Open Access   Article Go Back

A Review of Homomorphic Encryption Algorithm for Achieving Security in Cloud: Review Article

Abhishek Satyarthi1 , Sanjiv Sharma2

  1. CSE/IT Dept., Madhav Institute of Technology and Science, RGPV, India.
  2. CSE/IT Dept., Madhav Institute of Technology and Science, RGPV, India.

Correspondence should be addressed to: pchaturvedi1118@gmail.com.

Section:Review Paper, Product Type: Journal Paper
Volume-5 , Issue-6 , Page no. 19-23, Jun-2017

Online published on Jun 30, 2017

Copyright © Abhishek Satyarthi, Sanjiv Sharma . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Abhishek Satyarthi, Sanjiv Sharma, “A Review of Homomorphic Encryption Algorithm for Achieving Security in Cloud: Review Article,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.6, pp.19-23, 2017.

MLA Style Citation: Abhishek Satyarthi, Sanjiv Sharma "A Review of Homomorphic Encryption Algorithm for Achieving Security in Cloud: Review Article." International Journal of Computer Sciences and Engineering 5.6 (2017): 19-23.

APA Style Citation: Abhishek Satyarthi, Sanjiv Sharma, (2017). A Review of Homomorphic Encryption Algorithm for Achieving Security in Cloud: Review Article. International Journal of Computer Sciences and Engineering, 5(6), 19-23.

BibTex Style Citation:
@article{Satyarthi_2017,
author = {Abhishek Satyarthi, Sanjiv Sharma},
title = {A Review of Homomorphic Encryption Algorithm for Achieving Security in Cloud: Review Article},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2017},
volume = {5},
Issue = {6},
month = {6},
year = {2017},
issn = {2347-2693},
pages = {19-23},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1297},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1297
TI - A Review of Homomorphic Encryption Algorithm for Achieving Security in Cloud: Review Article
T2 - International Journal of Computer Sciences and Engineering
AU - Abhishek Satyarthi, Sanjiv Sharma
PY - 2017
DA - 2017/06/30
PB - IJCSE, Indore, INDIA
SP - 19-23
IS - 6
VL - 5
SN - 2347-2693
ER -

VIEWS PDF XML
912 630 downloads 541 downloads
  
  
           

Abstract

Cloud computing has created a brief exchange in code paradigm and being extraordinarily new generation however has been followed extensive through numerous groups and character for his or her computing wants. Definition of Cloud Computing is definitely unique from definitions provided thru researchers. Cloud computing is emerging paradigm gives various IT associated offerings. The safety and privacy are maximum critical elements that inhibits the boom of cloud computing. Security factors are reasons behind lesser amount of actual instances and business enterprise associated cloud applications in assessment to consumer related cloud software program. “Cloud computing can be a model for permitting omnipresent, on hand, on-name for Network get admission to to a shared pool of configurable computing sources (e.g., networks, servers, storage, applications, and services) that may be rapid provisioned and discharged with tokenism manage strive or service organization interaction. This cloud model includes five critical traits, three service fashions (Software as a Service (SaaS). Platform as a Service (PaaS). Infrastructure as a Service (IaaS) and 4 education fashions (Private, Community, Public and Hybrid varieties of cloud)”. The developing pace of cloud is as a substitute brief.

Key-Words / Index Term

Cloud Computing, homomorphic coding algorithmic rule, Security Challenges, Integrity

References

[1]. S.L.Mewada, U.K. Singh, P. Sharma, "Security Enhancement in Cloud Computing (CC)", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.1, pp.31-37, 2013. Yu, Shucheng, "Achieving secure, scalable and first-class-grained know-how access management in cloud computing." INFOCOM, 2010 Proceeding IEEE, 2010.
[2]. Pearson, Siani, "Taking account of privacy as soon as planning cloud computing offerings." Proceedings of the 2009 ICSE Workshop on software program package Engineering Challenges of Cloud Computing, IEEE Society, 2009.
[3]. M. Al. Zain, B. Soh, & E. Pardede, “Replacement Approach victimization Redundancy Technique to reinforce Security” in Cloud Computing, IEEE, 2012
[4]. R.Piplode, P. Sharma and U.K. Singh, "Study of Threats, Risk and Challenges in Cloud Computing", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.1, pp.26-30, 2013.
[5]. Hwang, Kai, Sameer Kulkareni, and Yue Hu, "Cloud safety with virtualized defines and popularity-primarily based receive as true with manipulate." Dependable, involuntary and Secure Computing, International Conference on IEEE, 2009.
[6]. V.P.Muthukumar and R.Saranya, "A Survey on Security Threats and Attacks in Cloud Computing", International Journal of Computer Sciences and Engineering, Vol.2, Issue.11, pp.120-125, 2014.
[7]. Wooten, Ryan, "Design and implementation of a at ease useful resource social cloud system." Cluster, Cloud and Grid Computing (CC Grid), 2012 twelfth IEEE/ACM International convention, IEEE, 2012.
[8]. Ahlam Ansari, Tahir Ansari, Faizan Hingora and Mudassir Ansari, "A Secure Cloud Server Using Raspberry Pi and Kerberos Authentication Protocol", International Journal of Computer Sciences and Engineering, Vol.3, Issue.3, pp.56-58, 2015.
[9]. Vivek Raich, Pradeep Sharma, Shivlal Mewada and Makhan Kumbhkar, "Performance Improvement of Software as a Service and Platform as a Service in Cloud Computing Solution", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.6, pp.13-16, 2013.