Open Access   Article Go Back

Enhancing Secure and Efficient Online Data Storage over Cloud Using Homomorphic with Probabilistic Encryption

Mehak Gandhi1 , Kiranbir Kaur2

  1. Dept. CET, Guru Nanak Dev University, Amritsar, India.
  2. Dept. CET, Guru Nanak Dev University, Amritsar, India.

Section:Review Paper, Product Type: Journal Paper
Volume-6 , Issue-3 , Page no. 263-268, Mar-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i3.263268

Online published on Mar 30, 2018

Copyright © Mehak Gandhi, Kiranbir Kaur . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Mehak Gandhi, Kiranbir Kaur, “Enhancing Secure and Efficient Online Data Storage over Cloud Using Homomorphic with Probabilistic Encryption,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.3, pp.263-268, 2018.

MLA Style Citation: Mehak Gandhi, Kiranbir Kaur "Enhancing Secure and Efficient Online Data Storage over Cloud Using Homomorphic with Probabilistic Encryption." International Journal of Computer Sciences and Engineering 6.3 (2018): 263-268.

APA Style Citation: Mehak Gandhi, Kiranbir Kaur, (2018). Enhancing Secure and Efficient Online Data Storage over Cloud Using Homomorphic with Probabilistic Encryption. International Journal of Computer Sciences and Engineering, 6(3), 263-268.

BibTex Style Citation:
@article{Gandhi_2018,
author = {Mehak Gandhi, Kiranbir Kaur},
title = {Enhancing Secure and Efficient Online Data Storage over Cloud Using Homomorphic with Probabilistic Encryption},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2018},
volume = {6},
Issue = {3},
month = {3},
year = {2018},
issn = {2347-2693},
pages = {263-268},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1794},
doi = {https://doi.org/10.26438/ijcse/v6i3.263268}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i3.263268}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1794
TI - Enhancing Secure and Efficient Online Data Storage over Cloud Using Homomorphic with Probabilistic Encryption
T2 - International Journal of Computer Sciences and Engineering
AU - Mehak Gandhi, Kiranbir Kaur
PY - 2018
DA - 2018/03/30
PB - IJCSE, Indore, INDIA
SP - 263-268
IS - 3
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
645 344 downloads 217 downloads
  
  
           

Abstract

Cloud computing is the paradigm used to provide resource on share basis to multiple machines. Due to availability of resources this mechanism becoming extremely popular for accessing resources as and when desired by machines. Reliability however is the issue associated with cloud computing. Data transferred and stored over the cloud will be under siege due to the malicious access or attacks. This paper present the comprehensive survey of techniques used in order to encrypt the data and enhance reliability of cloud. Cloud reliability enhancement is ensured using the encryption algorithms which are researched over the past era. Efficient parameters are extracted and qualitative comparison is presented to depict the efficient encryption mechanism that can be used in future works.

Key-Words / Index Term

Cloud Computing, Reliability, Encryption

References

[1] X. Yu, “Intelligent Urban Traffic Management System Based on Cloud Computing and Internet of Things,” pp. 2169–2172, 2012.
[2] B. Mills, T. Znati, and R. Melhem, “Shadow Computing: An energy-aware fault tolerant computing model,” 2014 Int. Conf. Comput. Netw. Commun., pp. 73–77, 2014.
[3] C. A. Chen, M. Won, R. Stoleru, and G. G. Xie, “Energy-efficient fault-tolerant data storage and processing in mobile cloud,” IEEE Trans. Cloud Comput., vol. 3, no. 1, pp. 28–41, 2015.
[4] S. S. Lakshmi, “Fault Tolerance in Cloud Computing,” vol. 04, no. 01, pp. 1285–1288, 2013.
[5] R. Buyya, C. S. Yeo, and S. Venugopal, “Market-oriented cloud computing: Vision, hype, and reality for delivering IT services as computing utilities,” Proc. - 10th IEEE Int. Conf. High Perform. Comput. Commun. HPCC 2008, pp. 5–13, 2008.
[6] Z. Xiao, W. Song, and Q. Chen, “Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment,” IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 6, pp. 1107–1117, Jun. 2013.
[7] U. Wajid, C. Cappiello, P. Plebani, B. Pernici, N. Mehandjiev, M. Vitali, M. Gienger, K. Kavoussanakis, D. Margery, D. G. Perez, and P. Sampaio, “On Achieving Energy Efficiency and Reducing CO 2 Footprint in Cloud Computing,” vol. 7161, no. c, 2015.
[8] Y. Xie, H. Wen, B. Wu, Y. Jiang, and J. Meng, “Transactions on Cloud Computing,” vol. 13, no. 9, 2015.
[9] D. Ardagna, G. Casale, M. Ciavotta, J. F. Pérez, and W. Wang, “Quality-of-service in cloud computing : modeling techniques and their applications,” pp. 1–17, 2014.
[10] M. Armbrust, I. Stoica, M. Zaharia, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, and A. Rabkin, “A view of cloud computing,” Commun. ACM, vol. 53, no. 4, p. 50, 2010.
[11] S. Saha, S. Pal, and P. K. Pattnaik, “A Novel Scheduling Algorithm for Cloud Computing Environment,” vol. 1, 2016.
[12] A. Sharma, RS Thakur, S. Jaloree, "Investigation of Efficient Cryptic Algorithm for Storing Video Files in Cloud", International Journal of Scientific Research in Computer Science and Engineering, Vol.4, Issue.6, pp.8-14, 2016
[13] Poonam R. Wagh, Amol D. Potgantwar, "Providing Security to Data Stored on HDFS Using Security Protocol", International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.4, pp.20-25, 2017.
[14] K. Li, W. Zhang, C. Yang, and N. Yu, “Security Analysis on One-to-Many Order Preserving Encryption Based Cloud data Search,” vol. 6013, no. c, pp. 1–9, 2015.
[15] F. Sabahi, “Cloud Computing Security Threats and Responses,” pp. 245–249, 2011.
[16] X. Wu, R. Jiang, and B. Bhargava, “On the Security of Data Access Control for Multiauthority Cloud Storage Systems,” pp. 1–14, 2015.
[17] A. Sharma, RS Thakur, S. Jaloree, "Investigation of Efficient Cryptic Algorithm for image files Encryption in Cloud", International Journal of Scientific Research in Computer Science and Engineering, Vol.4, Issue.5, pp.5-11, 2016.
[18] V. Biksham, “Query based computations on encrypted data through homomorphic encryption in cloud computing security,” pp. 3820–3825, 2016.
[19] G. A. Prajapati, S. S. Satav, S. Dahiphale, S. More, and P. N. Bogiri, “Cloud Computing Security : From Single to Multi-Clouds using digital signature,” vol. 2, no. 6, pp. 204–213, 2014.
[20] M. Ouedraogo, S. Mignon, H. Cholez, S. Furnell, and E. Dubois, “Security transparency : the next frontier for security research in the cloud,” J. Cloud Comput., 2015.
[21] B. Feng, X. Ma, C. Guo, H. Shi, Z. Fu, T. Qiu, and S. Member, “An Efficient Protocol with Bidirectional Verification for Storage,” vol. 3536, no. c, pp. 1–13, 2016.
[22] A. Bhandari, “Secure Algorithm for Cloud Computing and Its Applications,” pp. 188–192, 2016.
[23] J. I. A. You, Z. Zhong, G. Wang, B. O. Ai, and S. Member, “Security and Reliability Performance Analysis for Cloud Radio Access Networks With Channel Estimation Errors,” vol. 2, 2014.
[24] R. Chen, Y. Mu, G. Yang, and F. Guo, “BL-MLE: Block-Level Message-Locked Encryption for Secure Large File Deduplication,” IEEE Trans. Inf. Forensics Secur., vol. 10, no. 12, pp. 2643–2652, Dec. 2015.
[25] N. Hesabian, H. Haj, and S. Javadi, “Optimal Scheduling In Cloud Computing Environment Using the Bee Algorithm,” vol. 3, no. 6, pp. 253–258, 2015.
[26] K. Saranya and A. Professor-i, “Modern Applications of QR-Code for Security,” no. March, pp. 1–5, 2016.
[27] O. Harfoushi, B. Alfawwaz, N. a. Ghatasheh, R. Obiedat, M. M. Abu-Faraj, and H. Faris, “Data Security Issues and Challenges in Cloud Computing: A Conceptual Analysis and Review,” Commun. Netw., vol. 06, no. 01, pp. 15–21, 2014.