Novel Homomorphic Encryption Scheme in Cloud Computing

  • Authors

    • C Veena
    • Dr M. Hanumanthappa
    2018-06-21
    https://doi.org/10.14419/ijet.v7i3.3.14499
  • Cloud Data storage, Data Security, Fully Homomorphic Encryption, Homomorphism Encryption, HomomorphicKey.
  • Cloud computing is an indispensable technology for any business organization, such as banking, e-commerce, etc. Although technology has advantages in many areas; The protection of stored data is a major concern for all stakeholders in the architecture. Provide data security with respect to network security, control strategies and access to the service, data storage. Despite the efforts of service providers to build customer trust in data security, users need a passion for using technology for their business skills. Homomorphism coding is a data protection technique in which tasks can be performed on encrypted data themselves. In this article, we present an exploration of new homomorphism encryption methods with respect to data security and their use in cloud computing.

     

     

  • References

    1. [1] P.Mell,T.Grance ,â€The NIST Definition of Cloud Computingâ€,National Institute of Standards and Technology,U.S.Department of Commerce,September 2011.

      [2] R.Kanagavalli and Dr.Vagdevi S,â€A Mixed Homomorphic Encryption Scheme for Secure Data Storage in Cloudâ€, IEEE Intemational Advanced Computing Conference IACC2015,2015,D.O.I:10.1109/IADCC.2015.7154867.

      [3] K.Lauter,M.Nachirg,V.Vaikuntanathan,â€Can Homomorphic Encryption be Pratical?,â€CCSW’11,October 21,2011,Chicago,Illinois,USA,pp.113-124.

      [4] M.TEBAA and S.ELHAJII,â€Secure cloud computing through Homomorphic Encryption “,International Journal of Advancments in Computing Technology, Vol.5,No.16, 2013,pp.29-38.

      [5] Payal V.Parmar,et.al ,â€Survey of Various Homomorphic Encryption algorithms and Schemesâ€,Interational Journal of Computer Applications(0975-8887), Vol.91,No.8, April 2014,pp.26-32.

      [6] M.Ogburn,C.Turner,P.Dahal,â€Homomorphic Encryption In Complex Adaptive Systemsâ€,Publication 3, Baltimore,MD,Elsevier,2013,pp.502-509.

      [7] R.Rivest,A.Shamir,and L.Adleman,â€A method for obtaining digital signatures and public key cryptosystemsâ€,Communication of the ACM,21(2):120-26,1978.ComputerScience,Springer,1999,pp.223- 238.

      [8] T.ElGamal,â€A Public Key Cryptosystem and a signature scheme based on discrete logarithmsâ€,IEEE Transactions on Information Theory,1985,pp.469-472

      [9] Pascal Paillier,â€Public-key cryptosystems based on composite degree residuosity classesâ€,In 18th Annual Eurocrypt conference (EUROCRYPT99),Prague,Czech Republic,Vol.1592,1999.

      [10] Boneh,E.Goh,K.Nissim,â€Evalauting 2-DNF formulas on ciphertextsâ€,In Theory of Cryptography Conference , TCC’05, Springer, 2005, pp.325-341.

  • Downloads

  • How to Cite

    Veena, C., & M. Hanumanthappa, D. (2018). Novel Homomorphic Encryption Scheme in Cloud Computing. International Journal of Engineering & Technology, 7(3.3), 110-113. https://doi.org/10.14419/ijet.v7i3.3.14499