Survey on Securing data using Homomorphic Encryption in Cloud Computing.
Suraj S. Gaikwad1 , Amar R. Buchade2
Section:Survey Paper, Product Type: Journal Paper
Volume-4 ,
Issue-1 , Page no. 17-21, Jan-2016
Online published on Jan 31, 2016
Copyright © Suraj S. Gaikwad, Amar R. Buchade . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Suraj S. Gaikwad, Amar R. Buchade, “Survey on Securing data using Homomorphic Encryption in Cloud Computing.,” International Journal of Computer Sciences and Engineering, Vol.4, Issue.1, pp.17-21, 2016.
MLA Style Citation: Suraj S. Gaikwad, Amar R. Buchade "Survey on Securing data using Homomorphic Encryption in Cloud Computing.." International Journal of Computer Sciences and Engineering 4.1 (2016): 17-21.
APA Style Citation: Suraj S. Gaikwad, Amar R. Buchade, (2016). Survey on Securing data using Homomorphic Encryption in Cloud Computing.. International Journal of Computer Sciences and Engineering, 4(1), 17-21.
BibTex Style Citation:
@article{Gaikwad_2016,
author = {Suraj S. Gaikwad, Amar R. Buchade},
title = {Survey on Securing data using Homomorphic Encryption in Cloud Computing.},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2016},
volume = {4},
Issue = {1},
month = {1},
year = {2016},
issn = {2347-2693},
pages = {17-21},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=773},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=773
TI - Survey on Securing data using Homomorphic Encryption in Cloud Computing.
T2 - International Journal of Computer Sciences and Engineering
AU - Suraj S. Gaikwad, Amar R. Buchade
PY - 2016
DA - 2016/01/31
PB - IJCSE, Indore, INDIA
SP - 17-21
IS - 1
VL - 4
SN - 2347-2693
ER -
VIEWS | XML | |
1924 | 1708 downloads | 1528 downloads |
Abstract
Cloud computing is technique which has become today’s hottest research area due to its ability to reduce the costs associated with computing. In today’s Internet world, it is most interesting and enticing technology which is offering the services to various users on demand over network from different location and using range of devices. Since Cloud Computing stores the data and propagate resources in the open environment, security has become the main obstacle which is hampering the deployment of Cloud environments. So To ensure the security of data, we proposed a method which uses Multilayer Security for securing Data using Homomorphic Encryption in Cloud Computing. Homomorphic encryption is a form of encryption that perform computations on ciphertext thus generating an encrypted result which, when decrypted, matches the result of operations performed on the plaintext. This System helps to secure Data for various cloud users.
Key-Words / Index Term
Cloud Computing, Privacy Preservation, Homomorphic Encryption
References
[1] Craig Gentry,“A FULLY HOMOMORPHIC ENCRYPTION SCHEME ,” September 2009.
[2] Craig Gentry, Shai Halevi, “ Implementing Gentry’s Fully-Homomorphic Encryption Scheme,” IBM Research, February 4, 2011.
[3] Craig Gentry, “Computing Arbitrary Functions of Encrypted Data,” IBM T.J. Watson Research Center, ACM 2008.
[4] Ayantika Chatterjee, Indranil Sengupta, “Translating Algorithms to handle Fully Homomorphic Encrypted Data on the Cloud,” IEEE Transactions on Cloud Computing, 2015.
[5] Nitesh Aggarwal, Dr CP Gupta, “Fully Homomorphic Symmetric Scheme Without Bootstrapping,” International Conference on Cloud Computing and Internet of Things, 2014.
[6] Murat Kantarcioglu, Wei Jiang, “A Cryptographic Approach to Securely Share and Query Genomic Sequences,” IEEE Transactions,VOL. 12, NO. 5, Sep 2008.
[7] David W. Archer, Kurt Rohloff, ”Computing with Data Privacy:Steps toward Realization,” IEEE Computer and Reliability Societies jan/feb 2015.
[8] FENG Chao, XIN Yang, “Fast key generation for Gentry-style homomorphic encryption,” ScienceDirect, December 2014.
[9] Monique Ogburn, Claude Turner, “Homomorphic Encryption,” ScienceDirect, 2013.
[10] Mohamed Nabeel, Elisa Bertino, “Privacy Preserving Delegated Access Control in Public Clouds,” IEEE Transactions, Volume: 26, april 2013.
[11] Mohamed Nabeel, Ning Shang, “Privacy Preserving Policy-Based Content Sharing in Public Clouds,” IEEE Transactions, Volume. 25, NO. 11, November 2013.
[12] Jiadi Yu, Peng Lu, “Toward Secure Multikeyword Top-kk Retrieval over Encrypted Cloud Data,” IEEE Transactions, Volume. 10, NO. 4, July/August 2013.
[13] Zahir Tari, Xun Yi, Uthpala S. Premarathne, “Security and Privacy in Cloud Computing: Vision, Trends, and Challenges,” IEEE Cloud Computing, 2015.
[14] Payal V. Parmar, Shraddha B. Padhar, “Survey of Various Homomorphic Encryption algorithms and Schemes,” International Journal of Computer Applications,Volume 91. No.8, April 2014.
[15] Bharath K. Samanthula, Yousef Elmehdwi, “A secure data sharing and query processing framework via federation of cloud computing,” Information Systems, ScienceDirect, 2013.
[16] Shashank Bajpai, Padmija Srivastava, “A Fully Homomorphic Encryption Implementation on Cloud Computing,” IJICT, Volume 4, No.8, 2014.
[17] Jian Li, Danjie Song, Sicong Chen, “A simple fully Homomorphic encryption scheme available in cloud computing,” IEEE 2nd International Conference Volume:01, Oct 2012.
[18] https://mdn.mozillademos.org/files/10303/05scrypt2.png
[19] https://blog.malwarebytes.org/wpontent/uploads/2013/10/assemcrypto.gif