security suit will be made for cloud data protection.
References
C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy- Preserving public auditing for storage security in cloud computing,” in Proc.of IEEE INFOCOM’10, March 2010.
Maha TEBAA, Saïd EL HAJJI, Abdellatif EL GHAZI, “Homomorphic Encryption Applied to the Cloud Computing Security.” In proc. Of the World Congress on Engineering 2012 Vol I WCE 2012, July 4 - 6, 2012, London, U.K.
Dr Keith Martin, “Cryptographic Key Management,” in 2006 Information Security conference, Royal Holloway, University of London, United Kingdom.
Tilo Müller, Tobias Latzo, and Felix C. Freiling, “Self-Encrypting Disks pose Self-Decrypting Risks.” In Annual Computer Security Applications Conference (ACSAC), Orlando, Florida USA, Dec. 2011. University of Illinois at Urbana-Champaign, ACM.
Shivlal Mewada, Umesh Kumar Singh and Pradeep Sharma, "Security Enhancement in Cloud Computing (CC)", ISROSET-International Journal of Scientific Research in Computer Science and Engineering, Volume-01, Issue-01, Page No (31-37), Jan -Feb 2013
C. Gentry, “Fully Homomorphic Encryption Using Ideal Lattices,” Proc. 41st Ann. ACM Symp. Theory Computing (STOC 09), ACM, 2009, pp. 169-178.
B. Bosen. “FDE Performance Comparison: Hardware Versus Software Full Drive Encryption. “In Trusted Strategies LLC, Jan. 2010.
Dawn Song, Elaine Shi, and Ian Fischer, “Cloud Data Protection for the Masses.” Published by the IEEE Computer Society, 0018-9162/12/$31.00 © 2012 IEEE.
Shaheen Ayyub1, Devshree Roy, “Cloud Computing Characteristics and Security Issues.” In International Journal of Computer Sciences and Engineering, Vol.-1(4), pp (18-22) Dec 2013.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
