Open Access   Article Go Back

An Expensive Study of Homomorphic Encryption to Secure Cloud Data

P Venkateswarlu1 , B Manasa2 , K Srikanth3

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-4 , Page no. 765-770, Apr-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i4.765770

Online published on Apr 30, 2019

Copyright © P Venkateswarlu, B Manasa, K Srikanth . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: P Venkateswarlu, B Manasa, K Srikanth, “An Expensive Study of Homomorphic Encryption to Secure Cloud Data,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.765-770, 2019.

MLA Style Citation: P Venkateswarlu, B Manasa, K Srikanth "An Expensive Study of Homomorphic Encryption to Secure Cloud Data." International Journal of Computer Sciences and Engineering 7.4 (2019): 765-770.

APA Style Citation: P Venkateswarlu, B Manasa, K Srikanth, (2019). An Expensive Study of Homomorphic Encryption to Secure Cloud Data. International Journal of Computer Sciences and Engineering, 7(4), 765-770.

BibTex Style Citation:
@article{Venkateswarlu_2019,
author = {P Venkateswarlu, B Manasa, K Srikanth},
title = {An Expensive Study of Homomorphic Encryption to Secure Cloud Data},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2019},
volume = {7},
Issue = {4},
month = {4},
year = {2019},
issn = {2347-2693},
pages = {765-770},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4112},
doi = {https://doi.org/10.26438/ijcse/v7i4.765770}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i4.765770}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4112
TI - An Expensive Study of Homomorphic Encryption to Secure Cloud Data
T2 - International Journal of Computer Sciences and Engineering
AU - P Venkateswarlu, B Manasa, K Srikanth
PY - 2019
DA - 2019/04/30
PB - IJCSE, Indore, INDIA
SP - 765-770
IS - 4
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
248 242 downloads 112 downloads
  
  
           

Abstract

The data present in cloud should be provided security because the data is stored on distributed servers or systems. The security issues concerning data are loss of authentication and privacy. In cloud platform security is provided through encryption techniques only during transmission of data. To process the data present on a remote server, the cloud providers need to access the raw data to allow us to perform operations on the data. It can’t provide confidentiality to the data as it is exposed in the form of plain text in operational stage. The disadvantages are the data can’t remain confidential and invisible to cloud service provider and the data can be reused by the cloud service provider. Encryption solves major privacy issues but performing computations, one needs to perform the decryption first. The data privacy issue can be resolved if user is able to carry out computations on encrypted data. Homomorphic Encryption technique enables computing with encrypted data. That means one can perform the operations on this data without converting into the plain text. Data is not in its original form in its most of the operational stages on the cloud. It enables computations on encrypted data. Our idea is to encrypt data before sending it to the cloud, but to execute the calculations; the data should be decrypted every time to work on it. Decryption can be performed directly without encryption where the client is the only holder of the secret key. When the result of any operation is decrypted, it is the same as carrying out the calculations on the raw data.

Key-Words / Index Term

cloud computing, encryption technique, plain text, decryption and Homomorphic encryption

References

[1]. Sean Marston and al. “Cloud computing the business perspective”, Volume 51, Issue 1, Pages 176–189, http://www.sciencedirect.com, April 2011.
[2]. Vic (J.R.) Winkler, “Securing the Cloud, Cloud Computer Security, Techniques and Tactics”, Elsevier, 2011.
[3]. Sean Carlin, Kevin Curran, “Cloud Computing Technologies”, International Journal of Cloud Computing and Services Science (IJ-CLOSER), Vol.1, No.2, pp. 59-65, June 2012.
[4]. Pascal Paillier, “Public-key cryptosystems based on composite degree residuosity classes”, In 18th Annual Eurocrypt Conference (EUROCRYPT`99), Prague, Czech Republic, volume 1592, 1999.
[5]. https://www.centos.org/docs/5/html/5.1/Deployment.../s3-openssh-rsa-keys-v2.html
[6]. https://www.ijecs.in/index.php/ijecs/article/download/1527/1410/