Research Paper | Information Technology | India | Volume 4 Issue 6, June 2015
Securing Data in Cloud Using Homomorphic Encryption
Honey Patel, Jasmin Jha
Security and privacy in cloud computing is one of the most challenging ongoing research areas because data owner stores their sensitive data to remote servers and users also access required data from remote cloud servers which is not controlled and managed by data owners. Since cloud computing is rest on internet, various security issues like privacy, data integrity, confidentiality, authentication and trust encounter. In this paper, we will comprehensively survey the various existing hybrid security techniques of cloud computing. We will compare these combinations of security techniques with their key features
Keywords: cloud computing, security, Homomorphic Encryption, Elgamal Algorithm, OTP One Time Password, Amazon AWS S3
Edition: Volume 4 Issue 6, June 2015
Pages: 1892 - 1895
How to Cite this Article?
Honey Patel, Jasmin Jha, "Securing Data in Cloud Using Homomorphic Encryption", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=14051506, Volume 4 Issue 6, June 2015, 1892 - 1895
112 PDF Views | 77 PDF Downloads
Similar Articles with Keyword 'cloud computing'
Research Paper, Information Technology, India, Volume 9 Issue 7, July 2020
Pages: 1598 - 1602An Approach to Storage of Data on Cloud Computing and Challenges Involved
Pranshu Prenam, Rahul Chawda
Research Paper, Information Technology, Iraq, Volume 4 Issue 11, November 2015
Pages: 1736 - 1745Recommendations to Evaluate and Choose Cloud Services and Deployment Models for e-Business Strategic Use: A Case Study of Malaysian SMEs
Haider N. Hussain
Research Paper, Information Technology, India, Volume 6 Issue 1, January 2017
Pages: 1773 - 1777Optimized Load Balancing in Cloud Computing using Hybrid Approach of Round Robin and Min-Min Scheduling
Muskan Garg, Rajneesh Narula
Survey Paper, Information Technology, India, Volume 3 Issue 12, December 2014
Pages: 1137 - 1140A Literature Survey on Virtualization Security Threats in Cloud Computing
Brona Shah, Jignesh Vania
Research Paper, Information Technology, India, Volume 5 Issue 9, September 2016
Pages: 1751 - 1754Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage
Kalyani G. Ktangale, Milind Penurkar
Similar Articles with Keyword 'security'
Research Paper, Information Technology, India, Volume 9 Issue 7, July 2020
Pages: 1598 - 1602An Approach to Storage of Data on Cloud Computing and Challenges Involved
Pranshu Prenam, Rahul Chawda
Survey Paper, Information Technology, India, Volume 3 Issue 10, October 2014
Pages: 607 - 611A Survey Based on Fingerprint Recognition - Minutiae
Annapoorani. D, Caroline Viola Stella Mery. M
Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015
Pages: 1635 - 1639Developing Firefox add-on for DOM vulnerability Assessment
Saranraj Ilangovan, Geogen George
Research Paper, Information Technology, India, Volume 5 Issue 2, February 2016
Pages: 1465 - 1469PTP Method in Network Security for Misbehavior Detection Using Entropy
Neha Pathak, R. S. Apare
Survey Paper, Information Technology, India, Volume 3 Issue 12, December 2014
Pages: 1137 - 1140A Literature Survey on Virtualization Security Threats in Cloud Computing
Brona Shah, Jignesh Vania