Journal Press India®

Enhancing Data Security in Cloud Computing through Homomorphic Encryption

Vol 1 , Issue 1 , January - June 2021 | Pages: 32-39 | Research Paper  

https://doi.org/10.17492/computology.v1i1.2104


Author Details ( * ) denotes Corresponding author

1. * Prerna Agarwal, JEMTEC, Greater Noida, Uttar Pradesh, India (prerna115@gmail.com)
2. Pranav Shrivastava, GL Bajaj Institute of Technology, Greater Noida, Uttar Pradesh, India (pranav.paddy@gmil.com)

Cloud computing has revolutionized the way data is stored and processed, offering unparalleled flexibility and scalability. However, it also raises significant concerns about data security and privacy. This research paper explores the role of homomorphic encryption in enhancing data security in cloud computing. Homomorphic encryption is a promising cryptographic technique that allows computations to be performed on encrypted data without decrypting it, thus preserving data confidentiality. This paper reviews the fundamentals of cloud computing, discusses the challenges associated with data security in the cloud, and delves into the concepts, advantages, and challenges of homomorphic encryption. It also examines real-world use cases, applications, and recent advancements in homomorphic encryption. The research concludes that homomorphic encryption is a powerful tool for enhancing data security in cloud computing and offers recommendations for its adoption and implementation.

Keywords

Cloud Computing; Data Security; Homomorphic Encryption; Decryption


  1. H. Arshad, M. Naz and M. Arshad. "Mobile Application Accelerated by Cloud Based Systems". Jan. 2016.

  2. X. Zhou. "Analysis and Research on the calculation of user data security and privacy services in the cloud". Jan. 2015.

  3. D. Vasilenko and M. Kurapati. "Dynamic Tenant Provisioning and Service Orchestration in Hybrid Cloud". Jun. 2019.

  4. S. Q. A. Al-Maliki and F. Alfifi. "Using Security Features for Cloud Computing Based on New Symmetric Key Algorithm". Jul. 2016.

  5. M. Luo. "Security Analysis of Cloud Computing in the Mobile Internet Environment". Jan. 2016.

  6. Enhancing Data Security in Cloud Computing through Homomorphic Encryption.

  7. I. Lundberg, A. Narayanan, K. Levy and M. J. Salganik. "Privacy, Ethics, and Data Access: A Case Study of the Fragile Families Challenge". Jan. 2019.

  8. X. Zhang, S. Seo and C. Wang. "A Lightweight Encryption Method for Privacy Protection in Surveillance Videos". Jan. 2018.

  9. D. H. Lee and K. Lee. "Multi-Client Order-Revealing Encryption". Jan. 2018.

  10. M. Seo, J. Hwang, D. H. Lee, S. Kim, S. U. Kim and J. C. Park. "Fuzzy Vector Signature and Its Application to Privacy-Preserving Authentication". Jan. 2019.

  11. F. Liu, Y. Wang, F. Wang, Y. Zhang and J. Lin. "Intelligent and Secure Content-Based Image Retrieval for Mobile Users". Jan. 2019.

  12. V. Jariwala, V. Singh, P. Kumar and D. C. Jinwala. "Investigating Approaches of Data Integrity Preservation for Secure Data Aggregation in Wireless Sensor Networks". Jan. 2014.

  13. P. S. Rani and V. D. "SECURITY AND PRIVACY IN BIG DATA ANALYTICS". Jan. 2016.

  14. S. L. Renwick and K. R. Martin. "Practical Architectures for Deployment of Searchable Encryption in a Cloud Environment". Nov. 2017.

  15. T. Jogan, T. Matsuzawa and M. Takeda. "Acceleration of Homomorphic Arithmetic Processing Based on the ElGamal Cryptosystem". Jan. 2019.

  16. V. Rajalakshmi, S. Stina and S. Santhiya. "PRIVATE SEARCHING ON STREAMING DATA BASED ON HOMOMORPHIC ENCRYPTION". Jan. 2016.

  17. L. Cao and H. Zhou. "A New Reversible Date-Hiding Algorithm for Encrypted Images". Jan. 2016.

  18. N. Durga and T. Gayathri. "Privacy Preserving Approaches for High Dimensional Data". Aug. 2017.

  19. D. An, Y. Li, S. Zhang and J. Lu. "Securely Outsource Modular Exponentiations With Single Untrusted Cloud Server". Jan. 2020.





  20.  
  21.  
  22.  
  23.  
Abstract Views: 109
PDF Views: 111

By continuing to use this website, you consent to the use of cookies in accordance with our Cookie Policy.