Fully homomorphic computation- A scheme to provide end-to-end data confidentiality in the cloud

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2018 by IJCTT Journal
Volume-57 Number-2
Year of Publication : 2018
Authors : Priyanka C, Priya Darshini C, Vinayak G Shavi, Sarvar Begum
DOI :  10.14445/22312803/IJCTT-V57P111

MLA

Priyanka C, Priya Darshini C, Vinayak G Shavi, Sarvar Begum "Fully homomorphic computation- A scheme to provide end-to-end data confidentiality in the cloud". International Journal of Computer Trends and Technology (IJCTT) V57(2):63-65, March 2018. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract
Cloud computing is a general term for the delivery of hosted services over the internet. Cloud Computing enable the customers with limited computational resources to outsource their data on to the Cloud where massive computational power can be easily utilized in a pay per-use manner. However, security is the major concern that prevents the wide adoption of computation outsourcing in the cloud, especially when end-user’s confidential data are processed and produced during the computation. The outsourced computation workloads often contain sensitive information, such as the business financial records, proprietary research data, or personally identifiable health information etc. To fight against unauthorized information leakage, sensitive data have to be encrypted before outsourcing so as to provide end to- end data confidentiality assurance in the cloud and beyond.

References
[1] Naveen M, G Hemanth Kumar, “Secure and Practical Outsourcing of Linear Programming in Cloud Computing," IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p-ISSN: 2278-8727, Volume 19, Issue 5, Ver. I (Sep. - Oct. 2017), PP 22-26, DOI: 10.9790/0661-1905012226
[2] Lochan .B “Practical Outsourcing of Linear Programming in Secured Cloud Computing” Lochan .B / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (1), 2015, 71-73
[3] Cong Wang, Kui Ren, and Jia Wan “Secure and Practical Outsourcing of Linear Programming in Cloud Computing”, 978-1-4244-9921-/11/$26.00 ©2011 IEEE
[4] Naseer Amara, Huang Zhiqui, Awais Ali” Cloud Computing Security Threats and Attacks with their Mitigation Techniques”, 978-1-5386-2209-4/17 $31.00 © 2017 IEEE DOI 10.1109/CyberC.2017.37
[5] G. Shanmugasundaram, V. Ashwini, G. Suganya, “A COMPREHENSIVE REVIEW ON CLOUD COMPUTING SECURITY”, 978-1-5090-5/17 $31.00 © 2017 IEEE 2017 International Conference on Innovations in information Embedded and Communication Systems (ICIIECS)

Keywords
Cloud computing, security, outsourcing, encrypted.