Open Access   Article Go Back

A Survey on Security in Cloud Using Homographic and Disk Encryption Methods

V. K. Reddy1 , J.E. Rao2

Section:Survey Paper, Product Type: Journal Paper
Volume-2 , Issue-4 , Page no. 107-112, Apr-2014

Online published on Apr 30, 2014

Copyright © V. K. Reddy, J.E. Rao . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: V. K. Reddy, J.E. Rao, “A Survey on Security in Cloud Using Homographic and Disk Encryption Methods,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.4, pp.107-112, 2014.

MLA Style Citation: V. K. Reddy, J.E. Rao "A Survey on Security in Cloud Using Homographic and Disk Encryption Methods." International Journal of Computer Sciences and Engineering 2.4 (2014): 107-112.

APA Style Citation: V. K. Reddy, J.E. Rao, (2014). A Survey on Security in Cloud Using Homographic and Disk Encryption Methods. International Journal of Computer Sciences and Engineering, 2(4), 107-112.

BibTex Style Citation:
@article{Reddy_2014,
author = {V. K. Reddy, J.E. Rao},
title = {A Survey on Security in Cloud Using Homographic and Disk Encryption Methods},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2014},
volume = {2},
Issue = {4},
month = {4},
year = {2014},
issn = {2347-2693},
pages = {107-112},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=118},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=118
TI - A Survey on Security in Cloud Using Homographic and Disk Encryption Methods
T2 - International Journal of Computer Sciences and Engineering
AU - V. K. Reddy, J.E. Rao
PY - 2014
DA - 2014/04/30
PB - IJCSE, Indore, INDIA
SP - 107-112
IS - 4
VL - 2
SN - 2347-2693
ER -

VIEWS PDF XML
3608 3437 downloads 3590 downloads
  
  
           

Abstract

Offering strong data protection to cloud users while enabling rich applications is a challenging task. The cryptographic security solutions existing and applied over internet cannot directly be applied to the cloud environment. This paper presents a couple of security solutions. Several homogaphic and disk encryption methods and their limitations are discussed. The efforts to combine the benefits of both the techniques give rise to further more possibilities. The author hopes that all the possibilities are researched and a single platform layer security suit will be made for cloud data protection.

Key-Words / Index Term

Cloud Security; Homographic Encryption; Disk Encryption; Combine Benefits; Security Suit

References

[1] C. Wang, Q. Wang, K. Ren, and W. Lou, �Privacy- Preserving public auditing for storage security in cloud computing,� in Proc.of IEEE INFOCOM�10, March 2010.
[2] Maha TEBAA, Sa�d EL HAJJI, Abdellatif EL GHAZI, �Homomorphic Encryption Applied to the Cloud Computing Security.� In proc. Of the World Congress on Engineering 2012 Vol I WCE 2012, July 4 - 6, 2012, London, U.K.
[3] Dr Keith Martin, �Cryptographic Key Management,� in 2006 Information Security conference, Royal Holloway, University of London, United Kingdom.
[4] Tilo M�ller, Tobias Latzo, and Felix C. Freiling, �Self-Encrypting Disks pose Self-Decrypting Risks.� In Annual Computer Security Applications Conference (ACSAC), Orlando, Florida USA, Dec. 2011. University of Illinois at Urbana-Champaign, ACM.
[5] Shivlal Mewada, Umesh Kumar Singh and Pradeep Sharma, "Security Enhancement in Cloud Computing (CC)", ISROSET-International Journal of Scientific Research in Computer Science and Engineering, Volume-01, Issue-01, Page No (31-37), Jan -Feb 2013
[6] C. Gentry, �Fully Homomorphic Encryption Using Ideal Lattices,� Proc. 41st Ann. ACM Symp. Theory Computing (STOC 09), ACM, 2009, pp. 169-178.
[7] B. Bosen. �FDE Performance Comparison: Hardware Versus Software Full Drive Encryption. �In Trusted Strategies LLC, Jan. 2010.
[8] Dawn Song, Elaine Shi, and Ian Fischer, �Cloud Data Protection for the Masses.� Published by the IEEE Computer Society, 0018-9162/12/$31.00 � 2012 IEEE.
[9] Shaheen Ayyub1, Devshree Roy, �Cloud Computing Characteristics and Security Issues.� In International Journal of Computer Sciences and Engineering, Vol.-1(4), pp (18-22) Dec 2013.