Securing Data in Cloud Using Homomorphic Encryption
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 105

Research Paper | Information Technology | India | Volume 4 Issue 6, June 2015

Securing Data in Cloud Using Homomorphic Encryption

Honey Patel, Jasmin Jha

Security and privacy in cloud computing is one of the most challenging ongoing research areas because data owner stores their sensitive data to remote servers and users also access required data from remote cloud servers which is not controlled and managed by data owners. Since cloud computing is rest on internet, various security issues like privacy, data integrity, confidentiality, authentication and trust encounter. In this paper, we will comprehensively survey the various existing hybrid security techniques of cloud computing. We will compare these combinations of security techniques with their key features

Keywords: cloud computing, security, Homomorphic Encryption, Elgamal Algorithm, OTP One Time Password, Amazon AWS S3

Edition: Volume 4 Issue 6, June 2015

Pages: 1892 - 1895

Share this Article

How to Cite this Article?

Honey Patel, Jasmin Jha, "Securing Data in Cloud Using Homomorphic Encryption", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=14051506, Volume 4 Issue 6, June 2015, 1892 - 1895

Enter Your Email Address




Similar Articles with Keyword 'cloud computing'

Downloads: 83

Research Paper, Information Technology, India, Volume 9 Issue 7, July 2020

Pages: 1598 - 1602

An Approach to Storage of Data on Cloud Computing and Challenges Involved

Pranshu Prenam, Rahul Chawda

Share this Article

Downloads: 101

Research Paper, Information Technology, India, Volume 5 Issue 9, September 2016

Pages: 1751 - 1754

Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage

Kalyani G. Ktangale, Milind Penurkar

Share this Article

Similar Articles with Keyword 'security'

Downloads: 1

Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 174 - 178

Android Notes using Finger Print Authentication

Vaibhav Garg, Siddharth Yadav, Rishabh Kamal

Share this Article

Downloads: 6

Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 307 - 310

CCTV Cameras Hacking and Prevention Techniques

Preeti Rana

Share this Article

Similar Articles with Keyword 'cloud'

Downloads: 2

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 91 - 93

A Scalable Two-Phase Bottom-Up Specialization Prospective for Data Anonymization Using Map Reduce on Cloud

Dilipprasad.E, Ajay.R, K. Durairaj

Share this Article

Downloads: 83

Research Paper, Information Technology, India, Volume 9 Issue 7, July 2020

Pages: 1598 - 1602

An Approach to Storage of Data on Cloud Computing and Challenges Involved

Pranshu Prenam, Rahul Chawda

Share this Article

Similar Articles with Keyword 'computing'

Downloads: 83

Research Paper, Information Technology, India, Volume 9 Issue 7, July 2020

Pages: 1598 - 1602

An Approach to Storage of Data on Cloud Computing and Challenges Involved

Pranshu Prenam, Rahul Chawda

Share this Article

Downloads: 101

Research Paper, Information Technology, India, Volume 5 Issue 9, September 2016

Pages: 1751 - 1754

Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage

Kalyani G. Ktangale, Milind Penurkar

Share this Article



Top