Homomorphic encryption security - a review

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    As the Data and Technology is increasing exponentially the security and privacy issues are becoming a major concern in the present scenario, lot of security mechanisms are in to real time and practice, but even there are some bottlenecks with the existing security techniques. In this work we are giving the essence and importance of an encryption scheme called homomorphic encryption and its related issues.


  • Keywords

    Cloud; Decryption; Encryption; Homomorphic encryption; RSA Security

  • References

      [1] Taher El Gamal (1985), “A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms”, in Advances in Cryptology, pp. 10-18, Springer Berlin Heidelberg.

      [2] Shahzadi Farah et al. (2012), “An Experimental Study on Performance Evaluation of Asymmetric Encryption Algorithms”, Recent Advances in Information Science, Proceeding of the 3rd European Conf. of Computer Science, (EECS-12).

      [3] Rivest Ronald L, Adleman Leonard M and Dertouzos Michael (1978), “On Data Banks and Privacy Homomorphism”, Foundations of Secure Computation, Vol. 4, No. 11, pp. 169-180.

      [4] Carlos Aguilar Melchor, Simon Fau, Caroline Fontaine et al. (2013), “Recent Advances in Homomorphic Encryption”, IEEE Singal Processing Magazine, March, pp. 108-117.

      [5] Liu Wentao (2012), “Research on Cloud Computing Security Problem and Strategy”, Proceedings of IEEE Conference.

      [6] Ramgovind S, Eloff M and Smith E (2010), “The Management of Security in Cloud Computing”, Proceedings of IEEE Conference

      [7] Naser A W S and Bin Md Fadli (2013), “Use of Cryptography in Cloud Computing”, pp. 179-184, Proceedings of IEEE International Confer ence on Control System, Malaysia

      [8] Rastogi Garima and Sushil Rama (2015), “Cloud Computing Implementation: Key Issues and Solution”, Proceedings of IEEE Conference INDIACOM, pp. 173-179.

      [9] Gentry C (2009), “Fully Homomorphic Encryption Using Ideal Lattices”, ACM Symposium on Theory of Computing, pp. 169-178.

      [10] Garima Rastogi and Rama Sushil (2015) ,”cloud computing security and Homomorphic Encryption”, pp 48-58.

      [11] Payal V. Parmar (2014), “Survey of Various Homomorphic Encryption algorithms and Schemes”, International Journal of Computer Applications, pp 26-32.




Article ID: 20439
DOI: 10.14419/ijet.v7i4.6.20439

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.