Open Access   Article Go Back

Augmentation of Information Security by Cryptography in Cloud Computing

K.Revana Suresh1 , Ch. Shasikala2 , S.P. Kumar3

Section:Research Paper, Product Type: Journal Paper
Volume-2 , Issue-8 , Page no. 84-87, Aug-2014

Online published on Aug 31, 2014

Copyright © K.Revana Suresh, Ch. Shasikala, S.P. Kumar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: K.Revana Suresh, Ch. Shasikala, S.P. Kumar, “Augmentation of Information Security by Cryptography in Cloud Computing,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.8, pp.84-87, 2014.

MLA Style Citation: K.Revana Suresh, Ch. Shasikala, S.P. Kumar "Augmentation of Information Security by Cryptography in Cloud Computing." International Journal of Computer Sciences and Engineering 2.8 (2014): 84-87.

APA Style Citation: K.Revana Suresh, Ch. Shasikala, S.P. Kumar, (2014). Augmentation of Information Security by Cryptography in Cloud Computing. International Journal of Computer Sciences and Engineering, 2(8), 84-87.

BibTex Style Citation:
@article{Suresh_2014,
author = {K.Revana Suresh, Ch. Shasikala, S.P. Kumar},
title = {Augmentation of Information Security by Cryptography in Cloud Computing},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {8 2014},
volume = {2},
Issue = {8},
month = {8},
year = {2014},
issn = {2347-2693},
pages = {84-87},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=232},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=232
TI - Augmentation of Information Security by Cryptography in Cloud Computing
T2 - International Journal of Computer Sciences and Engineering
AU - K.Revana Suresh, Ch. Shasikala, S.P. Kumar
PY - 2014
DA - 2014/08/31
PB - IJCSE, Indore, INDIA
SP - 84-87
IS - 8
VL - 2
SN - 2347-2693
ER -

VIEWS PDF XML
3471 3437 downloads 3655 downloads
  
  
           

Abstract

Cloud computing security challenges and it�s additionally an issue to numerous analysts; first necessity was to concentrate on security which is the greatest concern of associations that are considering a move to the cloud. The points of interest of Cloud computing incorporate decreased expenses, simple upkeep and re-provisioning of assets, and consequently expanded benefits. Yet the appropriation and the section to the Cloud computing applies just if the security is guaranteed. Instructions to surety a finer information security furthermore in what manner would we be able to keep the customer private data secret? There are two real inquiries that present a test to Cloud computing suppliers. At the point when the information exchanged to the Cloud we utilize standard encryption routines to secure the operations and the stockpiling of the information. Anyhow to process information placed on a remote server, the Cloud suppliers need to get to the basic information. In this paper we are proposing Homomorphic encryption algorithm to execute operations on encoded information without decoding them which will give us the same comes about after computations as though we have worked straightforwardly on the basic information.

Key-Words / Index Term

Homomorphic Encryption, Cloud Computing, Cryptography, Information Security

References

[1] Vic (J.R.) Winkler, �Securing the Cloud, Cloud Computer Security, Techniques and Tactics�, Elsevier, 2011.
[2] Pascal Paillier. Public-key cryptosystems based on composite degree residuosity classes. In 18th Annual Eurocrypt Conference (EUROCRYPT`99), Prague, Czech Republic, volume 1592, 1999
[3] Julien Bringe and al. An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication, Springer-Verlag, 2007.
[4] R. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM, 21(2) :120-126, 1978. Computer Science, pages 223-238. Springer, 1999.
[5] Taher ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 469-472, 1985.
[6] Craig Gentry, A Fully Homomorphic Encryption Scheme, 2009.