A Review of Homomorphic Encryption Algorithm for Achieving Security in Cloud: Review Article
Keywords:
Cloud Computing, homomorphic coding algorithmic rule, Security Challenges, IntegrityAbstract
Cloud computing has created a brief exchange in code paradigm and being extraordinarily new generation however has been followed extensive through numerous groups and character for his or her computing wants. Definition of Cloud Computing is definitely unique from definitions provided thru researchers. Cloud computing is emerging paradigm gives various IT associated offerings. The safety and privacy are maximum critical elements that inhibits the boom of cloud computing. Security factors are reasons behind lesser amount of actual instances and business enterprise associated cloud applications in assessment to consumer related cloud software program. “Cloud computing can be a model for permitting omnipresent, on hand, on-name for Network get admission to to a shared pool of configurable computing sources (e.g., networks, servers, storage, applications, and services) that may be rapid provisioned and discharged with tokenism manage strive or service organization interaction. This cloud model includes five critical traits, three service fashions (Software as a Service (SaaS). Platform as a Service (PaaS). Infrastructure as a Service (IaaS) and 4 education fashions (Private, Community, Public and Hybrid varieties of cloud)”. The developing pace of cloud is as a substitute brief.
References
. S.L.Mewada, U.K. Singh, P. Sharma, "Security Enhancement in Cloud Computing (CC)", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.1, pp.31-37, 2013. Yu, Shucheng, "Achieving secure, scalable and first-class-grained know-how access management in cloud computing." INFOCOM, 2010 Proceeding IEEE, 2010.
. Pearson, Siani, "Taking account of privacy as soon as planning cloud computing offerings." Proceedings of the 2009 ICSE Workshop on software program package Engineering Challenges of Cloud Computing, IEEE Society, 2009.
. M. Al. Zain, B. Soh, & E. Pardede, “Replacement Approach victimization Redundancy Technique to reinforce Security” in Cloud Computing, IEEE, 2012
. R.Piplode, P. Sharma and U.K. Singh, "Study of Threats, Risk and Challenges in Cloud Computing", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.1, pp.26-30, 2013.
. Hwang, Kai, Sameer Kulkareni, and Yue Hu, "Cloud safety with virtualized defines and popularity-primarily based receive as true with manipulate." Dependable, involuntary and Secure Computing, International Conference on IEEE, 2009.
. V.P.Muthukumar and R.Saranya, "A Survey on Security Threats and Attacks in Cloud Computing", International Journal of Computer Sciences and Engineering, Vol.2, Issue.11, pp.120-125, 2014.
. Wooten, Ryan, "Design and implementation of a at ease useful resource social cloud system." Cluster, Cloud and Grid Computing (CC Grid), 2012 twelfth IEEE/ACM International convention, IEEE, 2012.
. Ahlam Ansari, Tahir Ansari, Faizan Hingora and Mudassir Ansari, "A Secure Cloud Server Using Raspberry Pi and Kerberos Authentication Protocol", International Journal of Computer Sciences and Engineering, Vol.3, Issue.3, pp.56-58, 2015.
. Vivek Raich, Pradeep Sharma, Shivlal Mewada and Makhan Kumbhkar, "Performance Improvement of Software as a Service and Platform as a Service in Cloud Computing Solution", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.6, pp.13-16, 2013.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
