Securing Data in Cloud Using Homomorphic Encryption
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Information Technology | India | Volume 4 Issue 6, June 2015

Securing Data in Cloud Using Homomorphic Encryption

Honey Patel, Jasmin Jha

Security and privacy in cloud computing is one of the most challenging ongoing research areas because data owner stores their sensitive data to remote servers and users also access required data from remote cloud servers which is not controlled and managed by data owners. Since cloud computing is rest on internet, various security issues like privacy, data integrity, confidentiality, authentication and trust encounter. In this paper, we will comprehensively survey the various existing hybrid security techniques of cloud computing. We will compare these combinations of security techniques with their key features

Keywords: cloud computing, security, Homomorphic Encryption, Elgamal Algorithm, OTP One Time Password, Amazon AWS S3

Edition: Volume 4 Issue 6, June 2015

Pages: 1892 - 1895

Share this Article

How to Cite this Article?

Honey Patel, Jasmin Jha, "Securing Data in Cloud Using Homomorphic Encryption", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=14051506, Volume 4 Issue 6, June 2015, 1892 - 1895

112 PDF Views | 77 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'cloud computing'

Research Paper, Information Technology, India, Volume 9 Issue 7, July 2020

Pages: 1598 - 1602

An Approach to Storage of Data on Cloud Computing and Challenges Involved

Pranshu Prenam, Rahul Chawda

Share this Article

Research Paper, Information Technology, Iraq, Volume 4 Issue 11, November 2015

Pages: 1736 - 1745

Recommendations to Evaluate and Choose Cloud Services and Deployment Models for e-Business Strategic Use: A Case Study of Malaysian SMEs

Haider N. Hussain

Share this Article

Research Paper, Information Technology, India, Volume 6 Issue 1, January 2017

Pages: 1773 - 1777

Optimized Load Balancing in Cloud Computing using Hybrid Approach of Round Robin and Min-Min Scheduling

Muskan Garg, Rajneesh Narula

Share this Article

Survey Paper, Information Technology, India, Volume 3 Issue 12, December 2014

Pages: 1137 - 1140

A Literature Survey on Virtualization Security Threats in Cloud Computing

Brona Shah, Jignesh Vania

Share this Article

Research Paper, Information Technology, India, Volume 5 Issue 9, September 2016

Pages: 1751 - 1754

Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage

Kalyani G. Ktangale, Milind Penurkar

Share this Article

Similar Articles with Keyword 'security'

Research Paper, Information Technology, India, Volume 9 Issue 7, July 2020

Pages: 1598 - 1602

An Approach to Storage of Data on Cloud Computing and Challenges Involved

Pranshu Prenam, Rahul Chawda

Share this Article

Survey Paper, Information Technology, India, Volume 3 Issue 10, October 2014

Pages: 607 - 611

A Survey Based on Fingerprint Recognition - Minutiae

Annapoorani. D, Caroline Viola Stella Mery. M

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1635 - 1639

Developing Firefox add-on for DOM vulnerability Assessment

Saranraj Ilangovan, Geogen George

Share this Article

Research Paper, Information Technology, India, Volume 5 Issue 2, February 2016

Pages: 1465 - 1469

PTP Method in Network Security for Misbehavior Detection Using Entropy

Neha Pathak, R. S. Apare

Share this Article

Survey Paper, Information Technology, India, Volume 3 Issue 12, December 2014

Pages: 1137 - 1140

A Literature Survey on Virtualization Security Threats in Cloud Computing

Brona Shah, Jignesh Vania

Share this Article
Top