Survey on Securing Data using Homomorphic Encryption in Cloud Computing
Keywords:
Cloud Computing, Privacy Preservation, Homomorphic EncryptionAbstract
Cloud computing is technique which has become today’s hottest research area due to its ability to reduce the costs associated with computing. In today’s Internet world, it is most interesting and enticing technology which is offering the services to various users on demand over network from different location and using range of devices. Since Cloud Computing
stores the data and propagate resources in the open environment, security has become the main obstacle which is hampering the
deployment of Cloud environments. So To ensure the security of data, we proposed a method which uses Multilayer Security
for securing Data using Homomorphic Encryption in Cloud Computing. Homomorphic encryption is a form of encryption that
perform computations on ciphertext thus generating an encrypted result which, when decrypted, matches the result of operations
performed on the plaintext. This System helps to secure Data for various cloud users.
References
Craig Gentry,“A FULLY HOMOMORPHIC ENCRYPTION SCHEME ,” September 2009.
Craig Gentry, Shai Halevi, “ Implementing Gentry’s Fully-Homomorphic Encryption Scheme,” IBM Research, February 4, 2011.
Craig Gentry, “Computing Arbitrary Functions of Encrypted Data,” IBM T.J. Watson Research Center, ACM 2008.
Ayantika Chatterjee, Indranil Sengupta, “Translating Algorithms to handle Fully Homomorphic Encrypted Data on the Cloud,” IEEE Transactions on Cloud Computing, 2015.
Nitesh Aggarwal, Dr CP Gupta, “Fully Homomorphic Symmetric Scheme Without Bootstrapping,” International Conference on Cloud Computing and Internet of Things, 2014.
Murat Kantarcioglu, Wei Jiang, “A Cryptographic Approach to Securely Share and Query Genomic Sequences,” IEEE Transactions,VOL. 12, NO. 5, Sep 2008.
David W. Archer, Kurt Rohloff, ”Computing with Data Privacy:Steps toward Realization,” IEEE Computer and Reliability Societies jan/feb 2015.
FENG Chao, XIN Yang, “Fast key generation for Gentry-style homomorphic encryption,” ScienceDirect, December 2014.
Monique Ogburn, Claude Turner, “Homomorphic Encryption,” ScienceDirect, 2013.
Mohamed Nabeel, Elisa Bertino, “Privacy Preserving Delegated Access Control in Public Clouds,” IEEE Transactions, Volume: 26, april 2013.
Mohamed Nabeel, Ning Shang, “Privacy Preserving Policy-Based Content Sharing in Public Clouds,” IEEE Transactions, Volume. 25, NO. 11, November 2013.
Jiadi Yu, Peng Lu, “Toward Secure Multikeyword Top-kk Retrieval over Encrypted Cloud Data,” IEEE Transactions, Volume. 10, NO. 4, July/August 2013.
Zahir Tari, Xun Yi, Uthpala S. Premarathne, “Security and Privacy in Cloud Computing: Vision, Trends, and Challenges,” IEEE Cloud Computing, 2015.
Payal V. Parmar, Shraddha B. Padhar, “Survey of Various Homomorphic Encryption algorithms and Schemes,” International Journal of Computer Applications,Volume 91. No.8, April 2014.
Bharath K. Samanthula, Yousef Elmehdwi, “A secure data sharing and query processing framework via federation of cloud computing,” Information Systems, ScienceDirect, 2013.
Shashank Bajpai, Padmija Srivastava, “A Fully Homomorphic Encryption Implementation on Cloud Computing,” IJICT, Volume 4, No.8, 2014.
Jian Li, Danjie Song, Sicong Chen, “A simple fully Homomorphic encryption scheme available in cloud computing,” IEEE 2nd International Conference Volume:01, Oct 2012.
https://mdn.mozillademos.org/files/10303/05scrypt2.png
https://blog.malwarebytes.org/wpontent/uploads/2013/10/assemcrypto.gif
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
