Enhancing Secure and Efficient Online Data Storage over Cloud Using Homomorphic with Probabilistic Encryption
DOI:
https://doi.org/10.26438/ijcse/v6i3.263268Keywords:
Cloud Computing, Reliability, EncryptionAbstract
Cloud computing is the paradigm used to provide resource on share basis to multiple machines. Due to availability of resources this mechanism becoming extremely popular for accessing resources as and when desired by machines. Reliability however is the issue associated with cloud computing. Data transferred and stored over the cloud will be under siege due to the malicious access or attacks. This paper present the comprehensive survey of techniques used in order to encrypt the data and enhance reliability of cloud. Cloud reliability enhancement is ensured using the encryption algorithms which are researched over the past era. Efficient parameters are extracted and qualitative comparison is presented to depict the efficient encryption mechanism that can be used in future works.
References
X. Yu, “Intelligent Urban Traffic Management System Based on Cloud Computing and Internet of Things,” pp. 2169–2172, 2012.
B. Mills, T. Znati, and R. Melhem, “Shadow Computing: An energy-aware fault tolerant computing model,” 2014 Int. Conf. Comput. Netw. Commun., pp. 73–77, 2014.
C. A. Chen, M. Won, R. Stoleru, and G. G. Xie, “Energy-efficient fault-tolerant data storage and processing in mobile cloud,” IEEE Trans. Cloud Comput., vol. 3, no. 1, pp. 28–41, 2015.
S. S. Lakshmi, “Fault Tolerance in Cloud Computing,” vol. 04, no. 01, pp. 1285–1288, 2013.
R. Buyya, C. S. Yeo, and S. Venugopal, “Market-oriented cloud computing: Vision, hype, and reality for delivering IT services as computing utilities,” Proc. - 10th IEEE Int. Conf. High Perform. Comput. Commun. HPCC 2008, pp. 5–13, 2008.
Z. Xiao, W. Song, and Q. Chen, “Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment,” IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 6, pp. 1107–1117, Jun. 2013.
U. Wajid, C. Cappiello, P. Plebani, B. Pernici, N. Mehandjiev, M. Vitali, M. Gienger, K. Kavoussanakis, D. Margery, D. G. Perez, and P. Sampaio, “On Achieving Energy Efficiency and Reducing CO 2 Footprint in Cloud Computing,” vol. 7161, no. c, 2015.
Y. Xie, H. Wen, B. Wu, Y. Jiang, and J. Meng, “Transactions on Cloud Computing,” vol. 13, no. 9, 2015.
D. Ardagna, G. Casale, M. Ciavotta, J. F. Pérez, and W. Wang, “Quality-of-service in cloud computing : modeling techniques and their applications,” pp. 1–17, 2014.
M. Armbrust, I. Stoica, M. Zaharia, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, and A. Rabkin, “A view of cloud computing,” Commun. ACM, vol. 53, no. 4, p. 50, 2010.
S. Saha, S. Pal, and P. K. Pattnaik, “A Novel Scheduling Algorithm for Cloud Computing Environment,” vol. 1, 2016.
P. You, Y. Peng, W. Liu, and S. Xue, “Security Issues and Solutions in Cloud Computing,” 2012.
S. Kaushik, “Cloud data security with hybrid symmetric encryption,” pp. 0–4, 2016.
K. Li, W. Zhang, C. Yang, and N. Yu, “Security Analysis on One-to-Many Order Preserving Encryption Based Cloud data Search,” vol. 6013, no. c, pp. 1–9, 2015.
F. Sabahi, “Cloud Computing Security Threats and Responses,” pp. 245–249, 2011.
X. Wu, R. Jiang, and B. Bhargava, “On the Security of Data Access Control for Multiauthority Cloud Storage Systems,” pp. 1–14, 2015.
Y. Zhao and S. S. M. Chow, “Updatable Block-Level Message-Locked Encryption,” pp. 449–460, 2017.
V. Biksham, “Query based computations on encrypted data through homomorphic encryption in cloud computing security,” pp. 3820–3825, 2016.
G. A. Prajapati, S. S. Satav, S. Dahiphale, S. More, and P. N. Bogiri, “Cloud Computing Security : From Single to Multi-Clouds using digital signature,” vol. 2, no. 6, pp. 204–213, 2014.
M. Ouedraogo, S. Mignon, H. Cholez, S. Furnell, and E. Dubois, “Security transparency : the next frontier for security research in the cloud,” J. Cloud Comput., 2015.
B. Feng, X. Ma, C. Guo, H. Shi, Z. Fu, T. Qiu, and S. Member, “An Efficient Protocol with Bidirectional Verification for Storage,” vol. 3536, no. c, pp. 1–13, 2016.
A. Bhandari, “Secure Algorithm for Cloud Computing and Its Applications,” pp. 188–192, 2016.
J. I. A. You, Z. Zhong, G. Wang, B. O. Ai, and S. Member, “Security and Reliability Performance Analysis for Cloud Radio Access Networks With Channel Estimation Errors,” vol. 2, 2014.
R. Chen, Y. Mu, G. Yang, and F. Guo, “BL-MLE: Block-Level Message-Locked Encryption for Secure Large File Deduplication,” IEEE Trans. Inf. Forensics Secur., vol. 10, no. 12, pp. 2643–2652, Dec. 2015.
N. Hesabian, H. Haj, and S. Javadi, “Optimal Scheduling In Cloud Computing Environment Using the Bee Algorithm,” vol. 3, no. 6, pp. 253–258, 2015.
K. Saranya and A. Professor-i, “Modern Applications of QR-Code for Security,” no. March, pp. 1–5, 2016.
O. Harfoushi, B. Alfawwaz, N. a. Ghatasheh, R. Obiedat, M. M. Abu-Faraj, and H. Faris, “Data Security Issues and Challenges in Cloud Computing: A Conceptual Analysis and Review,” Commun. Netw., vol. 06, no. 01, pp. 15–21, 2014.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
