A review of homomorphic encryption of data in cloud computing
||International Journal of Computer Trends and Technology (IJCTT)||
|© 2017 by IJCTT Journal|
|Year of Publication : 2017|
|Authors : Dr. AmitChaturvedi,AkankshaKapoor, Dr. Vikas Kumar|
|DOI : 10.14445/22312803/IJCTT-V43P111|
Dr. AmitChaturvedi,AkankshaKapoor, Dr. Vikas Kumar "Prediction of Web User’s Browsing Behavior using All Kth Markov model and CSB-mine". International Journal of Computer Trends and Technology (IJCTT) V43(2):75-80, January 2017. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.
The term encryption refers to converting the original data into human unreadable form (encoding). The conversion of the encoded data into original form is known as decryption. By encrypting the data only the authorized person can decode the original data. Thus data confidentiality is achieved by the encryption. In this paper, we reviewed the algorithms proposed for the homomorphic encryption of data in cloud computing.
. M. M. Poteya , Dr C. A. Dhoteb, D. H. Sharma, “Homomorphic Encryption for Security of Cloud Data”, 7th International Conference on Communication, Computing and Virtualization 2016, Procedia Computer Science 79 ( 2016 ), pp. 175 – 181
. M.Teeba, S.E. Hajii, “Secure Cloud Computing through Homomorphic Encryption”, International Journal of Advancements in Computing Technology(IJACT), Volume5, Number16, December 2013, pp. 29-38
. B.K. Mohanta, D. Gountia, “Fully homomorphic encryption equating to cloud security: An approach”, IOSR Journal of Computer Engineering (IOSR-JCE), e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 9, Issue 2 (Jan. - Feb. 2013), PP 46-50
. S. Bajpai and P. Srivastava, “A Fully Homomorphic Encryption Implementation on Cloud Computing”, International Journal of Information & Computation Technology, ISSN 0974-2239 Volume 4, Number 8 (2014), pp. 811-816 . D. Dave,R. Thakkar, “HOMOMORPHIC ENCRYPTION IN CLOUD COMPUTING”, 2015, IJIRT , Volume 1 Issue 12, ISSN: 2349-6002, pp. 1352-1357.
. K. Benzekki, A. E. Fergougui, and A. E. B. E. Alaoui,” A Secure Cloud Computing Architecture Using Homomorphic Encryption”, (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 7, No. 2, 2016, pp. 293-298
. M.Teeba, S.E. Hajii, A.E.Ghazi, “Homomorphic Encryption Applied to the Cloud Computing Security”, Proceedings of the World Congress on Engineering 2012 Vol I, ISBN: 978-988-19251-3-8, ISSN: 2078-0958 (Print); ISSN: 2078-0966 (Online)
. HUANG Qin-long, MA Zhao-feng, YANG Yi-xian, FU Jing-yi, and NIU Xin-xin, “Secure and privacy-preserving DRM scheme using homomorphic encryption in cloud computing”, The Journal of China Universities of Posts and Telecommunications, December 2013, 20(6): 88–95.
. Xiaofen Wang, “One-round secure fair meeting location determination based on homomorphic encryption”, Information Sciences 372 (2016) 758–772
. S. Dasgupta, S.K. Pal,” Design of a polynomial ring based symmetric homomorphic encryption scheme”, Perspectives in Science (2016) 8, 692—695
. F. Farokhi, I. Shames, N. Batterham, “Secure and Private Cloud-based control using semi-homomorphic encryption”, IFAC-PapersOnLine 49-22 (2016) 163–168
. Z. Wang, G. Sun, D. Chen,” A new definition of homomorphic signature for identity management in mobile cloud computing”, Journal of Computer and System Sciences 80 (2014) 546–553.
. Saravana K.N., Rajya Lakshmi G.V., Balamurugan B.,” Attribute Based Encryption for Cloud Computing”, International Conference on Information and Communication Technologies (ICICT 2014), Procedia Computer Science 46 ( 2015 ) 689 – 696.
. Vu Mai, I. Khalil, “Design and implementation of a secure cloud-based billing model for smart meters as an Internet of things using homomorphic cryptography”, Future Generation Computer Systems, 2016, 0167-739X,
. S. Singh, Y.S. Jeong, J.H. Park, “A survey on cloud computing security: Issues, threats, and solutions”, Journal of Network and Computer Applications 75 (2016), pp. 200–222.
. F. Chao, X.Yang, “Fast key generation for Gentry-style homomorphic encryption”, The Journal of China Universities of Posts and Telecommunications, December 2014, 21(6): pp. 37–44.
. S. K. Pasupuleti, S. Ramalingum, R. Buyya, “An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing”, Journal of Network and Computer Applications 64 (2016) pp. 12–22.
encryption, homomorphic, cloud, security.